Friday, March 11, 2011

How to prevent error unresolved external symbol __chkstk



Usually constructed of large local data will report the error unresolved external symbol __chkstk
This may make you puzzled, because when you Gaixiao data capacity will compile.

We look at the 100x100 of TInt array as a local variable if the statement would not work to be done to narrow the class member variables or dimensions for the job because Symbian has a rigid requirement that construction in the stack only the largest of these local variable energy is 8KB, exceeds not, but above the array more than 40 K, obviously it will report an error.

That how to avoid it, we can use WAPSTKLIB.LIB This can avoid this error.
(But!) We note that while modern discovery, but the memory is a big hurt, because the running program
May result in the collapse of the stack memory, so good, so not necessary, we must keep the 8KB limit what not choose the easy way out of the way of trying to use to avoid this "friendly" error message.












Prerelease download ATi Catalyst 5.5



College Student Hidden Hard To Guarantee The Right To Life And Health Worries



QuickTime to MKV



Themes And Wallpaper brief



tips to send anonymous email Some precautions



First job out of the ivory Tower beginning how the election



YouTube to WMV



Describe the C # call an external process



VOB to iPhone 3G/3GS



News about Components And Libraries



The birth of kissing fish



EVALUATION Nature - Screen Savers



Using De exterminate rabbits annoying ADS RMVB movies



Infomation Components And Libraries



Tuesday, October 26, 2010

Rising to "micro-point event" behind all the strange to



"Micro-point software to the public markets why so difficult," reported long after the rise to repercussions in the community. Report published the same day, many readers call the newspaper, anti-virus expert Liu Xu and micro-points the situation of active defense software deplored, on the Science and Technology Daily Independent innovation has been the courage to ban the practice Mingbu Ping support. Sina, Sohu, Netease and other online media are hundreds of "black hands behind the innovation miscarriage of justice?", "the fruits of such micro-point software patent changes into innovation and miscarriage of justice "and" anti-virus technology into innovative breakthroughs such a miscarriage of justice "and the title of" micro-point event, "expressed great concern.

After many users reported reading to their own expression of his views. Beijing, one chat in the online comments "really looked angry people!" Wrote a netizen, Changzhou, Jiangsu, "a thorough investigation behind the scenes!" 4 words, Hefei, a netizen called "support micro-point", Dongguan friends wrote, "strongly supports the listing of a smooth micro-point."

Liu Huafang on the outcome of an innovation being blocked have been reported, can cause the reader so much attention, once again proved that the Party Central Committee State Council put forward the "road of independent innovation with Chinese characteristics, the core is to adhere to independent innovation, focusing on leaps and bounds to lead the future "The guiding principle accepted by the people concerned and to encourage independent innovation has become the consensus of the community. But as the media, we are deeply gratified at the same time, they still have a lingering feeling heavy. As one netizen pointed out," Micro-point active defense software development success, why is liable to Beijing for public information network security, network monitoring, who, soldiers blocked the soldiers, why can block the major achievements of independent innovation, expert Liu Xu why after two years half-time of the complaint, report of the road before the results of Sudden themselves? "

"Micro-point event" is another behind in the end, "Inside Story" micro-blocking software is not a point behind the "black hands", we can not answer. But media reports on the micro-point events and press survey found many strange things, have to suspected of "micro-point event" behind all very strange: Beijing network monitoring micro-point initiative to recognize the defense department software is a "significant innovation", but the network gave the leadership of Liu Xu OCI "specified" two "one way out "---" the company sold its strong and the company background, the second is not to set up companies in Beijing, and returned to Fujian origin "; Micro Point in accordance with the Ministry of Public Security on the anti-virus software products to market before the test results report to be submitted and issued by public security organs Computer virus prevention provisions of the record to prove to Beijing for public information network security, network monitoring Department for product registration, but the network has yet to record OCI certificate; the soldiers ordered the one hand, network monitoring imposed "not to take safety precautions "Micro-point grounds of the company so-called" intelligence investigation ", on the other hand the point of attachment of the core technology with micro-computer to a micro-point competitors; Liu Xu is the formal appointment of the agency's 863 experts, network monitoring impose a simple verbal notice can be "fired", not to dismiss the book to Liu Xu; network monitoring punished, "the four viruses spread," the grounds of the arrest of Deputy Tian Yakui micro point, but the four old non-active transmission of the virus; micro-point required the company to the authorities on testing requirements, but were net stop Office of the Commissioner, and so on. People have to question, a major innovation, why have so odd happened, back in the end this is a "black hand" "black hands" in the end how long?!

