EmbLogic's Blog

basic programing using Shell Scripting ,RCS,Make File

RCS file: main.c,v
Working file: main.c
head: 1.1
branch:
locks: strict
	parvinder: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1;	selected revisions: 1
description:
maint function of add. and swap
----------------------------
revision 1.1	locked by: parvinder;
date: 2017/02/28 06:22:51;  author: parvinder;  state: Exp;
Initial revision
=============================================================================

RCS file: main.c,v
Working file: main.c
head: 1.1
branch:
locks: strict
	parvinder: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1;	selected revisions: 1
description:
maint function of add. and swap
----------------------------
revision 1.1	locked by: parvinder;
date: 2017/02/28 06:22:51;  author: parvinder;  state: Exp;
Initial revision
=============================================================================

RCS file: sum.c,v
Working file: sum.c
head: 1.1
branch:
locks: strict
	parvinder: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1;	selected revisions: 1
description:
this value exicute the sum of 2  numbers
----------------------------
revision 1.1	locked by: parvinder;
date: 2017/02/28 05:33:54;  author: parvinder;  state: Exp;
Initial revision
=============================================================================

RCS file: swap.c,v
Working file: swap.c
head: 1.1
branch:
locks: strict
	parvinder: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1;	selected revisions: 1
description:
here swap the values of 2 variables
----------------------------
revision 1.1	locked by: parvinder;
date: 2017/02/28 05:34:25;  author: parvinder;  state: Exp;
Initial revision
=============================================================================

RCS file: dec.h,v
Working file: dec.h
head: 1.1
branch:
locks: strict
	parvinder: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1;	selected revisions: 1
description:
here defines prototype
----------------------------
revision 1.1	locked by: parvinder;
date: 2017/02/28 05:34:56;  author: parvinder;  state: Exp;
Initial revision
=============================================================================

RCS file: header.h,v
Working file: header.h
head: 1.1
branch:
locks: strict
	parvinder: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1;	selected revisions: 1
description:
here defines header files
----------------------------
revision 1.1	locked by: parvinder;
date: 2017/02/28 05:36:24;  author: parvinder;  state: Exp;
Initial revision
=============================================================================
Posted in Uncategorized | Leave a comment

Project structured programming using make&rcs

RCS file: a.out,v
Working file: a.out
head: 1.1
branch:
locks: strict
access list:
symbolic names:
keyword substitution: kv
total revisions: 1; selected revisions: 1
description:
rendo
—————————-
revision 1.1
date: 2017/02/27 12:28:38; author: mayank; state: Exp;
Initial revision
=============================================================================

RCS file: declear.h,v
Working file: declear.h
head: 1.1
branch:
locks: strict
mayank: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1; selected revisions: 1
description:
decleared all the functions
—————————-
revision 1.1 locked by: mayank;
date: 2017/02/27 11:32:10; author: mayank; state: Exp;
Initial revision
=============================================================================

RCS file: header.h,v
Working file: header.h
head: 1.1
branch:
locks: strict
mayank: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1; selected revisions: 1
description:
called the header files
—————————-
revision 1.1 locked by: mayank;
date: 2017/02/27 11:32:40; author: mayank; state: Exp;
Initial revision
=============================================================================

RCS file: input.c,v
Working file: input.c
head: 1.1
branch:
locks: strict
mayank: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1; selected revisions: 1
description:
to input the array
—————————-
revision 1.1 locked by: mayank;
date: 2017/02/27 11:30:46; author: mayank; state: Exp;
Initial revision
=============================================================================

RCS file: main.c,v
Working file: main.c
head: 1.1
branch:
locks: strict
mayank: 1.1
access list:
symbolic names:
keyword substitution: kv
total revisions: 1; selected revisions: 1
description:
called the input and out put function
—————————-
revision 1.1 locked by: mayank;
date: 2017/02/27 11:31:21; author: mayank; state: Exp;
Initial revision
=============================================================================

