6 private links
Depuis un moment, Adobe ne fournit plus le plugin Flash pour Ubuntu et les autres distributions GNU/Linux : la dernière version en date est la version 11.
Ever wondered how device drivers are reverse engineered? We’ll show you with a simple yet complete example
A series of posts about the linux kernel.
This is for people who want to understand how programs get loaded under linux. In particular it talks about dynamically loaded x86 ELF files. The information you learn will let you understand how to debug problems that occur in your program before main starts up.
Back in the day, I was reading a book about UNIX® programming and have learned how to write a signal handler. It was a long time ago and I don’t remember the book, but to this day the way described in that book is something that shows up in Google’s top results when you search for “How to write a signal handler”. Here it is — a simple, elegant solution to the world’s toughest problem:
docker run -ti --rm \
-e DISPLAY=$DISPLAY \
-v /tmp/.X11-unix:/tmp/.X11-unix \
firefox
see also: https://blog.bearstech.com/2014/10/isolation-par-docker.html
Pipelines are an extremely useful (and surprisingly underused) architectural pattern in modern software engineering. The concept of using pipes and filters to control the flow of data through software has been around since the 1970s, when the first Unix shells were created. If you’ve ever used the pipe (“|”) character in a terminal emulator, you’ve made use of the pipe-and-filter idiom.
A good looking terminal emulator which mimics the old cathode display...
Mbox is a lightweight sandboxing mechanism that any user can use without special privileges in commodity operating systems.
Firejail is a SUID security sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table.
Simple-Stupid user-space program doing "kill -STOP" and "kill -CONT" to protect from thrashing
Thrashing: https://en.wikipedia.org/wiki/Thrashing_%28computer_science%29