Wednesday, March 18, 2009

Memory Management in Linux and Windows

0 comments
Download --- pdf---Memory Management in Linux and Windows

Operating System


The following report contain:
1. Synopsis of Technical write-ups
2. Memory Management (Linux)
3. Memory Management (Windows)
4. PVM
5. Thread Management in WIN2K
6. RAID
7. UNIX Process Management
Synopsis of Technical Write-ups:
• Memory Management (Linux and Windows):
• PVM in Linux :
• Thread Management in WIN2K
• RAID:
• UNIX Process Management :

A proposed Mode for triple DES encryption

0 comments
Download --- pdf---A proposed Mode for triple DES encryption

A proposed mode for triple-DES encryption

We propose a new mode of multiple encryption-triple-DES external feedback
cipher block chaining with output feedback masking. The aim is to provide increased
protection against certain attacks (dictionary attacks and matching ciphertext attacks)
which exploit the short message-block size of DES. The new mode obtains this protection
through the introduction of secret masking values that are exclusive-ORed with the
intermediate outputs of each triple-DES encryption operation. The secret mask value is
derived from a fourth encryption operation per message block, in addition to the three used in previous modes. The new mode is part of a suite of encryption modes proposed in the ANSI X9.F.1 triple-DES draft standard (X9.52).

Introduction
Table 1 Abbreviations and definitions.
Table 2 Probability of exposing a single block.
Attacks against earlier schemes (Blaze
and Jones)
Internal feedback
Objectives of the new mode
Triple-DES external feedback CBC with OFB
masking (CBCM) mode
Strength of Triple-DES external feedback CBC
with OF6 masking (CBCM) mode
Triple-DES external feedback CBC with OFB masking (CBCM)
mode.
Remark on reusing the IV
Some design rationale
Properties of the present mode
Concluding remarks

DATA ENCRYPTION STANDARD DES

2 comments
Download --- pdf----DATA ENCRYPTION STANDARD DES

DATA ENCRYPTION STANDARD (DES)


Abstract
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its electronic data systems. This publication specifies two cryptographic algorithms, the Data Encryption Standard (DES) and the Triple Data Encryption Algorithm (TDEA) which may be used by Federal organizations to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Standard is being made available for use by Federal agencies within the context of a total security
program consisting of physical security procedures, good information management practices, and computer system/network access controls. This revision supersedes FIPS 46-2 in its entirety.


Key words: computer security, data encryption standard, triple data encryption algorithm, Federal
Information Processing Standard (FIPS); security.


Announcing the
DATA ENCRYPTION STANDARD
1. Name of Standard. Data Encryption Standard (DES).
2. Category of Standard. Computer Security, Cryptography.
3. Explanation.
4. Approving Authority. Secretary of Commerce.
5. Maintenance Agency. U.S. Department of Commerce, National Institute of Standards and
Technology, Information Technology Laboratory.
6. Applicability.
7. Applications.
8. Implementations.
9. Export Control.
11. Alternative Modes of Using the DES and TDEA.
12. Implementation of this standard.
13. Specifications. Federal Information Processing Standard (FIPS) 46-3, Data Encryption
Standard (DES) (affixed).
14. Cross Index.
15. Qualifications.
16. Comments.
17. Waiver Procedure.
18. Special Information.
19. Where to Obtain Copies of the Standard.
SPECIFICATIONS FOR THE
DATA ENCRYPTION STANDARD (DES)
DATA ENCRYPTION ALGORITHM
Introduction
Enciphering
Deciphering
The Cipher Function f
TRIPLE DATA ENCRYPTION ALGORITHM
APPENDIX 1
PRIMITIVE FUNCTIONS FOR THE
DATA ENCRYPTION ALGORITHM
APPENDIX 2
TRIPLE DES BLOCK DIAGRAM
(ECB Mode)
TDEA Encryption Operation:

CVS Tutorial

0 comments
Download ---- pdf----CVS Tutorial

CVS Tutorial
1 Introduction
2 Getting Started
3 Adding files and directories to CVS
4 Changing files
5 Locking and Watching files
6 WinCVS