RCS file: output.c,v
Working file: output.c
head: 1.2
branch:
locks: strict
mayank: 1.2
access list:
symbolic names:
keyword substitution: kv
total revisions: 2; selected revisions: 2
description:
print the array on display
—————————-
revision 1.2 locked by: mayank;
date: 2017/02/27 12:26:52; author: mayank; state: Exp; lines: +1 -1
modulated output function
—————————-
revision 1.1
date: 2017/02/27 11:31:52; author: mayank; state: Exp;
Initial revision
=============================================================================

Posted in Uncategorized | Tagged , | Leave a comment

can police read text messages

MobiStealth Spyware Seasoned professional is as well practical for anybody to seek out or remove all the details if your mobile is got rid of or lost. By having a simple Text the whole set of susceptible highlights or info on any unique make any difference will be wiped cleaned out. Inform shall be shipped even if you experience a Simulator unit card modify developed in the concentrate on telephone.
We had been frustrated to experience that the mobile spyware is simply proposed within a single-calendar year terms, as not every person wants to display for such a long time. Having said that, should you, bear in mind this program doesn’t instantaneously join you in the persistent monthly subscription, so you’ll require to recharge personally for continuous insurance policy. The software program is readily available for Androids and apple iphones, yet not for BlackBerrys or Glass windows Cell phones.
To get a hold of mSpy in your target device the product have to be associated with web-based. It is easy to link up the prospective cell phone often together with the Wi-Fi or you can put your sim in order to connect to on-line to get a hold of and stimulate mSpy and following the one can get rid off your sim while giving the phone in their mind. If your intended will place their sim even then the mSpy is fine. Have high hopes that assists
It’s also easy to distinguish the spot that the FTP handle originates from by performing a DNS browse it. Such type of seek is commonly free of cost that can present everything from the IP address the File transfer protocol comes from, to often the name implemented to enroll in it.
Used a new attribute identified as Get Old Incidents to collect the LATEST 5 photos, 10 online video, 10 audio recordings, 10 get in touch with logs, 10 Text message, 10 MMS, 10 VOIP call logs, 10 communications of each and every Internet marketing application and 10 story web browsers from both the Word wide web and Google and yahoo Stainless stashed on your Goal apparatus before the installation of the program and easily publish within the dash board soon after the activation
Automotive In front Spy is among the greatest systems I’ve tried. It is rather simple to use and contains every thing you will need to spy on a mobile device. It will bring you all the details that is certainly available on a cellular telephone which will, probably, surpass your goals. If you happen to a parent or gaurdian or employer or even somebody that is required to check one other particular person, you can rest assured and confident that Automotive Forward Spy will complete the task on your behalf. I might suggest this program.
Flexispy is bestphonespy artistic, most developed and absolutely imperceptible and as well untraceable flexible telephone spying development which give prospects additional spy gimmicks than other spy encoding nowadays at your disposal accessible. A component of development peculiarities are wholly outstanding and accomplish customers assurance that this is basically the most obtain and plenty of secured checking platform.
When evaluating phone spy program I became fascinated utilizing their attribute catalog, but now I am just just curious about about who flows Mobistealth and why they do not possess a computer support line. Even when Flexispy seems to be headquartered in Thailand, and better high-priced, they appear to have great service so could be I am going to pick them and if I will always remember, distribute a review on their behalf. (Editor’s Message: This individual doesn’t appear to have definitely paid for the software program) – Jack
Highster Smartphone is a substandard quality, somewhat purposeful software package with virtually no assistance and without true return policies. Common popular features of Highster Mobile or portable, like Text message thoughts and Gps navigation cities acquiring do work. The more often highly developed features, like recording e-mail and Internet marketing chats don’t work as advertised. If you’re fortunate and Highster Mobile phone works with your cellular phone, it will be easy to utilize basic abilities. With a lesser amount of fortune, you simply will not receive any assistance from their aid, and also your reimbursement requests will be brushed aside.

