Observing Operating System Behavior using /proc
ثبت نشده
چکیده
What is a /proc File System? : The /proc file system isn't a file system in the standard sense. Rather, the /proc file system is an interface to the address space of running processes. With /proc, you can use standard UNIX system calls (e.g., open(), read(), write(), and ioctl()) to query or manipulate the processes' address space. In fact, the Solaris ps(1) command uses /proc to determine the status of the processes listed in the process table.
منابع مشابه
SUGI 27: Analysis of Complex Sample Survey Data Using the SURVEYMEANS and SURVEYREG Procedures and Macro Coding
The paper presents the defining characteristics of complex sample surveys and demonstrates the use of PROC SURVEYMEANS, PROC SURVEYREG, and SAS® macro coding to correctly analyze these data. Means, Linear regression, and Logistic regression are programmed and run assuming a simple random sample and a complex sample design. The analytic techniques presented can be used on any operating system an...
متن کاملAdsorption Removal of Humic Acid from Water Using a Modified Algerian Bentonite
In this study, the main objective is the preparation and the characterization of a modified Algerian bentonite based adsorbent by intercalation with hexadecyltrimethylammonium bromide (HDTMA). Natural and modified bentonites were characterized using thermogravimetric analysis (TGA), X-ray diffraction (XRD) and infrared spectroscopy (FTIR). The X-ray results indicate that the geometry of the int...
متن کاملGray-Box Anomaly Detection using System Call Monitoring
Many host-based anomaly detection systems monitor a process by observing the system calls it makes, and comparing these calls to a model of normal behavior for the program that the process is executing. In this thesis we explore two novel approaches for constructing the normal behavior model for anomaly detection. We introduce execution graph, which is the first model that both requires no stat...
متن کاملTowards Disk-Level Malware Detection
Disk drive capabilities and processing power are steadily increasing, and this power gives us the possibility of using disks as data processing devices rather than merely for data transfers. In the area of malicious code (malware) detection, anti-virus (AV) engines are slow and have trouble correctly identifying many types of malware. Our goal is to help make malware detection more reliable and...
متن کاملTransient thermal study of recuperative tube in tube heat exchanger operating in refrigeration system using experimental test and mathematical simulation
Joule-Thomson cooling systems are used in refrigeration and liquefaction processes. There are extensive studies on Joule-Thomson cryogenic systems, but most of them coverage steady state conditions or lack from experimental data. In the present work, transient thermal behavior of Joule-Thomson cooling system including counter current helically coiled tube in tube heat exchanger, expansion valve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006