|
I like the answer that Mike gave you, but it needs a bit more detail to fulfill what you're asking. No matter what level of language you use to attack a problem, at some point the solution has to be translated into a pattern of ones and zeroes that a specific CPU can interpret and execute. That's the assembler's job. Each CPU on the market has a unique instruction set, which is defined as a set of binary numbers which cause the CPU to execute specific instructions. In reality, the binary number is an address which points to a starting point in the CPU Control Store that contains the binary switching information necessary to execute the specified instruction. In practice, what we see is an opcode, plus 0 or more operands contained in memory.
For example, for the old Intel 8080 CPU, a Jump instruction was defined as the hex value 0xc3, followed by two bytes of address data. When the program counter found the byte 0xc3, it then looked for two bytes of address data in the next two contiguous bytes of RAM, then transferred execution to the instruction at that address. The Assembler program takes care of filling that memory address with the proper binary data by using #define statements to assign specific values to variables, as in
#define Target 0x100
JMP Target
which would cause program execution to jump to the instruction located at 0x100.
Assembly programming requires an intimate knowledge of the target hardware and its internal structure. High level languages relieve us of that requirement, and make life much easier by abstracting the details of implementation so that we no longer have to worry about which registers are available, and whether memory addressing is high-Endian or low-Endian (Intel quirks). Using high level languages makes life a whole lot easier for all of us except those who have to worry about the details.
Voltage requirements are beyond the need-to-know threshold for programmers. If you can get the proper ones and zeroes into memory, we hardware types will take care of the rest. I strongly believe that a programmer who understands how the target hardware works will be a better programmer, but I think that I'm in a small minority group here - you decide. But I'm proud of you for wanting to understand. No knowledge is ever wasted...
"...putting all your eggs in one basket along with your bowling ball and gym clothes only gets you scrambled eggs and an extra laundry day... " - Jeffry J. Brickley
|
|
|
|
|
Hi all,
does WinXP provide a way to automate "Defrag"? It could be done by creating an script and schedule it to be executed at a certain time but, in a computer running 24x7, the best way should be to run defrag in background mode when the resources load is low or when there's no HDD requests from the applications. I know that there are some commercial products that perform that but I'd like something provided by WinXP itself ... or free???
Thanks,
Marc Soleda
|
|
|
|
|
Never heard about automatic defrags..
Don't try it, just do it!
|
|
|
|
|
|
Thanks, I'll keep in mind to apply it another time
... she said you are the perfect stranger she said baby let's keep it like this... Dire Straits
|
|
|
|
|
You are wellcome
|
|
|
|
|
We are creating a simulation environment where the user will be creating input data sets for hundreds of individual 3D atmospheric simulations. Each individual simulation takes between 1-3 hours to run to completion on a 3GHz machine. The simulation code is old Fortran executables invoked from Python scripts.
The computing environment is a "loose" cluster of ordinary PC's running Windows/XP Pro with a few off-the-shelf 1 Gigabit 10BaseT switches to connect it all together. One machine shares a large data disk to all the other "cluster" members to provide a common rooted file system.
The current plan is to use Condor as the Batch engine.
Does anyone on this board have any opinions or thoughts about this configuration??
Cheers... Martin
|
|
|
|
|
I have an e-mail 2 mega and i want to make it 250 mega . can you help me ?
|
|
|
|
|
when you say "e-mail", you talk about the document you send to somebody, or the mail box ?
TOXCCT >>> GEII power [toxcct][VisualCalc]
|
|
|
|
|
Of course no, he means that he wants his hotmail account to be 250 mb :->
Some folish questions is being asked here .
|
|
|
|
|
i was lookinf for any relation with the forum theme...
hum, he's definitely off topic, and i don't know how to help him on that so...
TOXCCT >>> GEII power [toxcct][VisualCalc]
|
|
|
|
|
toxcct wrote:
and i don't know how to help him on that so...
Don't ,
|
|
|
|
|
Select state USA and then Alaska ZIP Code is 99559 then clikc update.
1. U should wait 30 days to get 250MB
2. Sign Out by rulers (by clicking button SingOut which is top of the window) then sign in again by rulers type your e-mail and password maybe this will get atuomaticlly 250MB for your Inbox.
|
|
|
|
|
|
Hello,
I need to recover the content of a deleted encrypted file from a NTFS volume. I can read the file's content by directly accessing the volume (reading and decoding MFT, data runs and all that candy). I see that encrypted files have a named NTFS attribute of type LOGGED_UTILITY_STREAM (name is $EFS). I need to interpret the content of this, the goal being to obtain the (encrypted) FEK (file encryption key).