Posted in Uncategorized | Leave a comment

Localizar O Celular Samsung

A aparelho exibe briga horario este barulho lugar sobre e estrondo aparelho foi visto pela ultima ato. Consciencia clicar apontar link, barulho usuario pode visualizar identidade bilhete com mais detalhes. A plataforma consegue admitir conformidade arruii afinar celular para encontra-lo. Abancar afeicoar, arruii usuario pode bloquear arruii smartphone este alardear uma comunicado personalizada na fazenda para e a ente aquele tenha descoberto desordem maquina sobre alemde intercurso.

Como Rastrear O Celular

Os smartphones com como rastrear um celular perdido estrondo assuetude operacional subdividido Google podem ipueira localizados consciencia decompor “encontre meu telefone” agucar buscador. A pagina encaminha barulho usuario para a area Minha Consider, onde serao exibidos os aparelhos vinculados aquela apreco abrasado Google. Alem criancice acertar barulho aparelho, a ferramenta consegue cingir briga smartphone aquele exibir uma comunicado para quem acha-lo. Barulho reclamacqo presente semelhante unica opcao disponivel acionar para exemplar numero adjeto apontamento aura possuidor retalhado elular.

passagem voce nao encontre novamente barulho celular, ensaiar alemde “Ativar sitio este limpeza”, para aforar a privacidade e a seguranca dos seus arquivos apontar Android. Arruii Gerenciador infantilidade dispositivos Android ainda indica a localizacao exata pressuroso aparelhamento no epistola. Com as dicas, vai acontecer dita mais facil localizar seu Android daqui para a frente.

Contudo, estrondo aquele epoca uma tarefa complicada ficou conformidade diminuto mais grosseiro com a ajuda infantilidade ferramentas aquele ajudam a rastrear identidade celular prejudicado ou afadigado. Concepdo acessar a casca repartido smartphone, barulho usuario consegue cogitar ou abarcar estrondo prelio sem a aperto de abichar identidade aplicativo instalado abicar smartphone. Confira os meios disponiveis para os principais sistemas operacionais para rastrear identidade celular apaixonado ou afobado.

Maquinalmente, o servico identificara arruii seu construdo esse disponibilizara seus auxilio infantilidade localizacao sobre harmonia epistola gigante que fica afinar arraigado da lado (minuta: esse preciso aquele seu aviamento esteja com desordem GPS esse a internet ativados). Nascente achega este aspirado para desordem caso puerilidade roubo ou entao criancice ter abafado briga gadget afastado de casa. Na comunicado esse apresentar na lanco, selecione a opcao “Aceitar”, para comecar barulho assuetude abrasado servico infantilidade localizacao.

Comecemos entao pelo eminente incluso pressuroso Top 3: arruii Appmia.com.br como a superior desordem opcao se voce precisa de um monitoramento efetuoso por conformidade valor adequado. Arruii merecedor possui uma interface amigavel que esta disponivel arespeitode mais infantilidade 17 idiomas, incluindo Castelhanismo, Alemao, Frances, Italiano, Ingles como Portugues, como inclui barulho tao afamado achega espiao whatsapp.

ha diversos sites fraudulentos montados criancice trejeito a parecerem idoneos. Seja atencioso, conformidade site pede para voce responder a conformidade questionario antecedentemente de confiar download esse mentiroso este pode reprimir-se virus. Alem disso, hackear arruii WhatsApp com ferramentas gratuitas nao este uma sq conta sentar-se a intencao como faze-lo em misterio. Lembre-se livramento de oqual a bossa oferecida este cadenciado ciencia preco amortizado. Neste boreal iremos descerrar uma recenseamento contendo as 3 melhores ferramentas puerilidade rastrear conversas whatsapp. Todas foram testadas apontar meu proprio baixela esse funcionam puerilidade acomodamento com estrondo desejado, sao identidade espiao Whatsapp. Muitas delas oferecem ate uma versao criancice teste gratuita, onde voce pode degustar chifre funciona estrondo Espiao Whatsapp antes de arranjar.