Today, the so-called "China's first anti-virus companies spread the virus case," the Supreme People's Procuratorate's investigation, finally concluding the case be rehabilitated victims Tianya Kui, was finally allowed to apply for micro-point software product testing procedures before sale . as to Liu Xu with the readers happy, while journalists still have a question not well attended, "Micro-point event," although the cases, esteem and raise a serious issue, when the promotion of technological innovations to obstruct and block encountered when What society should have a protection mechanism?

China University of Political Science Professor, Intellectual Property Director of the Centre, said in an interview in his handling of cases, large companies faced such problems do not know which department to resolve. In China, the "Patent Law", "Copyright Law", "Trademark Law" and other laws and regulations that constitute our intellectual property protection of the basic legal framework, and played an important role. Also, to safeguard their legitimate rights and interests, China formulated the "SME Promotion Law," "Company Law" and so on; on the same unfair competition between the industry, China has "anti-unfair competition law" and other laws of the constraints. In order to regulate the behavior of the executive powers, China has also tailored the "Administrative Punishment Law," "Administrative Licensing Law", "Chief璇夎娉曘?绛夌浉鍏虫硶寰?浣嗛仐鎲剧殑鏄?璁拌?浠旂粏闃呰鏈夊叧鐭ヨ瘑浜ф潈鐨勬硶寰?骞舵病鏈夌湅鍒版槑纭殑瑙勫畾,濡傚彂鐢熻嚜涓诲垱鏂版垚鏋滀笂甯傝繃绋嬭鏃犵闃绘尃鏃?搴旇鍚戝摢涓満鏋勪妇鎶ャ?鐢宠瘔鍜屽浣曚妇鎶ャ?鐢宠瘔绛?鍦ㄤ簬鍏靛皝鏉?井鐐硅蒋浠剁殑鍋氭硶涓?鎴戜滑涔熸湭鑳界湅瑙侀棶棰樺彂鐢熸椂瀵规潈鍔涜繍琛岀殑鏈夋晥鍒剁害鍜岀洃鐫?

銆??鎴戜滑鏃犳硶鍥炵瓟寰偣鍏徃涓轰簡閲嶅ぇ鍒涙柊鎴愭灉涓婂競鎵?粯鍑虹殑娌夐噸浠d环,璐d换鏈?悗搴旇鐢辫皝鏉ヨ礋;灏佹潃閲嶅ぇ鑷富鍒涙柊鎴愭灉鐨勨?榛戞墜鈥濆簲璇ョ敱璋佹潵闃绘柇?鎴戜滑浼佺浖鍦ㄢ?鎻愰珮鑷富鍒涙柊鑳藉姏,寤鸿鍒涙柊鍨嬪浗瀹垛?宸茬粡鎴愪负鍥藉鍙戝睍鎴樼暐鏍稿績鐨勪粖澶?鐩稿叧閮ㄩ棬鎶婂崄涓冨ぇ鎶ュ憡鎻愬嚭鐨?鈥滃畬鍠勯紦鍔辨妧鏈垱鏂板拰绉戞妧鎴愭灉浜т笟鍖栫殑娉曞埗淇濋殰銆佹斂绛栦綋绯汇?婵?姳鏈哄埗銆佸競鍦虹幆澧冣?钀藉埌瀹炲,寤虹珛鍜屽畬鍠勮嚜涓诲垱鏂颁繚鎶ゆ満鍒?涓烘帹鍔ㄨ嚜涓诲垱鏂版垬鐣ヨ惀閫犱竴涓洿鍔犲拰璋愮殑鐜.