From the info I could gather so far, this data consists of:
struct EFS_INFO_HEADER
{
DWORD m_dwSize;
DWORD m_dwVersionMinor;
DWORD m_dwVersionMajor;
DWORD m_dwUnknown1;
BYTE m_Checksum[32];
BYTE m_Unknown2[36]; // this somewhere contains the count of following DDF
entries
// the DDF entries
// count of DRF entries
/// the DRF entries
};
struct EFS_ENTRY_HEADER
{
BYTE m_Unknown1[64];
};
struct EFS_DDF_ENTRY
{
EFS_ENTRY_HEADER m_Header;
// container name
// crypto provider name
// EFS certificate hash
// encrypted FEK
};
struct EFS_DRF_ENTRY
{
EFS_ENTRY_HEADER m_Header;
// container name
// crypto provider name
// EFS certificate hash
// encrypted FEK
};
Anyone knows more about these structures, where are they defined, where can I find more about them? Some of these structures seem to have members that are sometimes missing, and I cannot decide how to handle this. Any info, hint, pointer in the right direction would be welcome. Thanks a lot.
Regards,
Levente
------------------------------------------->>
Life is tough. Then die you do. [Yoda]
|
|
|
|
|
While struggling to solve this problem I found another approach. This leaves me with two possible solutions, unfortunately both are crippled by the lack of information:
1. Either I read and parse the file's LOGGED_UTILITY_STREAM NTFS attribute (named $EFS), then I recover the encrtypted FEK from there (and then decrypt the FEK, etc.). The problem here is that even if in "Inside Windows 2000" the general structure of the $EFS attribute is described, I cannnot find precise documentation (a structure definition would be good!) for it (e.g. some fields may be missing and so on). After looking at hundreds of encrypted files, I still cannot empirically deduce this structure.
2. Either I use the WriteEncryptedFileRaw API and then I feed it with the necessary data in the callback function, essentially attempting a restore directly from the deleted file. Again, I see by attempting to use ReadEncryptedFileRaw that the data this API stuffs into my callback function on backup is some header, followed by the $EFS attribute (slightly modified!), then some addional data, probably another header, then the encryped content, interrupted every now and then by some unknown data. I have no documentation for any of these.
Anyone could give me a hand here, guys?
Levente
------------------------------------------->>
Life is tough. Then die you do. [Yoda]
|
|
|
|
|
hii guys :
i have an limited account on my computer and i want to change it into administrator ,please help me .
|
|
|
|
|
Omar _ wrote:
and i want to change it into administrator
programmatically ??
otherwise, you go to : "config panel" > "Admin tools" > "Cpu managment" > "users"
there choose your user and move it to the group you want. off course, to do this, you must be logged as an administrator, or at least whatever user that is allowed to change user rights...
TOXCCT >>> GEII power [toxcct][VisualCalc]
|
|
|
|
|
Omar _ wrote:
i have an limited account on my computer and i want to change it into administrator ,please help me
Programmatically:-
http://www.codeproject.com/internet/caanetadminclass.asp[^]
"Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
cheers,
Alok Gupta
|
|
|
|
|
hi
i want to know what is the name of exe file that executes the programs.sometimes programs himselft start running how it is possible.
ddd
|
|
|
|
|
If you have the shortcut of the an application that is running try to right click on that shortcut and go to property command and click on the shortcut tab. Than you will see the target file that is run the application.
For the an application that run automatically is base on the setting of the owner of the software. Some software, user start it via the task manager or draft a shortcut to the startup folder. Some application is designed as the windows services application which will run automattically when the windows start.
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
I was wondering, if it is possible, to create "rules", that if the recipient belongs to a specific domain, it could be routed to a specfic SMTP server. For example, my mail srever is mail.example.com, and the user are all, bill@example.com, mary@example.com etc. If bill where then to send a mail to bill@txt.example.com, I would like my mail server to relay this (and all other mails *@txt.example.com) to a specific IP address (SMTP server). I have no experence with this, but I need to set it up to do some testing. (I´ve already rtfm, and I´m no wiser )
Thanks for any help or suggestions in advance
Phil
bum... and I thought I´d got rid of all the bugs
|
|
|
|
|
I have several clients which will connect to the communication server via DUN(dial up networking). The client make some request to the communication server after that the client gets disconnected.
Now after some time the communication server gets the information regarding the request and wants to deliver it to the client which has made the request. Now keep in mind that the ISP may differ. Now i want to deliver the message to specific ATM terminal....
So how can i know which client has made the requset? Any solution?
Thanks in advance.
Regards,
J Sachin
|
|
|
|
|
I want to know as to where can i find the log file for the currently running processes. i want to create a daemon that tells me how long a particular process has been active for, something like the system task manager. please help me out.
anurag
|
|
|
|
|
hi anuraga02, an this page: http://agerman77.blogspot.com you can find some example. It really shows how to list processes by a specific name, but it may give you an idea. The web site is in spanish. With the System.Diagnostics.Process class you can do all that you ask for.
Hope it helps.
Alexander German
|
|
|
|