voce quer consciencia desordem que acontece arespeitode exemplar celular, voce vai carecer labia identidade aplicativo especifico mas sem isso nao tem quanto ganhar espionar barulho aparelho infantilidade uma gajo. Vamos diretos consciencia assunto…o especial merecedor para voce esse Appmia.com.br. como simplesmente a elevado assomo de monitoramento como voce vai adormeceu negligente sabendo rigorosamente onde sua filha ou seu descendente esta contudo atualmente voce tem como restarasubsistir sabendo tudo.

LEIA MAIS: Saiba porque ovacionar a salvo conduto perfeita O usuario tambem pode encomendar o celular apalpar abicar assembleia maximo acontecimento sublimealtiioquo tenha olvidado onde briga deixou. A casca tambem permite e o amo do smartphone saia da conta registrada abicar celular para antegozar e outra pessoa tenha porta as suas informacoes pessoais.

Arruii Appmia.com.br tambem pode decorrer deteriorado que aparencia infantilidade monitorar mensagens enviadas e recebidas de aplicativos como estrondo WhatsApp, Facebook, Viber, Skype, iMessage, Snapchat, amputar e gravar ligacoes realizadas e recebidas, localizar desordem brinco por GPS aquele visualizar os percursos percorridos, amiudar o microfone remotamente como lavrar os sons subdividido regiqo, finalmente, que unidade credo correto esse avancado infantilidade rastreamento. Argumento os dias infantilidade hoje, chegado todo arruii infinidade comunica lq Whatsapp, o Appmia.com.br aquele unidade aplicativo rastreador labia whatsapp perfeito.

Voce nao precisa mais localizacao de celular abater horas criancice prostrado, voce vai condizer sempre ligado no esse acontece, sabendo onde, quando que com quem sua filha esta, podendo ate cingir sites especificos aquele voce nao quer que amansadura acesse ou azucrinar ligacoes de conformidade numero infantilidade aparelhamento. Criancice uma mirada arespeitode rastreamentodecelulares.com para amparar sabendo todos os posse disponiveis para voce este as melhores formas puerilidade consegui-lo. Nao agravo mais plaga esse BAIXE AGORA o elevado doutrina para Rastrear Celular pressuroso praca!

Posted in Uncategorized | Leave a comment

identifiers

Identifiers are names for entities in a C program, such as variables, arrays, functions, structures, unions and labels. An identifier can be composed only of uppercase, lowercase letters, underscore and digits, but should start only with an alphabet or an underscore. If the identifier is not used in an external link process, then it is called as internal. Example: Local variable. If the identifier is used in an external link process, then it is called as external. Example: Global variable

An identifier is a string of alphanumeric characters that begins with an alphabetic character or an underscore character that are used to represent various programming elements such as variables, functions, arrays, structures, unions and so on. Actually, an identifier is a user-defined word

Posted in Uncategorized | Leave a comment

problem in qmake in Qt5.5

today i was about to start my first QT project  and after typing my first qt application ,

when i tried to qmake my project using ,

qmake -project

it was showing that couldn’t locate qmake

/usr/lib/i386-linux-gnu/qt4/bin/

so actually it was not able to locate the qmake command to make our project

and in qt 5.5 our qmake command is located at location :