Practical CVS Tutorial

0 comments
Download --- pdf---Practical CVS Tutorial

Practical CVS Tutorial


The purpose of this tutorial is to provide practical examples of how to use CVS during a typical source development cycle. The complexity of the CVS interface and underlying structure tends to prevent casual use of the system and prevents us from taking full advantage of the multi-user, parallel development features.With the examples provided in this tutorial, it will be possible to use CVS as just another tool, simplifying back porting bug ¯xes, maintainence of released packages, and safely going about large scale code changes (such as a platform port, architectural changes, or adding experimental code). Those using CVS after this tutorial will be able to enjoy some of its more mysterious bene¯ts with as little trouble as possible.Being a tutorial, or 'how to', only necessary procedures are provided. Those wishing to understand the nuance, history, and detail of CVS are invited to read the manual.

1 The Environment
2 Adding a package to your CVS repository
3 Retrieving a module from CVS
4 Updating your working directory and Committing changes
5 Branching and Tagging
6 Merging Branches
7 Extra Good Stu®
8 Conclusion

Monday, March 16, 2009

Custom Linux- A Porting Guide

0 comments
Download ------ pdf----Custom Linux- A Porting Guide

Custom Linux: A Porting Guide
Porting LinuxPPC to a Custom SBC
Shie Erlich


Table of Contents
Chapter Introduction
Who needs to read this ?
What do I need to know (why so much) ?
The tools
The hardware
Copyright & License
Chapter Bootcamp: How To Begin ?
Creating a development environment
Compiling the first kernel
Booting the machine
Chapter Booting In The Dark
Debugging with print_str()
Modifying code using compiler flags
Getting the console to work
Forcing the kernel to boot our?way
Non?standard hardware ? just say no!
Let there be light: calculating baud rate
Chapter Linux Still Isn't Booting
Memory probing, RTC and decrementors
Big?little endian (we should have known)
Probing the CPC
Making CPC speak little?endian
Ethernet: our first PCI device
Some Miscellaneous Issues
Chapter Linux Is Booting What Now ?
The bit barrier
Booting from flash
Appendix A GNU Free Documentation License
A PREAMBLE
A APPLICABILITY AND DEFINITIONS
A VERBATIM COPYING
A COPYING IN QUANTITY
A MODIFICATIONS
A COMBINING DOCUMENTS
A COLLECTIONS OF DOCUMENTS
A AGGREGATION WITH INDEPENDENT WORKS
A TRANSLATION
A TERMINATION
A FUTURE REVISIONS OF THIS LICENSE
A How to use this License for your documents

Virtualization in Linux

0 comments
Download ----pdf----Virtualization in Linux

Virtualization in Linux


Abstract
Three main virtualization approaches—emulation, paravirtualization,
and operating system-level virtualization—are covered, followed
by the implementation examples, comparison of the technologies and
their applications. OS-level virtualization is described in detail, with
examples from OpenVZ. The main kernel components (isolation and
virtualization, resource management, checkpointing and live migration)
and user-level tools are also explained. Typical usage scenarios
of virtualization solutions are presented.


Virtualization. Types of virtualization.
Concept of a VE
OpenVZ kernel
Virtualization and isolation
Resource management
Checkpointing and live migration
OpenVZ utilities
vzctl
Templates and vzpkg
Usage scenarios

IP aliasing multi-homing on Linux

0 comments
Download --- pdf ----IP aliasing multi-homing on Linux

IP aliasing (.multi-homing.) on Linux
Practical TCP/IP:
Designing, Using, and Troubleshooting TCP/IP Networks on
Linux and Windows
IP-aliasing (.multi-homing.) on Linux
Multi-homing on RedHat Linux 8.0

