HOMEPAGE | LINKS | GITHUB | LOG | PUBLIC KEY | TARBALL |
Here are some neat links to check out sometimes!
A collection of manuals, FAQs, and other bits of information regarding the Debian operating system. A good point of reference for any inquiries I might encounter along the way.
Vi is the stock text editor for UNIX operating systems and the one I’m currently using. This is simply a cheatsheet I can refer to when needed. Might update this once I’ve tried out other text editors.
An incredibly versatile RegEx debugger with references to boot. Supports multiple flavors and features an extensive library of community-made expressions.
Another cheatsheet, this time for the scripting language AWK. It’s compact and covers the essentials.
Understanding Denial-of-Service Attacks
A introduction to denial-of-service (DoS) attacks by the United States’ Cybersecurity and Infrastructure Security Agency. The page notes the different forms of DoS attacks alongside an explanation for a distributed DoS attack. They also provide readers with ways to mitigate the effects of a DoS attack, as well as clues to identify whether one is happening.
In this two-part video, high school teacher Eddie Woo explains the mechanisms behind the RSA encryption system. Part 1 showcases the data transmission process with simplified examples, while Part 2 delves into the algorithm used for generating the encryption and decryption keys. The videos are straight to the point and easy to understand despite how quickly it goes by. Mr. Woo’s energetic personality also helps to engage the viewer in the subject.
Gnu Privacy Guard or GnuPG is a command line tool used to encrypt data in accordance to the OpenPGP standard. GnuPG’s official site provides a documentation section for any inquiries regarding the software. It hosts guides, FAQs, and numerous options for community support.
Linux File Permissions: Commands with Examples
This tutorial video by Code99 introduces you to the concept of permissions for files in Linux. They delve into the concept of user types and the three permissions a user or group might have: reading a file, writing on a file, and executing a file. These permissions can be altered using the chmod
command with guides to represent permissions in either numeric or symbolic value. Another command — chown
— is used to change the ownership of files to another user or group.
This article by Aniket Marwade provides an overview on 5 different file allocation methods. The explanations are brief but informative, and visual examples are provided to give readers a better understanding of what’s going on. The pros and cons of each method are also listed to provide a comparison on the capabilities each method has.
Writing a FUSE Filesystem: a Tutorial
This web document by Joseph J. Pfeiffer, Jr., Ph.D. serves as both an introduction to the FUSE interface and a tutorial on how you can write your own filesystem using FUSE. It’s quite the extensive read and an interesting personal recount which gives the reader a general idea on how to implement callbacks, data access, and protections in a FUSE filesystem.
Contiguous and Non-Contiguous Allocation
An article about contiguous and non-contiguous memory allocation in a compare-and-contrast format. After a short overview, the writer delves into the key differences of each method. A table of comparisons are also given, providing details on what aspects each method is better at.
Memory Fragmentation, Your Worst Nightmare
Stephen Kellett at Software Verify gives an extensive view of memory fragmentation and it’s effect on running computer programs. The blog post details common causes of the problem as well as symptoms that can help the reader identify when a program is hindered by fragmentation. Various solutions to mitigate the effects of fragmentation are also provided.
A quick video rundown on both segmented and paged memory, including it’s application and characteristics. Explanations are complemented with simple yet effective visuals to better convey the topic.
TechTarget contributor Rahul Awati goes into the Non-uniform Memory Access (NUMA) architecture, explaining how it works and its use in symmetric multiprocessing systems. The pros and cons of the architecture alongside comparisons between NUMA and UMA architecture are also brought up.
Page Replacement Algorithms in Operating Systems
A rundown of three different page replacement algorithms: First In First Out (FIFO), Optimal, and Least Recently Used (LRU). An example case is shown for each algoritms to help compare their inner workings and efficiency.
This video from the channel BBarters explains the Second Chance algorithm for replacing pages. The lecturer uses a main example to demonstrate how the algorithm works and what results can be achieve in terms of the number of page faults.
Process Creation & Termination
This TutorialsPoint article goes over the creation and termination of processes using the fork() and exit() system calls.
What Is Multithreading: A Guide to Multithreaded Applications
TotalView senior director Bill Burns informs the reader about the concept of multithreading and its applications. Mr. Burns also notes the issues one might encounter when developing multithreaded applications and how to go over debugging them.
Synchronization With Semaphores
Oracle’s Multithreaded Programming Guide includes a section on semaphores and its use in synchronizing processes. The page covers the basic concepts of a semaphore and how to implement them in your code.
The Dining Philosophers Problem is a problem in Operating Systems to demonstrate how incorrect use of limited resources can result in a deadlock. Scaler writer Apurva Sharma delves into the problem and showcases a solution involving the use of semaphores.
Resource Allocation Graph - Deadlock Detection
A compact description on how to use the resource-allocation graph to detect deadlocks within a system.
Programming and Computer Science site Baeldung gives a comprehensive guide on the Portable Operating System Interface (POSIX).
Round Robin Scheduling Simulation
A free-form tool that can simulate the Round Robin scheduling algorithm. Comes with a guide, analysis feature, and a test feature to practice your knowledge.
Writer Ankit Kumar from Codestudio goes through the SCAN and C-SCAN algorithms for disk scheduling. Examples are given for both of them as well as a comparison table, highlighting the differences of each algorithm.
This article covers the RAID (Redundant Array of Independent Disks) technique of storing data. The different levels of RAID are talked about alongside its implementations.
What Is Direct Memory Access and How Does It Work?
A brief summary of the direct memory access (DMA) feature and how it allows subsystems and I/O devices to access the main memory independent of the CPU. The different modes of operation DMA can be are also explained.
Codestudio contributor Amisha Purswani delves into the kernel I/O subsystem and its numerous functions. The article also includes an FAQ and referral links to other articles surrounding the topic.
© 2022 - Feru P. Kartajaya - Version: 0018–05-Dec-2022