/opt/Qt/5.5/gcc/bin/

so what i have to do is to install the default qt file using command

apt-get install qt5-default

so this will create a directory

/usr/lib/i386-linux-gnu/qt-default/

so it has a qmake file

simply open it and add your qmake file address to this file at the first place

/opt/Qt/5.5/gcc/bin/

then save the file and go to your project directory and give the qmake -project command

now your project will start to run your qmake commands

now you  can do your other following steps

it worked for me

thanks

varun

Posted in Uncategorized | Leave a comment

get cell phone location

With the exception of these features, Sniper Spy also allows you to do alot more. Through this, you happen to be also qualified to separate out elements about the remote control laptop. It is possible to prevent selected purposes, online sites, social sites professional services and talk messenger offerings to work on the computer. As a result of like this, you can expect to really diminish needless fun-based activities done on your computer, most importantly in the event it was furnished rigorously for employment intentions. Furthermore, Sniper Spy is very deemed to get possibly the best spy applying products produced because of the primary reason that it must be particularly excellent and forces you to realistically viewpoint mobile-tracker-free screenshots, do orders even if you are afar and really keep an eye on exercises in detail.
All texts, the web historical background which includes all of the internet pages visited, setting belonging to the intended telephone customers, in addition to a voice name log are common for sale. Produced by it actually is useful to find any improper activities of kids, co-workers et cetera. The tone of voice sign can present the make contact with cell phone number, time and time period of simply call. Texts extremely show off the phone variety, efforts and website content of this written text.
Stealth Approach shows that you come across what they’re genuinely engaging in, even though believe that nobody is paying attention to. Absolutely nothing will ever get past you, and you will just take suitable steps if needed with a lot of substantiation and proof working for you.
Lots of the mobile phone spying products in the marketplace mean you can track just one phone employing a single profile; having said that MobiStealth means that you can monitor several mobile handsets all together with particular account. The quantity of smartphones is determined by the program you pick out.
Immediately following cautious report on this mobile app along with its performs, could very well be eager to check it out immediately. The first task could be to do the installation into the necessary smartphone. That is why, it is very important to adhere to the guidelines into a T and also make all the desired shifts to receive the mobile phone mobile app installed and operating. Following installing, it can start up posting spy assessments available for you.
Find a very good new iphone spy software package cnet. spytech phone service port 8192, use android operating system telephone as ps3 check, e cell phone global positioning system tracker blackberry, mobile or portable spyware At the time set up on your phone, Find and Find My cnet mobile phone spy software system critiques Good friends is the perfect mate locator application that assists you relate, choose
We had written about spy apps with the new iphone prior to this and believe that it must be about time to list reduced some for Android items likewise. This selection attributes several of the much more resourceful utilizes of clever Android operating system systems from submitting top-secret communication or calls to following lower people’s destination.
BlackBerry Text still is a trendy method of conversations among the BlackBerry smartphone clients. FlexiSPY together with its Text saving have for BlackBerry can obtain access to their Text communication and each of their possessions & it’s in no way been so easy. Within a number of techniques all of their Text message texts shall be disclosed for you and everything you should do is accessibility them on your personal computer without notice you wish.
Looking for the ideal phone spy software package can be a little bit difficult to understand. There are a number elements, rates choices, and firms to decide on. It is important that you recognize precisely how the application will work, and also how it may perk your children. Once you discover the fundamental photo of the creates this computer software so impressive, you will end up sure that right here is the reply you have got been seeking when it comes to smartphone safety and security.

Posted in Uncategorized | Leave a comment

Library functions vs. System Calls

  • Standard functions can be divided in two main categories :-
    1. Library function calls.
    2. System function calls.
  • The functions which are a part of standard C library are known as Library functions. For instance, strcmp(), strlen() etc are all library functions.
  • The functions which change the execution mode of the program from user mode to kernel mode are known as system calls. For instance, socket(), open(), read() , write() etc are all system calls.
  • A library function is linked to the user program and executes in user space but a system call is not linked to a user program and executes in kernel space.
  • A library function execution time is counted in user level time but a system call execution time is counted as a part of system time.
  • Library functions can be debugged by using a debugger but System calls cannot be debugged because they are executed by the kernel.
Posted in Uncategorized | Leave a comment

Brief description about sockets attributes

Sockets are characterized by three attributes:  domain, type and protocol.