Linux 2.4 to 2.6 Transition Guide

0 comments
Download ----- pdf---Linux 2.4 to 2.6 Transition Guide

Linux 2.4 to 2.6 Transition Guide


Chapter
Linux and IBM
Why moe to SLES or RHEL?
Why is there a new kernel?
Middleware
Can I install Linux without exploiting the new features?
New features of the Linux kernel
New common kernel code features
support for the Linux kernel
New functionality in Linux on -specific deice driers and tools
functions aailable in distributions
Benefits of features for and S/ systems Scalability enhancements
NPTL
Swapping subsystem Chapter
Transition options and tasks Transition options
Upgrade using distribution tools
Install Linux without using distribution tools
Install Linux on a separate system and migrate your files
Prepare for transition
Transition your SUSE LINUX system
Transition your Red Hat Linux system
Chapter Your system after transition
Deice naming and interface access
File system changes
Bus IDs
ude tool
General differences
NPTL
Using ssh
ziplconf
SUSE LINUX
Red Hat and SUSE LINUX
Using the ?swappiness? setting


Chapter Linux and M
Adding a new deice dynamically in a M enironment
Enhancements that can benefit running Linux on M


Chapter Linux on deice drier changes for Linux
Console deice drier
New features for
Console interface changes
Performing basic tasks with the Linux Kernel
Console deice selection
Enabling login on a TTY
QETH deice drier
New features for
QETH interface changes
Performing basic tasks with the Linux kernel Adding a proxy ARP entry
Remoing a proxy ARP entry Deactiating a qeth deice
Remoing a qeth deice
Inter-User Communication ehicle (IUC) deice drier
New features for
IUC interface changes
Performing basic tasks with the Linux kernel
DASD deice drier
New features for
DASD interface changes
Performing basic tasks with the Linux
kernel Channel attached tape drier
New features for
Tape interface changes
Performing basic tasks with the Linux kernel
zfcp deice drier
New features for
zfcp interface changes
Performing basic tasks with the Linux kernel
z/M Discontiguous Saed Segments (DCSS) deice drier
New features for
DCSS interface changes
Performing basic tasks with the Linux kernel
Notices
i Linux:

Initialization sequence in GNULinux

0 comments
Download---- pdf---Initialization sequence in GNULinux

Initialization sequence in GNU/Linux
The process of booting your PC, from power to prompt
The boot up
Alternate locations for init
Once the kernel has started
Table for one
The switch
SysVInit
The missing link
The end of innocence

Example Makefiles

0 comments
Download ---- pdf ---Example Makefiles

Example Makefiles
The Book Makefile
Managing Examples
XML Preprocessing
Generating Output
Validating the Source
The Linux Kernel Makefile
Command-Line Options
Configuration Versus Building
Managing Command Echo
User-Defined Functions

Directory Organization and Makefile Style

0 comments
Download---pdf---Directory Organization and Makefile Style

Directory Organization and
Makefile Style
Organizing Your Directories
Whenever possible, put all the files for one program or library in one directory.
The make Program
Heading Comments
Customization Information
Standard targets
Macro Definitions
Common macro definitions
Configurable variables
Major Targets
Other Targets
Special Rules
Dependencies
Common Expressions
Complexity
Portability Considerations
Generic Makefiles

Debugging Makefiles

0 comments
Download----pdf----Debugging Makefiles

Debugging Makefiles

Debugging Features of make
The --debug Option
Writing Code for Debugging
Good Coding Practices
Defensive Coding
Debugging Techniques
Common Error Messages
Syntax Errors
Errors in Command Scripts
No Rule to Make Target
Overriding Commands for Target

Debugging IPC with Shell Commands

0 comments
Download ----pdf---Debugging IPC with Shell Commands

Introduction
Tools for Working with Open Files
Debugging IPC with
Shell Commands
lsof
fuser
ls
file
stat
Dumping Data from a File
The strings Command
The xxd Command
The hexdump Command
The od Command
Shell Tools for System V IPC
System V Shared Memory
System V Message Queues
System V Semaphores
Tools for Working with POSIX IPC
POSIX Shared Memory
POSIX Message Queues
POSIX Semaphores
Tools for Working with Signals
Tools for Working with Pipes and Sockets
Pipes and FIFOs
Sockets
Using Inodes to Identify Files and IPC Objects
Summary

Makefie Tutorial

0 comments
Download pdf---Makefie Tutorial

Makefile Tutorial


This is an introduction and short tutorial on the use of make. It is intended to provide the student with
enough understanding of make to write their own description files (makefiles) well enough to satisfy the
needs of this course, and to facilitate the automation of the grading process for course projects.


