初心易得,始終難守
C'est la vie.© 2002 - 2026
  • 我是誰-Who Am I
  • 我在哪-Where Am I
  • 我是什麼-What Am I
  • 年鑑-YearBook
    • 二零零六年终总结
    • 一吻定情—二零零八年年终总结
    • 突如其来的明天—二零零九年年终总结
    • 人生大起大落得太快——二零一零年年终总结
    • 贰零①①年年终总结-女朋友已经成家了
    • 贰零壹贰年年终总结-奔波的肿瘤
    • 贰零壹叁年年终总结
    • 雪字怎么写-贰零壹肆年年终总结
    • 每个不曾表白的今天,都是对青春的亏欠-贰零壹伍年年终总结
    • 按部就班的IT 人生-貳零貳肆年年終總結
    • 真正的閱讀-貳零貳伍年年終總結
  • 連結
RSS
2 月 25 日, 2010 年

FreeBSD & Broadcom Netlink Ethernet Driver

Ken Tech 5 Comments

近日在戴尔的机器Optiplex380上装Freebsd的时候发现,又是Broadcom的网卡,每次都是Y出问题,官方根本就不带驱动的~搜索了一下,在论坛上居然有解决方案:

https://forums.freebsd.org/showthread.php?t=6081

但支持的芯片组是BCM5761,BCM5784,BCM5785,并没有Optiplex380上的BCM57780,因为57780和5784,5785是一个系列的,根据我英明的估计和大胆的猜测,把patch文件打开看了一下:

http://nccs.christian.net/bge_bcm5784_patch.htm

里面果然有关于57780的字段,


接下来的事情就很简单了,用优盘把两个patch文件拷到电脑上,

Mount -t msdosfs /dev/da0s1

打patch,重新编译内核,reboot,OK~

cd /usr/src/sys/dev/bge
patch < /root/patchbge.patch
cd /usr/src/sys/dev/mii
patch < /root/patchmii.Patch
cd /usr/src/sys/i386/conf/
config kernel

2 月 22 日, 2010 年

昨夜无眠

Ken 隨筆 0 Comments

昨天晚上失眠,半梦半醒的,直到我最后一次看表,三点三十分。

下班的地铁一号线上,前面两男一女,一个男人拿着黑色PSP,打着中文版三国志,一个女人拿着带有保护胶套的诺基亚手机,正在用手机扣扣问她男人今天晚上买了什么吃的回去,一个男人拿着看似Lenovo标志的山寨机,快速翻阅着今天和以前的收到的中国移动手机报。兜售报纸的小贩居然在这个时间也来凑热闹,一边大喊着:成龙自杀了,一边挥舞着手中的报纸。

我就说新版的《大侦探福尔摩斯》的男主角看着很面熟,今天看到宣传海报,才发现就是《钢铁侠》的男主角,我觉得《大侦探福尔摩斯》的唯一缺憾就是美国口音太多,如果都是英国口水音,那就比较完美了,比如b(o)ye-b(o)ye这样的。

过年的时候买了两瓶红酒,今天晚上喝掉了半瓶,洗澡的时候走路似乎有点歪。以前在宜家买的开红酒瓶的不锈钢钻刀带回重庆没拿过来,只好找了一颗长长的螺丝钉,和改锥,扳手,一点点利用杠杆作用把瓶塞撬了出来。

2 月 21 日, 2010 年

蹦极

Ken 隨筆 勇君, 小柔, 布布, 珊珊 0 Comments

我以为每天晚上都吃得很多,把前面一个月的小票都收集起来准备去开发票,发现不过也就三百多块,每年天气转暖的时候,我的胸口就会有撕裂般的剧痛,持续数日,终会归于平静,一度被诊断为肋间神经痛,如我一般珍视所有体验的人,自然不会认为痛苦是不应该承受的恶果,只是,这种漠然实在不是一种正常的态度而已。