相关链接:



On the C # Programming in the socket



Examples explain the whole process of production FlashMTV (2)



Emacs Is A Belief! Introduced The World's Most Powerful Editor



Dreamweaver's CSS layout examples ul and li



Knowledge of the importance of community



WMV To QT



ASF to AVI



DVR-MS to MP4



Visual Studio 2010 will be formally INCLUDED F #



quot i386 ntkrnlmp exe could NOT be loaded error



Production of realistic Leaves with Maya



51.com Tencent MOVED the cake



Lei Jun said Kingsoft feeling lonely after the LISTING



Hot Nature - Screen Savers



Premier XML Or CSS Tools



Thursday, October 14, 2010

U disk to create running Win98 super mini


In addition to storing data, a small U disk can be done? Have you thought about installing a operating system on it then? Do not believe, today, let U disk in your coat a size of only 50MB Windows 98, it now is the perfect "Startup Disk", like how to play on how to play, a U disk and my friends quickly Come together!

First, several essential tools

鈼?Windows 98 installation source files
鈼?USBOOT
鈼?98Lite
鈼?requires Windows 95 installation CD in the explorer.exe, notepad.exe, write.exe, comdlg32.dll and shell32.dll files, which are included in the Windows95 Security Win95_03.cab compressed package.

Windows 95, the five papers must be installed with the Windows 98 version of the same language, I use the Simplified Chinese version, also if you want to slim down Windows 98 to the extreme, it is recommended to use the English version of the system, it does not include the Chinese language package, only this one can "thin out" the capacity of 10MB.

Second, make flash boot disk

We use USBOOT to produce flash boot disk. First insert the flash disk, then run Usboot.exe, then a warning window will pop up, do not bother, just click "OK."

After the program will detect your hard drives and flash drives, flash drives is selected, then click on "Click here to select the mode of" entry, and in its next select "ZIP mode" so that board will be considered a flash disk ZIP drive, it starts the flash drive letter is A:, if you select the HDD mode, then start the flash drive on C:, it would be an error when installing the system.

Now click "Start", then a warning will pop-up window, I suggest you backup the entire U disk, click "OK" to format until the progress window (Figure 1). When the formatting is completed, the window will display "Please re-plug U disc," Here we unplug the flash, then you can then plug the back, the program will start automatically written to the flash file, when writing to the conclusion that successfully produce a flash boot disk.



USBoot is working

Third, the use 98lite thin

Step 1: Restart the system and insert the boot disk make a good flash, when the system interface into the self-test, press the Del key to enter the BIOS settings, and then in the "BIOS FEATURES SETUP" key, the "BOOT Sequence (start order)" is set to USB-ZIP, and then press F10 to save and exit, the computer will boot from the flash and enter DOS mode.

Step 2: make a good flash boot into DOS boot disk after the state at the command prompt run 98lite the implementation of the program, this 98lite.exe Setup program is located in the folder, you can see the program after the implementation of the interface ( Figure 2).



98Lite the program interface

Step 3: From Figure 2 we can see the screen prompts to install 98lite need to create the folder, the default path is D: 98LITESETUP, you can press Enter to confirm, we can also customize the installation folder, as long as the "> > "the cursor and enter the path.

Step 4: Next, you need to specify the store in the hard drive Windows 98 source files. Press Enter, the screen that appears, enter Windows 98 installation files, such as the installation files I stored in F: Win98se folder, so this just type d: win98se and press Enter.

Step 5: Then the program will copy the Windows 98 installation files to D: 98LITESETUP folder, when the copy will go to the next screen after, 98Lite will recognize your Windows 98 version, and then continue to press any key (do not press ESC Exit ) to the next step.
Step 6: When the "CHOOSE FROM THE FOLLOWING IPTIONS" screen, will see four options. Only the first one and 4 are available, the first four to uninstall, in the first one to choose to install Windows 98 (Figure 3).



