05-02-2005
Quote:
Originally Posted by vibhor_agarwali
Hi,
I am becoming very curious as to why viruses attach only Windows system and not any UNIX and Linux.
Does that has to do something with the architecture or something else.
Yes, it has a lot to do with the architecture. Many viruses are transmitted because of the "closeness" between the Windows user interface and the operating system, Visual Basic exploits, etc, which are used by virus writers.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
i posted a reply the other day and needed an answer to this question while i was clarifyiing a few matter.. "how to compare to date variable in string format without having to compare word for word"..
my reply was to try to use awk to compare the strings.. I wasn't quite sure if i remembered how... (2 Replies)
Discussion started by: moxxx68
2 Replies
2. UNIX for Dummies Questions & Answers
I have three computers A, B and C. To login to B and C I should use A because it has a SSH key. I don't have any other way of accessing these two computers. Now, if I need to transfer a file between B and C, I am unable to find a way that would work... because I don't know how to authenticate... (1 Reply)
Discussion started by: Legend986
1 Replies
3. Programming
Hi,
I am trying to reverse a string using the following program utilizing the Exclusive OR bit operation:
int main() {
char str = "Quraish";
char *p = str, temp;
char *q = str + strlen(str) - 1;
while ( p != q ) {
if (*p != *q) {
*p ^= *q; *q ^= *p; *p ^= *q;... (1 Reply)
Discussion started by: royalibrahim
1 Replies
4. UNIX for Dummies Questions & Answers
Hi Gurus,
I am new to UNIX environment. We have our DataStage tool installed on UNIX box.We have Dev,test and Prod environments.The architecrue is as given below.
Now my problem is I am not able to know what is meant by Physical name,Logical name,Cluster etc. also we need to do failover in case a... (5 Replies)
Discussion started by: pratyusha
5 Replies
5. Shell Programming and Scripting
Hi,
What is the difference in the following two awk one-liners?
awk -F, '{s++} END {if (s == 1 && $4 > "09:10:00") {print $2, $4}}' f1
awk -F, '{s++} s == 1 && $4 > "09:10:00" {print $2, $4}' f1
Even though, all the 2nd column values have duplicate records, the first code does not give any... (4 Replies)
Discussion started by: royalibrahim
4 Replies
6. Programming
Hi,
In the below C code,
#include <stdio.h>
void print() {
printf("Hello\n");
}
int main() {
void (*f)() = (void (*)()) print;
f();
(*f)();
}
I wonder, how the syntaxes "f()" and "(*f)()" are treated as same without any error? Is this an improvement or ANSI/ISO... (1 Reply)
Discussion started by: royalibrahim
1 Replies
7. UNIX for Dummies Questions & Answers
I want to know the memory capacity and types of memories, processor and more...
What kind of aplications this OS attends?
Archicture/system classification (Hybrid, monolithic, multitasking, micro-kernel, layered, Another..?
Explain it to me... I really need to understand and know that.
Any... (3 Replies)
Discussion started by: AlissonManson
3 Replies
8. What is on Your Mind?
I have added a new experimental "Computer Science and Mathematics Trivia - True or False" section in the discussions, currently under the tags box.
In the future, I plan to
Expand this feature to add more trivia categories from math, science and technology.
Keep track of correct and... (20 Replies)
Discussion started by: Neo
20 Replies
LEARN ABOUT DEBIAN
crypt::random::source::base
Crypt::Random::Source::Base(3pm) User Contributed Perl Documentation Crypt::Random::Source::Base(3pm)
NAME
Crypt::Random::Source::Base - Abstract base class for Crypt::Random::Source classes
SYNOPSIS
use Moose;
extends qw(Crypt::Random::Source::Base);
DESCRIPTION
This is an abstract base class.
In the future it will be a role.
METHODS
get $n, %args
Gets $n random bytes and returns them as a string.
This method may produce fatal errors if the source was unable to provide enough data.
read $buf, $n, [ $off ]
This method is cannibalized from IO::Scalar. It provides an IO::Handle work-alike.
Note that subclasses override this to operate on a real handle directly if available.
seed @stuff
On supporting sources this method will add @stuff, whatever it may be, to the random seed.
Some sources may not support this, so be careful.
available
This is a class method, such that when it returns true calling "new" without arguments on the class should provide a working source of
random data.
This is use by Crypt::Random::Source::Factory.
rank
This is a class method, with some futz value for a ranking, to help known good sources be tried before known bad (slower, less available)
sources.
get_data %Params
Provided for compatibility with Crypt::Random
AUTHOR
Yuval Kogman <nothingmuch@woobling.org>
COPYRIGHT AND LICENSE
This software is copyright (c) 2011 by Yuval Kogman.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
perl v5.14.2 2011-01-05 Crypt::Random::Source::Base(3pm)