前段时间开Jimmy的重庆女子闹离婚,一个人赌气跑到外面的酒店住了几天,老是跟我讨论离婚了怎么办这个问题,我总是用离婚了儿子怎么办来回答她。阿彬今天中午吃饭的时候拿蹦极做例子来说明男女之间思维方式的不同,女人们走到蹦极的塔下,总会说不要去了不要去了好危险,男人们走到蹦极的塔下,总会说这有什么危险的上去看看,等到爬上塔去,女人们总会义无反顾的直接跳下去,男人们总会说到底要不要跳,好像有点危险。

在事件可能发生之前,女人比男人富有想象力,而且这种想象力的倾向通常都是悲观的,在受到男人的鼓励和吹捧之后,女人会用这种想象力增加自己的信心,决心,毅力。在最终决断的时候,女人不会考虑可能产生的后果,因为之前她已经想过太多不好的结局,她不知道会产生什么样的结果,可能会产生不好的结果,但也可能产生很好的结果,男人这个时候就会迟疑了,在面对即将可能真正产生失去的关口,他会权宜得失。

过年的时候武汉文艺女青年说她被她老汉扇了一巴掌,原因是她在家看起来太高兴了,上交给父母的红包也不够多。当然,这不是根本的原因,根本的原因是家人的疾病一直在消耗着这个普通农民家庭的积蓄,而她在家表现得太过高兴,自然会让父亲愤怒,认为她体会不到家庭的艰辛。去年我在重庆半岛咖啡的时候,跟已经是重庆联通副总的小淫虫讨论他曾经一夜情的那些女人,他说曾经觉得有个喜欢的女人,很早就死了父亲,母女相依为命长大,觉得她很可怜,想要给她一些帮助,却不知道该怎么办。我对他说,这个世界本来就是不公平的,也有很多的可怜人,你不可能帮得过来的,因为,那是她们的命运,如果你不确定能给她一个更美好的人生轨迹,就不要去插手,更何况,那个所谓“更美好”的人生轨迹,也只是你一厢情愿而已。

2 月 20 日, 2010 年

域名邮箱

Ken 隨筆 0 Comments

岁月如飞刀,刀刀催人老,因为我实在是想不出我一旦晚睡就会耳鸣的症状所出为何,只能将它暂且归咎于高血压的可能,我现在才想起为什么老汉总是要吃安眠药才能睡着。当年拍桌子掀板凳也不见得有这么明显的症状,靠,也许是因为太久没拍桌子掀板凳了吧,应该偶尔要扩张一下血管才对。

开始上班了,老是想睡觉,办公室的装修污染还是太大,呆了半天就明显觉得没有住所呆着舒服,趁明天还没几个人把窗户全打开通风,地铁上的人已经开始多了起来,只是还灭有恢复到那么高的密度,天气还没完全转暖,就已经有很多MM开始穿丝袜了,只不过还是很让人伤心。

关于域名邮箱,现在已经有很多服务提供商,收费的就不说了,总有人愿意花钱买安心嘛。免费的三个,Hotmail,Google apps,QQmail,首先,hotmail和gmail是同一类型,为独立的域名邮箱,QQmail则是为一些已经存在的QQ邮箱添加别名,这就决定了,QQmail绝不可能推出企业版,因为有很多的管理功能,它以别名来做,是做不到的。单凭可添加的用户数量而言,hotmail最多,可以添加五百个,其次是gmail,五十至一百个,最少的是QQmail,只有三十个。就管理功能而言,gmail的最丰富,这毫无疑问,对于企业应用而言,gmail是最好的选择,hotmail的管理功能也不少,但大多不在重点上,最关键的是居然不能修改用户密码,只能选择删除用户,QQmail则几乎没有任何管理功能,因为它只是一个现存QQ邮箱的别名。但,gmail不支持cn域名,这也是hotmail和QQmail至今还得以存活的重要原因之一。所以呢,三十人以下的小公司,完全可以使用QQmail中的域名邮箱来建立自己的企业电子邮件服务,缺点是没有邮件列表,没有管理功能,只是大家互相发发邮件。三十人以上五十人以下,域名非cn的公司呢,可以考虑使用gmail的免费标准版,用户管理,协作功能会强大很多,hotmail就不要考虑了,微软那帮人就是脑子缺根筋,做互联网从来都做不好。