Table of Contents
1. Introduction to make
2. Dependencies and the structure of makefiles
3. Dummy targets
4. Commands in a makefile rule
5. The use of variables in makefiles
6. Multi-level makefiles
7. Things you should know how to do

Unix - Syncronization and pthread Tutorial

0 comments
Download ---pdf--Unix - Syncronization and pthread Tutorial

pthread Tutorial
Contents
Introduction
Creating and Destroying Threads
Creating Threads
Returning Results from Threads
Thread Synchronization
Mutual Exclusion
Condition Variables
Semaphores
Reader/Writer Locks
Thead Models
Boss/Worker Model
Pipeline Model
Background Task Model
Interface/Implementation Model
General Comments
Thread Safety
Levels of Thread Safety
Writing Thread Safe Code
Exception Safety vs Thread Safety


Rules for Multithreaded Programming
Shared Data
What data is shared?
What data is not shared?
What type of simultaneous access causes a problem?
What type of simultaneous access is safe?
What can I count on?

Linux Filesystem Hierarchy

0 comments
Download here ----pdf---Linux Filesystem Hierarchy

Linux Filesystem Hierarchy


Chapter Linux Filesystem Hierarchy
Foreward
The Root Directory
/bin
/boot
/dev
/etc
/home
/initrd
/lib
/lost+found
/media
/mnt
Mounting and unmounting
/opt
/proc
/root
/sbin
/usr
/var
/srv
/tmp
Glossary
Appendix A UNIX System V Signals
Appendix B Sources
Appendix C About the Author
Appendix D Contributors
Appendix E Disclaimer
Appendix F Donations
Appendix G Feedback
Appendix H GNU Free Documentation License
H PREAMBLE
H APPLICABILITY AND DEFINITIONS
H VERBATIM COPYING
H COPYING IN QUANTITY
H MODIFICATIONS
H COMBINING DOCUMENTSAppendix H GNU Free Documentation License
H COLLECTIONS OF DOCUMENTS
H AGGREGATION WITH INDEPENDENT WORKS
H TRANSLATION
H TERMINATION
H FUTURE REVISIONS OF THIS LICENSE
H ADDENDUM: How to use this License for your documents
Notes

Comparison of Memory Management Systems of BSD Windows and Linux

0 comments
Download Here----------Comparison of Memory Management Systems of BSDWindows and Linux

Comparison of Memory Management Systems of BSD,
Windows, and Linux


Abstract
This paper is a study of memory management systems
of an operating system. We begin with a brief introduction
to memory management systems and then we
compare the memory management systems of reallife
operating systems - BSD4.4, Windows 2000 and
Linux 2.4


Introduction
Memory Management Systems
Virtual Memory
Paging
Comparison
Data Structures to describe a process
space
BSD4.4
Windows
Linux
Distribution of Process Address
Space
Page Replacement
FreeBSD, NetBSD, OpenBSD
and UVM

Monday, March 9, 2009

Credit Card Processing FAQ

0 comments

Download pdf----Here----Credit Card Processing FAQ

Credit Card Processing FAQ



Supported Payment Gateways
What happens during a typical Internet Credit Card transaction?
What are some of the means that a customer can provide their credit card
information, and what is the difference?
Where do the Vendapin CC processing engine and VitalPS fit in?
Using Vendapin CC processing engine for processing Credit Card:
Using VitalPS Integrator engine for processing Credit Cards:
How do I settle transactions with the Vendapin CC VitalPS processing engine ?
What is a payment gateway?
What is a payment processor?
What is a merchant account?
How do I get a merchant account?
What do I have to do to go through a payment processor?