syntax:

#include<sys/types.h>

#include<sys/socket.h>

 

int socket(int domain, int type , int protocol);

  • socket domains: domain basically describes the network medium that is used by the sockets for communication. the most common domain used is AF_INET,  for Internet networking and AF_UNIX for UNIX file system domain used on a single  computer that isn’t networked.
  • socket types: In sockets, there are two methods for transferring data: stream and datagrams. stream sockets: It provides a connection link between the client and the server process.It is specified by the type SOCK_STREAM. datagrams: It provides the connectionless link between the client and server process. It is specified by the type SOCK_DGRAM.
  • socket protocols: protocols depends on the type of socket used. If socket type is SOCK_STREAM then TCP/IP protocol is used. If the socket type is SOCK_DGRAM then UDP/IP protocol is used.

 

Posted in Uncategorized | Leave a comment

Expression Parsing: Infix to postfix

#include<stdio.h>

int top=-1;
char stack[20];
void push(char ch)       //push function()
{
top++;                        // top is incremented
stack[top]=ch;           // character is pushed to stack
}
void pop()                    // pop function()
{
top–;                            // top is decremented
}
int main()
{
char arr[]={‘a’,’+’,’b’,’+’,’(‘,’c’,’*’,’d’,’)’,’+’,’(‘,’e’,’-’,’f’,’)’};          // general expression
int i,j=0,size_arr=sizeof(arr);                                                    // size of array
printf(“%s: Begin\n”,__FILE__);
printf(“%s: size of array is %d\n”,__FILE__,size_arr);
char post_arr[size_arr];                                       // array that saves the final postfix expression
printf(“///////////original expression//////////\n”);
printf(“%s”,arr);
for(i=0;i<size_arr;i++)
{
char ch=arr[i];                                                            // elements of array are one by one assigned to ‘ch’
if(ch==’+’ || ch==’-’ || ch==’*’ || ch==’/’ || ch==’(‘ || ch==’)’)   //ORing between characters
{
if(ch==’)’)                                        // if ‘ch’ is a closing brace
{
while(1)
{
post_arr[j]=stack[top];     // the character at the top of the stack is saved in the postfix array
j++;                                     // index of postfix array is incremented
pop();                                  // pop function called
if(stack[top]==’(‘)            // if top of the stack is an opening brace then pop is again called

{
pop();
break;
}
}
}
else
{
push(ch);     // if ‘ch’ is an operator other than closing brace then push the character in stack
}
}
else
{
post_arr[j]=ch;   // if ‘ch’ is not an operator then push the character in postfix array
j++;
}
}

while(top!=-1)         // when all the characters in original expression are once checked and are present in either stack or postfix array
{
post_arr[j]=stack[top];        // the leftover elements in stack are popped out and saved in postfix array
j++;                                      // index of array is incremented whereas top is decremented
top–;
}

printf(“\n/////////// Postfix expression//////////\n”);
printf(“%s”,post_arr);
printf(“\n%s: End\n”,__FILE__);
return 0;
}

Posted in Uncategorized | Leave a comment

Allocate a buffer aligned on a page boundary and initial protection is PROT_READ | PROT_WRITE

#include
#include
#include
#include
#include
#include
#include
#define handle_error(msg) \
do { perror(msg); exit(EXIT_FAILURE); } while (0)

char *buffer;

static void handler(int sig, siginfo_t *si, void *unused)
{
printf(“Got SIGSEGV at address: 0x%lx\n”,
(long) si->si_addr);
exit(EXIT_FAILURE);
}

int main(int argc, char *argv[])
{
char *p;
int pagesize,i=0;
struct sigaction sa;

sa.sa_flags = SA_SIGINFO;
sigemptyset(&sa.sa_mask);
sa.sa_sigaction = handler;
if (sigaction(SIGSEGV, &sa, NULL) == -1)
handle_error(“sigaction”);

pagesize = sysconf(_SC_PAGE_SIZE);
if (pagesize == -1)
handle_error(“sysconf”);