2 月 19 日, 2010 年

Two Chinese Schools Said to Be Tied to Online Attacks

Ken 我的祖国 0 Comments

老实说,第一次看见中文的新闻,我以为是蓝翔技校在炒作,于是跑到NYT网站上看了一下英文原文,你看国内这些人,转载的时候老是断章取义,转载前面一半,后面一半就不管了,而且总是把关键的部分省略掉。总的来说,NYT这篇新闻呢,猜测的成分居多,满篇都是不明人士,不明的Ukrainian professor,不明的leading professor,不明的Mr.Shao,把百度也栽赃了一把,即使百度本来就很符合中国国情,最后看到联合署名,这多半是国内的几个NYT线人乱编出来的新闻,世风日下。

如不明的leading professor所说,利用校园网发动对国外网站的攻击是常有的事情,校园网的国际出口太富余了,我也很惭愧的表达一下以前在学校也被来自俄罗斯的黑客们黑过很多次,被上传了个木马啊,文件管理器什么的,虽然是程序的溢出,不是服务器环境的问题,但是,把问题的产生全部推托给程序漏洞是不太合理的,服务器环境理应给出一个safe mode或者说jail mode,即使程序有漏洞也不能进行更多的违规操作,但通常这都是很理想化的状态,因为这样会导致应用系统整体运行效率的降低,鱼和熊掌不可兼得啊。

—http://www.nytimes.com/2010/02/19/techn … china.html—
Two Chinese Schools Said to Be Tied to Online Attacks