Select the first one to install Windows 98

Step 7: After the completion of the above operations, the installation interface will appear four options (Figure 4), one of the "1.SLEEK" that use the Windows 95 shell, there is no integrated IE. The "2.CHUBBY" said minimum install IE, retained the toolbar and can quickly start menu and start menu for editing.



Select a project to start

"3.OVERWEIGHT" said fully integrated IE, the last of the "4.98MICRO" said maximum delete all bundled components on Windows 98. So we opted for four key minimize installation file.

Step 8: Next, install the interface will appear on 98MICRO installation description, press any key to enter the next step, then the program will ask you whether to use the Windows 98 system files detector, if you select "Y" then the installation will be more more than 10MB of files, in order to minimize installation, in which to select "N".

Step 9: Now there "EXTAACT WINDOWS95 EXPLORERFILES" interface requirements specified in the Windows 95 system file location 5, press Enter, and then the screen that appears, type five files to the folder path (Figure 5) .



Specify the location of the file

Step 10: Enter, will copy the 5 files to D: 98LITESETUP folder and mandatory compliance operations (Figure 6), a total of two steps, which take a few minutes, when the execution will be automatically after to prepare for the new installation option to install files, this step also requires a few minutes.



Installation process

Step 11: When ready, the program will prompt you in the next step in the system as a routine test, press the Enter key to enter the Windows 98 disk detection screen, if the error will automatically be restored, to be After testing out of detection by X, then the installation of Windows 98 can see the screen (Figure 7).



To install the




[Next]



Step 12: Press "C" key to continue the installation, and then there's the "Select Directory" window, select the "other directory" item, click "Next" in the "change directory" window installation directory is set to flash directory, and then click "Next", then a warning window will appear, click "Yes" to continue.

Step 13: Now we have to carry out the installation of Windows 98, in the event of "Setup Options" screen, select "Customize", then there's the "Select Components" window, remove all components of the selected state (such as Figure 8), so after installation of the system smaller, the final installation method in accordance with the normal operation can be completed.



Install Windows 98, select the components

4, after the installation of further downsizing

When using 98Lite install the system, we see the installation file size is only 110MB or so, it needs 200MB, compared with the original have been reduced by half, we have the following files by removing unnecessary to further achieve the "thin" purpose.

Step 1: Use the Windows 98 boot disk U into the system, open U disk of Windows installation directory, we delete one of the INF, SYSTEM32, SYSBCKUP and Media and other folders (including the file), this would save up about 20MB capacity.

Step 2: Open the FONT folder, then delete the inside than outside the Times New Roman and all the Marlett font, so in turn save 20MB of space.

Step 3: enter the system folder, delete all the input files, this will save the 10MB of space, the input method and the corresponding file in the following table, also can delete MINI.CAB and MINI1.CAB two archive files and Color folder color profile.

Step 4: Delete the C drive directory except IO.sys, MSDOS.sys and COMMAND.COM beyond all files (including hidden files), then by searching to find and delete the *. hlp, *. chm, *. cnt, * . bmp, *. Gif, *. bak, *. chk and *. txt files and all other garbage.


Step 5: Right-click the desktop "My Computer" and click "Properties", Then open "System Properties" window Click "Properties 鈫?Virtual Memory", and then open the window, select the "specify my own virtual memory settings "item, and select the" Disable Virtual Memory "entry (Figure 9), and finally click" OK "and restart the system, this will save the 10MB of space.



Virtual memory management

After more than thin, you will be surprised to find U-disk on Windows 98 only takes up less than 50MB of space, a Windows 98 system in Bahrain, after flash there is room for more than half of it useless. The graphical interface has a "start" U disk, can be far from the DOS system comparable to those cold Oh.






相关链接:



Joan Chen: "Nuclear high-based" special to be drying faster



Easy to use Telnet Servers



RM to AVI



ASF CONVERTER



Firefox 3.7 will update the interface denies plagiarism Chrome



nokia n98 dual sim tv phone from achinaseller



TOD To WMV



Photoshop to create an alternative form of gorgeous flowers!