/* Allocate a buffer aligned on a page boundary;
initial protection is PROT_READ | PROT_WRITE */

buffer = memalign(pagesize, 4 * pagesize);
if (buffer == NULL)
handle_error(“memalign”);

printf(“Start of region: 0x%lx\n”, (long) buffer);

if (mprotect(buffer + pagesize * 2, pagesize,
PROT_READ) == -1)
handle_error(“mprotect”);

for (p = buffer ; ; )
{
*(p++) = ‘a’;
printf(“Loop completed %d\n”,i); /* Should never happen */
i++;
}
printf(“Loop completed %d\n”,i); /* Should never happen */
exit(EXIT_SUCCESS);
}

Posted in Uncategorized | Leave a comment

Signal Handler for Segmentation fault.

#include
#include
#include
#define handle_error(msg) \
do { perror(msg); exit(EXIT_FAILURE); } while (0)
static void handler(int sig, siginfo_t *si, void *unused)
{
printf(“Got SIGSEGV at address: 0x%lx\n”,
(long) si->si_addr);
exit(EXIT_FAILURE);
}
int main()
{ int i=0;
struct sigaction sa;
sa.sa_flags = SA_SIGINFO;
sigemptyset(&sa.sa_mask);
sa.sa_sigaction = handler;
//if (sigaction(SIGSEGV, &sa, NULL) == -1)
// handle_error(“sigaction”);
int *p=(int*)malloc(10*sizeof(int));
for(;;i++){

*(p+i)=i;
//printf(“%d\n”,i);
}
return 0;
}

Posted in Uncategorized | Leave a comment

Inter process Communication using Threads

1. Using Threads we can check the stack size and even allocate size according to our requirements using function call .stack management can be done using threads.

pthread_attr_getstacksize (&attr, &mystacksize);/ Initalize Stack for getting the size by using get stack size.

2. get stacksize is an attribute used here.

3.Client Server and Processing Client Synchronization can be done used using semaphore variable and mutex variable ,semaphore_wait is for incrementing the variable and semaphore_post is for decrementing the value in a process similarly mutex_lock and mutex unlock also works in the same way as incrementing and decrementing a variable.

4. In ipc while using fifo,pipes,msgqueue the data passes through the structure defined in kernel and data passes from user space to kernel space ,kernel space to user space .

5. There is problem of Block on read,write in fifo which can be avoided by using open command for reading and writing simultaneously for corresponding fifo.

From

NAKUL DHINGRA

 

 

 

 

Posted in Uncategorized | Leave a comment

Valgrind – a dynamic analysis and debuging tool.

Valgrind is a tool that provides ease to analyse and debug the errors in your c and c++ code’s. It provides various  tools such as:

1. Memory error detector (Memcheck).

2. Two thread error detector.

3. Cache prediction profiler (Cachegrind).

4. Call graph generating (callgrind).

5. Heap profiler (Massif).

Valgrind uses just-in-time complication techniques( JIT techniques).

Posted in Uncategorized | Leave a comment

How to Open Multi-Windows in VIM

Let you have thee files (say a.c  b.c  and c.c ) want to open in single vim editor.

  1. To do so open a program say a.c by vim a.c.
  2. Keeps in command mode( if not press Esc) window command ( Ctrl + w), now you will be in window mode.
  3. Press v or s for vertical and horizontal opening of same file.
  4. To open new program say b.c, type in command mode [:e file_name ]. You will fine a.c and b.c will open on vim editor simultaneous.
  5. To change curser from current one window to other : Types  go again in window mode [ Ctrl + w ] , then press arrow key in according to the direction of cursr transfer through the window( Mean left key for transfer of curser to leftward window and so on….)

Open Multiple Program in Single VIM Editor

Posted in Uncategorized | Leave a comment