Analysis of Linux Service Management System According to Boot Process Change

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automating Dual Boot (Linux and NT) Installations

This paper presents a solution for automating dual boot Linux and Windows NT 4.0 installations on a PC. The process is automated to the extent that one starts with a PC with a blank hard disk and ends up with a fully customized dual-boot PC. The process involves booting a PC with a floppy disk; choosing what kin of system is required from a menu and then, once the install begins, popping out th...

متن کامل

langauge needs analysis of undergraduate business management and economics students

the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...

15 صفحه اول

consequence analysis of the leakage, ignition and explosion during high pressure sour gas injection process to the oil reservoir

there is no doubt that human being needs to become integrated with industry and industry needs to be progressed, daily. on the other hand, serious events in industrial units specially in oil industries has been shown that such damages and events are industry related ones. the consequence of such events and damages which resulted in chemical and poisoned explosions and loss of life and property ...

Attacking the BitLocker Boot Process

We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...

متن کامل

Linux Process Control via the File System

We report on the implementation of process control and inspection via the process file system on Linux. Our work extends the existing Linux process file system by adding four files that collectively give read-write access to a process’s address space and allow processes to be controlled and their state observed. Process control follows the model of control in recent versions of the Solaris oper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Advanced Navigation Technology

سال: 2017

ISSN: 1226-9026

DOI: 10.12673/jant.2017.21.1.78