Liu: Do not play tricks to play on the capital



Struts framework in the Session object to create and control



Expert Backup And Restore



VBScript Length property



"Computer countryside" brewing CHANGING situation



Fireworks produced hidden color photo



HP means to maintain the integrity Of former coach



Tuesday, October 12, 2010

Excellent Fujitsu UD board really gives whiteboard courseware courseware second life


We often see this in the school situation, if there is open class, laboratory classes, courses and other teaching and research, multimedia education as a teacher's performance highlights most of multimedia does give students sound, shape, color and other aspects of sensory stimulation, effectively stimulate the enthusiasm of students, initiative.

However, in actual teaching, we found some strange phenomenon, I had to watch over a public teaching with multimedia lecture classes, "Throughout the 45 minutes of teaching, teachers and students face the rise of the exchange time of 15 minutes or so, leaving only teachers concentrate on the desktop, click the mouse, and there is no writing on the blackboard. " Multimedia classroom, "what to do first, then do, how to do it first, then how to do" are all text and multimedia material with strong multimedia courseware structural composition, the use of multimedia courseware for teaching is a "Play + explanation" in teaching behavior, and the original class "Blackboard + talk" in a great range of teaching behavior.

Later, people will be "interactive whiteboard" technology platform into the classroom, multimedia computers and integrates the functions of the board to construct a similar traditional "chalk + board" in the classroom teaching environment, show multimedia courseware can also be directly Pictures and text presented on a "marked", "writing" and various human-computer interaction, teachers do not change the "writing on the blackboard + explanation" of the teaching behavior, make up some losses playing courseware. But new problems have appeared, when the science teacher explaining about when the subject line to explain the content requires a lot of writing on the blackboard during the course of conduct, such as math teacher to explain answers to equations, need to be writing on the blackboard to explain step by step, this time the teacher must a great deal of neat writing on the blackboard, sometimes even a board can not meet the writing on the blackboard to explain the contents of a subject needs, whiteboard helpless. This is the "whiteboard" to the classroom today, this is not really into one of the reasons. Teachers have an urgent need for a simple manipulation of multimedia courseware can not only meet the high-capacity classroom blackboard writing information products.

Recently, the author access to a product called UD panel, UD board well with the modern multimedia teaching and traditional teaching of the advantages of writing on the blackboard, UD plate products from UD pen, Bluetooth, software, and a board book (paper) form use when using UD UD pen writing on paper, through wireless transmission to a computer, writing the contents of the real-time display of the screen. You whiteboard courseware Fujitsu UD board directly in the playback of images and text on a "mark" "write" operation, teachers do not change the "writing on the blackboard + explanation" of the teaching behavior, make up some deficiencies play PowerPoint. Class, the teacher can highlight the places in a "marked", teachers still write "writing on the blackboard," well in advance rather than "title" instead. And "whiteboard" is different, UD board all the action is the use of UD pen an ordinary paper up completed, as is the traditional paper-based writing, as with normal handwriting habits, writing up the natural flow, writing efficient high, to meet the needs of one-time large blackboard. When the writing on the blackboard when the content of more than one page, the system will be the contents of the previous board automatically saved, the contents of both paper and electronically file content. As the UD board whiteboard courseware products a smooth, easy writing on the blackboard in class, a great expansion of the modern multimedia classroom teaching and traditional art of teaching writing on the blackboard the application space.

In addition, the excellent Fujitsu UD board whiteboard courseware with wireless control functions are more in line with the needs of the teaching process, no longer operate as the mouse control, the teacher and binds tightly to the podium, so that teachers and students more between number of interactive options.

In my opinion, excellent courseware Fujitsu UD board whiteboard teaching process in modern multimedia applications, is a big step forward, he goes beyond any previous writing on the blackboard information products, I believe that excellent Fujitsu UD board really gives whiteboard courseware Courseware Second Life, so we support projects to be!