Credit Card Processing Best Practices

2 comments
Download pdf----Here----Credit Card Processing Best Practices

Credit Card Processing Best Practices

Card-Present Transactions
Swiping the Card
Verifying the Account Number
When Cards Won’t Read When Swiped
Minimizing Key-Entered Transactions
Verifying Credit Card Security Features during Transaction Processing
Back of Card
Dealing with Unsigned Cards
Authorization
Zero-Percent Tip Authorization
Split Sales and Split-Tender Transactions
Signature and Identification
Suspicious Behavior
Skimming
Code 10 Calls
Recovered Cards
Card Recovery Procedures
Card-Not-Present Transactions
12 potential signs of CNP fraud
Reversals

Credit Card Processing Glossary

0 comments
Download Here------pdf-----Credit Card Processing Glossary
Credit Card Processing Glossary
ACH (Automated Clearing House)
Acquirer:
Acquiring Bank
Address Verification Service (AVS):
Adjustment:
Audio Response Unit (ARU):
Authorization:
Authorization Response:
Approval -- transaction was approved
Decline -- transaction was not approved
Call Center -- response pending more information, merchant must call the toll-free authorization phone
number.
Authorization Code:
Auto Close:
Automated Clearing House (ACH) File:
Average Ticket (Average Sale):
Bankcard:
Batch:
Batch Close
Capture:
Cardholder:
Card Issuing Bank:
Card Not Present:
Chargeback:
Close Batch:
Code 10 Authorization:
Commercial Cards:
Corporate Card:
Credit (Reversal):
DDA Account:
Debit Card:
Deposit Correction Notice (DCN):
Discount Rate:
Edit Rejects:
Electronic Cash Register (ECR):
Electronic Date Capture (EDC):
Fleet cards:
Footer:
Independent Sales Organization (ISO):
Interchange:
Interchange Fee:
Internet Service Provider (ISP):
Issuing Financial Institution:
Manual Close:
Merchant: Customer of a processor/acquirer.
Merchant Identification Number (MID):
Magnetic Stripe:
Mail Order/Telephone Order (MOTO):
Network:
Non-Qualified Transaction Fees (NON-Qual):
PC Software:
Private Label Cards:
Point Of Sale (POS):
POS Terminal:
Processor:
Processing Network (Vendor):
Procurement/Purchasing Cards:
Real-Time Processing
Reserve Account
Sales Draft (Ticket):
Secure Payment Gateway:
Secure Payment Software/Software Module/Payment Module:
Settlement:
Shopping Cart Software:
Shopping Cart Software Providers:
Smart card:
Terminal Software:
Smart card:
Software: .
Sponsoring Bank:
T & E cards:
Terminal:
Terminal Identification Number (TID):
Third-Party Processor:
Third Party Secure Payment Gateway:
Transaction Fee
Value Added Reseller (VAR):
Batch
Card Issuer
Chargeback
Credit
Discount Rate
EDC (Electronic Data Capture)
ISO (Independent Sales Organization)
Issuing bank
Merchant Account
Merchant Bank
MO/TO
merchant
Recurring Fees
Real-Time Authorization
Real-time Processing
Reserve Account
Representment
SET (Secure Electronic Transaction)
Settlement
Ticket Size

RMI for C++ Rapid Application Development of Distributed Event Driven Software

0 comments
Download pdf----Here----RMI for C++ Rapid Application Development of Distributed Event Driven Software
RMI for C++ Rapid Application Development of Distributed Event Driven Software


Abstract
In this paper we describe the implementation
of a framework designed to be used for
creating an event driven application with
objects. The code to handle object
marshalling over the network is automatically
generated from the classes written by the
application programmer. A demo peer-topeer
application was also developed to
highlight the ease and elegance with which
event driven software can be created.


Goals for this Implementation of RMI
RMI Application
RMI Object
RMI Reference
Method Call Return
RMI Server
Pure Client
RMI Client
Marshalling
Passing RMI Object References
Garbage Collection
Code Generation
Polymorphism
Network Robustness Guarantee
Communication Format
Efficiency
Discussion of a sample peer-to-peer
application

Mapping ANSA Concepts to C++

0 comments
Download pdf-----Here-----Mapping ANSA Concepts to C++
Mapping ANSA Concepts to C++


Abstract
This document discusses the mapping of ANSA concepts to C++. The ANSA concepts to be
mapped are those specified by the ANSA computational model as described in [ANSASl].