SAN FRANCISCO — A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including one with close ties to the Chinese military, say people involved in the investigation.
James C. Mulvenon said the Chinese government often used volunteer “patriotic hackers” to support its policies.
They also said the attacks, aimed at stealing trade secrets and computer codes and capturing e-mail of Chinese human rights activists, may have begun as early as April, months earlier than previously believed. Google announced on Jan. 12 that it and other companies had been subjected to sophisticated attacks that probably came from China.
Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks. Until recently, the trail had led only to servers in Taiwan.
If supported by further investigation, the findings raise as many questions as they answer, including the possibility that some of the attacks came from China but not necessarily from the Chinese government, or even from Chinese sources.
Tracing the attacks further back, to an elite Chinese university and a vocational school, is a breakthrough in a difficult task. Evidence acquired by a United States military contractor that faced the same attacks as Google has even led investigators to suspect a link to a specific computer science class, taught by a Ukrainian professor at the vocational school.
The revelations were shared by the contractor at a meeting of computer security specialists.
The Chinese schools involved are Shanghai Jiaotong University and the Lanxiang Vocational School, according to several people with knowledge of the investigation who asked for anonymity because they were not authorized to discuss the inquiry.
Jiaotong has one of China’s top computer science programs. Just a few weeks ago its students won an international computer programming competition organized by I.B.M. — the “Battle of the Brains” — beating out Stanford and other top-flight universities.
Lanxiang, in east China’s Shandong Province, is a huge vocational school that was established with military support and trains some computer scientists for the military. The school’s computer network is operated by a company with close ties to Baidu, the dominant search engine in China and a competitor of Google.
Within the computer security industry and the Obama administration, analysts differ over how to interpret the finding that the intrusions appear to come from schools instead of Chinese military installations or government agencies. Some analysts have privately circulated a document asserting that the vocational school is being used as camouflage for government operations. But other computer industry executives and former government officials said it was possible that the schools were cover for a “false flag” intelligence operation being run by a third country. Some have also speculated that the hacking could be a giant example of criminal industrial espionage, aimed at stealing intellectual property from American technology firms.
Independent researchers who monitor Chinese information warfare caution that the Chinese have adopted a highly distributed approach to online espionage, making it almost impossible to prove where an attack originated.
“We have to understand that they have a different model for computer network exploit operations,” said James C. Mulvenon, a Chinese military specialist and a director at the Center for Intelligence Research and Analysis in Washington. Rather than tightly compartmentalizing online espionage within agencies as the United States does, he said, the Chinese government often involves volunteer “patriotic hackers” to support its policies.
Spokesmen for the Chinese schools said they had not heard that American investigators had traced the Google attacks to their campuses.
If it is true, “We’ll alert related departments and start our own investigation,” said Liu Yuxiang, head of the propaganda department of the party committee at Jiaotong University in Shanghai.
But when asked about the possibility, a leading professor in Jiaotong’s School of Information Security Engineering said in a telephone interview: “I’m not surprised. Actually students hacking into foreign Web sites is quite normal.” The professor, who teaches Web security, asked not to be named for fear of reprisal.
“I believe there’s two kinds of situations,” the professor continued. “One is it’s a completely individual act of wrongdoing, done by one or two geek students in the school who are just keen on experimenting with their hacking skills learned from the school, since the sources in the school and network are so limited. Or it could be that one of the university’s I.P. addresses was hijacked by others, which frequently happens.”
At Lanxiang Vocational, officials said they had not heard about any possible link to the school and declined to say if a Ukrainian professor taught computer science there.
A man named Mr. Shao, who said he was dean of the computer science department at Lanxiang but refused to give his first name, said, “I think it’s impossible for our students to hack Google or other U.S. companies because they are just high school graduates and not at an advanced level. Also, because our school adopts close management, outsiders cannot easily come into our school.”
Mr. Shao acknowledged that every year four or five students from his computer science department were recruited into the military.
Google’s decision to step forward and challenge China over the intrusions has created a highly sensitive issue for the United States government. Shortly after the company went public with its accusations, Secretary of State Hillary Rodham Clinton challenged the Chinese in a speech on Internet censors, suggesting that the country’s efforts to control open access to the Internet were in effect an information-age Berlin Wall.
A report on Chinese online warfare prepared for the U.S.-China Economic Security Review Commission in October 2009 by Northrop Grumman identified six regions in China with military efforts to engage in such attacks. Jinan, site of the vocational school, was one of the regions.
Executives at Google have said little about the intrusions and would not comment for this article. But the company has contacted computer security specialists to confirm what has been reported by other targeted companies: access to the companies’ servers was gained by exploiting a previously unknown flaw in Microsoft’s Internet Explorer Web browser.
Forensic analysis is yielding new details of how the intruders took advantage of the flaw to gain access to internal corporate servers. They did this by using a clever technique — called man-in-the-mailbox — to exploit the natural trust shared by people who work together in organizations.
After taking over one computer, intruders insert into an e-mail conversation a message containing a digital attachment carrying malware that is highly likely to be opened by the second victim. The attached malware makes it possible for the intruders to take over the target computer.

John Markoff reported from San Francisco and David Barboza from Shanghai. Bao Beibei and Chen Xiaoduan in Shanghai contributed research.

«‹ 122 123 124 125›»

過 客

  1. R2 on 卷進了美商5 月 15 日, 2024 年

    终于回来了,好。

  2. Ken on Mommy最後的樣子11 月 6 日, 2023 年

    也沒有很久吧,最近終於閒下來

  3. R2 on Mommy最後的樣子10 月 26 日, 2023 年

    好久不见

  4. Ken on 天朝Loli控组曲(带歌词,修正版)10 月 12 日, 2023 年

    哈哈哈,祝福你,好人一生平安

  5. liu on 天朝Loli控组曲(带歌词,修正版)10 月 12 日, 2023 年

    hello,我在找天朝lolicon组曲时发现了你的博客,感谢你十四年前做出的贡献,祝一切安好

January 2026
S M T W T F S
 123
45678910
11121314151617
18192021222324
25262728293031
« Dec    

Spam Blocked

102,175 spam blocked by Akismet

↑

© 初心易得,始終難守 2026
Powered by WordPress • Themify WordPress Themes