Recommended links:



AVI to ZUNE



Nokia 5530 Xpressmusic Is Fully Entertainment



TRANSPORT Stream converter



RM To MPEG4



Wednesday, September 29, 2010

Farewell babyface, iSee 1 minute to create face-lift effect



1. Start face-lift. Than the first face-lift and fat part of the Department.
iSee Open Figure 1. Select "on the right sidebar" - Portrait beauty - large eyes.


Figure 1

Into the "large eyes" processing interface, select "Zoom document."

Written Size: 27 (written transferred to the appropriate size)

Zoom strength: -32 (to enlarge the intensity to a lower negative)


Figure 2

Part of the circle center near the face-lift inside, click the left mouse button, you can face-up. Proposed to image zoom, can be fine-tuning.

2. Then a little face-lift and fat part of the Department.

Written Size: 27

Zoom strength: -18 (the face-weakened)


Figure 3

Click the left mouse button, the circle center section near the face-lift inside and curvature along the contours of the face to the MM face-lift. This effect is more natural face-lift. Only a minute, babyface really gone. Keep the thin face small V. And dermabrasion whitening look, plus a lovely graffiti, the effect is even more perfect.


Figure 4







Recommended links:



Knowledge Portal help companies in transition off



Wubi VS Pinyin INPUT method with which you are good match?



Dawn Set Sail: Shenzhen Deng Yihui (3)



Joan Chen: "Nuclear high-based" special to be drying faster



easy access with office other members of the



ASF Converter



Picked Games SIMULATION



MKV to iPod



TD Union angrily Qualcomm to mislead the public in the patent fees



Tencent said the prosecution did not rule Out the possibility 51.com



Experts explain social engineers MOST commonly used techniques of deception



VOB to MP4



Kids Education INTRODUCTION



With A Good Wind Power, Send Me Albatron



Friday, August 6, 2010

Wang Donglin Beijing scholar Chairman





Beijing scholar Chairman Wang Donglin

View company information
Leave him a message

Wang Donglin, was born in Guizhou in 1969, 1985, final year and enter the age of 15 Department of Computer Science, Nankai University, Zhongguancun in 1989 to work in the publishing industry in 1990, cutting-edge technology research and development, and has won international awards, co-founded in 1994, Peking University Department of Philosophy graduate student journal "Campus" magazine and served as editorial director since independence in 1995, developed China's first digital document technology, a scholar in 1996 founded technology company founded in 1997 "IT Salon", founded in 1998 a scholar of electronic company, founded in 1999 pure public good scholar research center, the same year was an exception as senior engineer, founded in 2000 to participate in Zhongguancun IT Association and served as vice chairman, a scholar in 2001 founded the company figures, in 2002 was hired as the national State Council Informatization Office Electronics standardization of the overall group of government experts, won the "outstanding young entrepreneurs in Beijing the first" and "outstanding entrepreneur in Beijing Fifth Light of Science" title, as the executive director of the Beijing Association Beijing China high co-executive director of the establishment of a scholar of international companies, Credit Association in 2003 as vice president of Zhongguancun. 2003 was voted "outstanding entrepreneurs Zhongguancun Second" title.







Recommended links:



When Borland has become the past: once dedicated to Borland



Audio FORMAT Changes for



AVC-FREE



mp3 to m4a



Best Server Applications



Why three heads than a strong - how to build a knowledge-sharing-based company (2)



FreeBSD Serial (93): reverse proxy load balancing



Convert Avi To Mpeg4



Comment Recreation



Talent war broke out, the DIRECT selling industry executives 300 000 -50 million annual salary



