自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(2)
  • 资源 (4)
  • 收藏
  • 关注

原创 最近的一些感想

有很多次uncle问我过去一年有什么收获,回想起来,本科毕业这两年生活的感悟才越来越多。刚刚做过一个性格测试,意识到自己很有问题的对待压力的态:逃避。最初的记忆是忧心忡忡的和伙伴们玩溜溜球,到后来任务截止前几天面对压力逃避的种种手段:bbs,renren,网上书店,不一而足。虽然——也正因为是在逃避,心里十分不轻松,麻木的拖延,偶尔被唤醒的可怕后果的担忧,对压力摆脱后的轻松

2012-05-10 14:25:30 841

原创 计算机世界第一人—艾兰·图灵

自上个世纪60年代以来,计算机技术飞速发展,信息产业逐渐成为影响人类社会的最重要的工业之一.支持技术与工业发展的理论基础是计算机科学.众所周知,“诺贝尔奖”是世界上最负盛名的奖项,但仅用于奖励那些在物理、化学、文学、医学、经济学与促进世界和平等方面做出开拓性重大贡献的人士.“图灵奖”则是计算机科学领域的最高奖项,有“计算机界诺贝尔奖”之称.设立这个大奖,既是为了促进计算机科学的进一步发展,也是为了

2008-09-06 18:54:00 2308

C++ Language Tutorial

如果你看到这个文档,并且不知道这个网站的话, 本人推荐一下,其中的C++ reference 部分对标 准库的介绍很全面,索引也很方便。 Have fun! / These tutorials explain the C++ language from its basics up to the newest features of ANSI-C++, including basic concepts such as arrays or classes and advanced concepts such as polymorphism or templates. The tutorial is oriented in a practical way, with working example programs in all sections to start practicing each lesson right away.

2012-04-25

windows cscope 及vim配置文件

windows 下的scope 解压后cscope.exe curses2.dll regex2.dll放在PATH路径下(可以直接放在C:\Windows\System32 下)。cscope_maps.vim放在Vim的安装目录下的Vim/vimfiles/plugin下就可以用了。

2011-08-07

linux shell 命令 源代码

所有linux命令的源代码 cat cp date df dd ls .....

2009-08-07

The UNIX- HATERS Handbook(UNIX痛恨者手册)

英文的 质量不错 Table of Contents Foreword ................................................................................ xv By Donald A. Norman Preface ..................................................................................... xix Things Are Going to Get a Lot Worse Before Things Get Worse Who We Are............................................................................... xxi The UNIX-HATERS History ...................................................xxiii Contributors and Acknowledgments........................................ xxix Typographical Conventions .................................................... xxxii The UNIX-HATERS Disclaimer ...........................................xxxiii Anti-Foreword ............................................................... xxxv By Dennis Ritchie Part 1: User Friendly?............................................... 1 1 Unix .............................................................................................. 3 The World’s First Computer Virus History of the Plague..................................................................... 4 Sex, Drugs, and Unix .................................................................... 9 Standardizing Unconformity....................................................... 10 Unix Myths ................................................................................. 14 ix x 2 Welcome, New User! ..................................................17 Like Russian Roulette with Six Bullets Loaded Cryptic Command Names ...........................................................18 Accidents Will Happen................................................................19 Consistently Inconsistent.............................................................26 Online Documentation ................................................................31 Error Messages and Error Checking, NOT! ................................31 The Unix Attitude........................................................................37 3 Documentation? ...............................................................43 What Documentation? On-line Documentation ...............................................................44 This Is Internal Documentation? .................................................51 For Programmers, Not Users.......................................................54 Unix Without Words: A Course Proposal ...................................56 4 Mail..............................................................................................61 Don’t Talk to Me, I’m Not a Typewriter! Sendmail: The Vietnam of Berkeley Unix ..................................62 Subject: Returned Mail: User Unknown .....................................67 From: <MAILER-DAEMON@berkeley.edu> ...........................74 Apple Computer’s Mail Disaster of 1991....................................85 5 Snoozenet ...............................................................................93 I Post, Therefore I Am Netnews and Usenet: Anarchy Through Growth ........................93 Newsgroups .................................................................................96 Alt.massive.flamage ..................................................................100 This Information Highway Needs Information .........................100 rn, trn: You Get What You Pay for ............................................101 When in Doubt, Post .................................................................105 Seven Stages of Snoozenet........................................................106 xi 6 Terminal Insanity .......................................................... 111 Curses! Foiled Again! Original Sin ............................................................................... 111 The Magic of Curses ................................................................. 114 7 The X-Windows Disaster ......................................123 How to Make a 50-MIPS Workstation Run Like a 4.77MHz IBM PC X: The First Fully Modular Software Disaster..........................124 X Myths.....................................................................................127 X Graphics: Square Peg in a Round Hole .................................141 X: On the Road to Nowhere ......................................................142 Part 2: Programmer’s System? .................145 8 csh, pipes, and find ......................................................147 Power Tools for Power Fools The Shell Game .........................................................................148 Shell Programming....................................................................155 Pipes ..........................................................................................161 Find............................................................................................166 9 Programming ....................................................................173 Hold Still, This Won’t Hurt a Bit The Wonderful Unix Programming Environment .....................175 Programming in Plato’s Cave....................................................176 “It Can’t Be a Bug, My Makefile Depends on It!”....................186 If You Can’t Fix It, Restart It! ...................................................198 xii 10 C++ ............................................................................................203 The COBOL of the 90s The Assembly Language of Object-Oriented Programming ..................................................204 Syntax Syrup of Ipecac..............................................................208 Abstract What? ..........................................................................211 C++ Is to C as Lung Cancer Is to Lung .....................................214 The Evolution of a Programmer ................................................215 Part 3: Sysadmin’s Nightmare ...................219 11 System Administration ............................................221 Unix’s Hidden Cost Keeping Unix Running and Tuned ............................................223 Disk Partitions and Backups......................................................227 Configuration Files....................................................................235 Maintaining Mail Services ........................................................239 Where Did I Go Wrong? ...........................................................241 12 Security ..................................................................................243 Oh, I’m Sorry, Sir, Go Ahead, I Didn’t Realize You Were Root The Oxymoronic World of Unix Security .................................243 Holes in the Armor ....................................................................244 The Worms Crawl In .................................................................257 13 The File System ..............................................................261 Sure It Corrupts Your Files, But Look How Fast It Is! What’s a File System? ...............................................................262 UFS: The Root of All Evil.........................................................265 xiii 14 NFS ............................................................................................283 Nightmare File System Not Fully Serviceable................................................................284 No File Security.........................................................................287 Not File System Specific? (Not Quite)......................................292 Part 4: Et Cetera ...........................................................303 A Epilogue.................................................................................305 Enlightenment Through Unix B Creators Admit C, Unix Were Hoax ...........307 FOR IMMEDIATE RELEASE C The Rise of Worse Is Better ................................ 311 By Richard P. Gabriel D Bibliography ......................................................................317 Just When You Thought You Were Out of the Woods... Index .........................................................................................319

2009-04-05

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除