Audience and Purpose
Overview
Current Mappings
Overview of the ANSA Computational Model
Principles
Concepts
Structure of the Model
Mapping Components
Mapping to C++
Terminology and Concepts
Object:
Class:
Global Function:
Member Function:
Inheritance:
Separation
Concurrency
Heterogeneity
Federation
Evolution
Scaling
Mapping ACM Concepts to C++
nputational) Object
Interface
Operation
Signature
Activity
Termination
Interface Type
Invocation
Server
Client
Interaction Model
Construction Model
Object Constructor
Interface Constructor
Invoker
Termination Namer and Termination Case Selector
Fixed and Variable Binder
Assigner
Interface Name
Composer

Functional Concepts in C++

0 comments
Download pdf----Here-----Functional Concepts in C++
Functional Concepts in C++


Abstract
We describe a parser-translator programthat translates typed l-terms into C++ classes
so as to integrate functional concepts. We prove the correctness of the translation of
l-terms into C++ with respect to a denotational semantics using Kripke-style logical
relations. We introduce a general technique for introducing lazy evaluation into
C++, and illustrate it by carrying out in C++ the example of computing the Fibonacci
numbers efficiently using infinite streams and lazy evaluation. Finally, we show how
merge higher-order l-terms with imperative C++ code.


INTRODUCTION
TRANSLATION OF TYPED l-TERMS INTO C++
PROOF OF CORRECTNESS
LAZY EVALUATION IN C++
COMBINING FUNCTIONAL AND IMPERATIVE PROGRAMMING

Concepts Linguistic Support for Generic Programming in C++

0 comments
Download pdf----Here----Concepts Linguistic Support for Generic Programming in C++
Concepts Linguistic Support for Generic Programming in C++


Introduction
Generic Programming
Lifting and Abstraction
Algorithm Specialization
Concepts
Language Support for Concepts
Constraining Templates with Concepts
Same-type Constraints
Negative Constraints
Constraint Propagation
Concept Definitions
Refinement
Associated Types
Nested Requirements
Function Signatures
Overloading and Specialization
Concept Maps
Implicit and Explicit Concepts
Refinements and Concept Maps
ConceptGCC
Compilation Model
Compilation of Constrained Templates
Concepts and Concept Maps
Type-checking Templates
Same-type Constraints
Use of Class Templates and Specializations
Evaluation
Defining STL Concepts
STL Algorithm Requirements
Backward Compatibility

Specifying C++ Concepts

0 comments
Download here---pdf----Specifying C++ Concepts

Specifying C++ Concepts


Abstract
C++ templates are key to the design of current successful
mainstream libraries and systems. They are the basis of programming
techniques in diverse areas ranging from conventional
general-purpose programming to software for safetycritical
embedded systems. Current work on improving templates
focuses on the notion of concepts (a type system for
templates), which promises significantly improved error diagnostics
and increased expressive power such as conceptbased
overloading and function template partial specialization.
This paper presents C++ templates with an emphasis on
problems related to separate compilation. We consider the
problem of how to express concepts in a precise way that
is simple enough to be usable by ordinary programmers. In
doing so, we expose a few weakness of the current specification
of the C++ standard library and suggest a far more
precise and complete specification. We also present a systematic
way of translating our proposed concept definitions,
based on use-patterns rather than function signatures, into
constraint sets that can serve as convenient basis for concept
checking in a compiler.


Introduction and overview
The problem
Template basics
Parameterization
Instantiations and checking
Performance
A more realistic example
An iterator concept for fill
Iterator concepts
A concept system
Concept definition
Explicit check request
Implicit check request
From concepts to constraints sets
Concept checking
Associated types and values
fill and associates revisited
The Assignable and Movable puzzle
Unary iterator predicates
Assignable
Standard iterator concepts
Siek’s proposal
Type classes
Qualified types