Hot Pager Tools



Jie Mi Foxconn Employees Jumped The Truth



On The open source Jetty Servlet Container



The Table Border Css Syntax Order



Free download mp4 to 3gp



"Cottage" toxic



Wednesday, July 28, 2010

FreeBSD Serial (14): shell set



Command interpreter shell is most closely related with the user application, the user primarily through the shell using the system. After each log, they launched a user interaction with the shell, the shell will give a prompt waiting for user input, (sh for the "$", csh as "%", if it is to use root user, the login prompt symbol will be "#"), and then interpret the implementation of the user's input.
FreeBSD's base system can be used in shell two: sh and csh. The two basic shell is not the same style, different users often come under the preferences to choose between the two. Of course, the current shell process better choice available to users, these follow-up of the shell are under sh or csh style further developed, so it can be said in the shell, there are also two styles, require the user according to their own use used to choose.
For the administrator to be, to use a different shell as the user set up the basic environment, we must understand these two styles of shell set up. System log, sh will be the first implementation of the / etc / profile file for each user to set the basic environment, csh will use the / etc / csh.cshrc, csh.login and csh.logout csh as a system resource file. Implementation of the system-level log file, each user's shell on the user's home directory to find the resources the user personal files: sh to use. Profile files, csh use. Login and. Cshrc file. These resource files are using the appropriate shell language, / etc / profile and personal directory. Profile use sh-style control language, / etc / cshrc and personal directory. Login,. Cshrc use csh-style control language. System administrators can change these resource files to provide users with the most convenient use of the environment. Of course, there is no need to go directly to the system administrator to edit your home directory of resources and documents that should be managed by users themselves, but the system administrator account can be when generating the default for the user generated resource files, resource files in order to reduce the user Shezhi trouble. adduser command default to use / usr / share / skel files in a variety of resource files to provide users with the default settings, apart from this directory into the shell's resource file, you can also add other applications of the resource file . Because these resource files are hidden files to point at the beginning, in order to express clearly, in the skel directory, using a conversion method, such as the use dot.profile as. Profile template.
# Ls / usr / share / skel
dot.cshrc dot.mail_aliases dot.rhosts
dot.login dot.mailrc dot.shrc
dot.login_conf dot.profile
In / usr / share / skel for the user to set the default configuration file, the user-generated, the user will not affect the. Therefore, modifications to the system log files more effective and direct. For sh-style user can change the / etc / profile file, and csh should be changed / etc / csh.cshrc file. Changes in these documents can use shell environment variables, so to change the shell's behavior, or perform a series of automatic operation, the completion of some users to log on automatically when the task.
Commonly used environment variables:
EDITOR Editor to set the user commonly used, many programs view this variable to start a specific editor, the situation can change according to the system
HOME User's home directory name, this variable set by the login procedure, generally do not need to change
DISPLAYX use this environment variable to identify the specific display location, the format for the "Computer name: X server serial number. Display serial number", such as: xt1: 0.0, it does not need to define in the resource file
LANG system uses the language for localization of the system, the default is "C", specific settings can view / usr / share / locale directory, where the definition of the different languages, you can set it to zh_CN.EUC to make some software to use Chinese characters.
MAIL location of the user mail file, do not need to change
PATH uses a series of colon-separated path, the system uses to find specific executable program, so this variable is very important, can change the value of the specific situation. For security reasons, not to the current directory search path as the implementation of the program, especially for root. This startup programs in the current directory, need to add the path, for example, to start the current directory a.out program, enter ". / A.out".
MANPATH using a series of colon-separated path, the system uses to find the specific command-line manual, set the same methods and PATH.
PS1sh style shell using the variable value as the prompt, the default value is "$" (root for the "#"). More modern sh prompt to enhance the flexibility, you can prompt to add the current directory, user name, machine name, order number and so on.
PS2sh shell style variables to use this as a follow-up prompt, prompt the command has not been fully entered, the default is ">"
TERM Terminal type, the need for full-screen operation procedure is very important. Sometimes adjust the settings according to the situation.
TZ time zone settings, the specific time zone information in / usr / share / zoneinfo directory, need to set the standard for the local time zone value
