Questions tagged [unix]
Unix is a multitasking, multi-user computer operating system originally developed in 1969.
58 questions
0 votes
1 answer
237 views
Using sed/awk to bulk generate static HTML pages off of a template
Hypothetically, consider a social photo platform - each pic gets its own url, this page contains the image, text about the image, buttons for the user to click, related pics, and some user-specific ...
1 vote
0 answers
109 views
Inter-Process Communication: Stream data from single writer process to multiple reader processes
tl;dr - I want to stream text data from one writer process to multiple reader processes. I'm thinking of using a file to achieve this. Is it a good idea? Using a file would avoid having to maintain ...
0 votes
0 answers
99 views
Design time based job scheduler
Currently, I have a script install_crontab.py -u <user> -c <config> This script takes care of installing cron job that runs as a given user. In my install_crontab script, I check (using ...
-1 votes
2 answers
110 views
commonly used practices for deploying package primarily composed of bash scripts
I am working on a tool that primarily uses bash scripts and C++ code. Generally I have experience with basic tools written in C and C++ in which we can have a build system like ./configure; make; ...
-3 votes
3 answers
796 views
Ken thompson's compiler hack [duplicate]
I have gone through ken thompson's compiler hack paper, can't we just go through the complier's source code and check for any backdoor, what was the article's point? https://www.archive.ece.cmu.edu/~...
0 votes
0 answers
115 views
Cycle accuracy through the use of a microtable for an 8 bit CPU emulation?
I'm in the process of writing a 8 bit cpu emulator and currently have a jump table for different opcodes. I want to move this over to be cycle accurate and was wondering what the best approach would ...
2 votes
2 answers
716 views
Ken Tompson Hack [duplicate]
I understand Ken Thmpson hack involved like someone has mentioned on here he hacked /bin/login to introduce a backdoor. he did this by hacking the compiler to introduce the backdoor into a binary ...
1 vote
1 answer
105 views
What criteria should I use for determining whether or not to terminate a daemon (to restart it later)?
Should a daemon, forked from a CGI script (whenever the CGI script is called and the daemon is not yet running), hang running (most of the time just waiting for a connection) all time, or should it be ...