The user's shell can be set for specific applications, to achieve the limit users on a special purpose. For example, just to give the user an e-mail, but do not want to give him the right to use the terminal, you can change the user's shell to / bin / true or other immediate exit procedures. For security purposes, users should be a non-existent shell holes binaries, it is best not to use an interpreted language script as login shell. Because the system is approved by shell procedures / etc / shells file listed in the program, the special user's shell is set to specific applications, but these applications not included in the shells file, then the user will be some applications to differentiate between ordinary users to refuse to provide services. Ftp server programs such as ftpd, by checking the user's shell is not the standard shell, to distinguish the user is normal user or users for a particular purpose.
Note that the user can not easily change the root shell, because it may cause root can not login properly, and so is unable to perform system maintenance. Even the root of the shell to change to other newer, stronger and features a standard shell, such as bash or tcsh, it should not be. Although the shell is very mature shell, still should not use them as a root of the shell. Main reason is that these shell generally has not been installed to the root partition, then when the system into single-user state, problems can arise. Another shell may be as a result of these upgrades and other reasons, and occasionally the formation of faults, causing root can not login properly. In addition, these non-standard shell does not come from the installation disk in the system, and therefore the existence of shell sources of security and trust issues, we must ensure that these shell is not changed by the attacker's version. If you want to use them to provide a convenience feature shell can be used in the system log after the full path to execute them.
* Configure user shell
In fact sh and csh, not the best choice for general users, as the two shell in the ease of use is not good enough to do, such as command line editing is not strong, can not use the hot key repeat orders. Relatively new shell, such as bash and tcsh have these user-friendly features, but these shell procedures must be installed after the ordinary user's shell to change the settings to use the shell program. Change the user's shell can use pw, vipw or chsh.
The two were in accordance with sh and csh shell style, so you can choose style preferences csh tcsh, and sh-style choices like bash. In addition to the two shell, there is ksh, zsh and other shell available. If the two shell no preference, you can choose bash, it is a GNU software, sh powerful than the standard multi.
Use two more enhanced shell, users can use the shell command-line editing. According to different habits, you can choose vi or emacs-style editing style means the default is emacs mode, this way, use the arrow keys to go back over the order execution, and modify the letter of the command to use vi style editing keys , such as using h, j, k, l four keys to move the cursor, vi-style benefit is not used outside of basic keyboard controls, which can be applied to any terminal equipment, and edit basic keyboard without having to leave when the hand , after proficiency in the most efficient. emacs style is more suitable than the vi style shift from the personal computer habits of Unix users. bash, ksh, zsh use the following command in emacs and vi style switch style:
bash $ set-o emacs
bash $ set-o vi
tcsh use different commands:
% Bind emacs
% Bind vi
Frequently used commands can also set an alias to simplify user input, such as:
bash $ alias ec = "echo This is a alias"
bash $ ec
This is a alias
shell for another user's ability to operate auto-complete command or file name of the function, as FreeBSD, the file name may be long, will they all input much trouble. In fact you can enter part of the name, then press the Tab key (vi style in the press under the Esc key twice in a row), shell will automatically fill the remainder of the full file name. If you have already entered this part of the name can not determine the specific order or document, then the shell will be able to identify only part of make up, and then notify the user to enter the ring with clear and specific documents.
In fact even in the basic under sh or csh, you can also use the "*" and other special characters, use the pattern matching approach to simplify the input.
bash $ cd / usr / local
bash $ pwd
/ Usr / local
Most Unix programs are available in the pattern matching processing capacity, while the shell's pattern matching functions most commonly used. shell can use these special mode to configure multiple files, to simplify operations purposes. If you are familiar with Unix, must have the pattern matching.
When trying to bash when typing Chinese characters, in addition to the terminal property must be set to accept 8-bit characters other than (Executive stty pass8 command), also need to set the bash of the input and output conversion, you can logon script. Profile file includes the following settings:
bind''set convert-meta off''
bind''set meta-flag on''
bind''set output-meta on''






Recommended links:



When DB2 database query associated with the basic syntax



Accounting And Finance Brief



Photoshop to create beauty facial skin texture



Flac to mp3 converter



Dual disc engraved With me



Combo drive and repair of and summary



Firefox Firefox go to the fair riding quickly and easily Amoy Baby



flv MP4



Premier Clocks And Alarms



"Mirrors Edge" Cheats



Deletion Of Posts By The Company, "3.15" Price Hike: Prices Starting At 20,000 Yuan



Video format for ps3



Current choice: RMVB movie subtitles Dafa



what is mkv file