menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Operating Systems News

Operating Systems News

source image

Dev

1w

read

355

img
dot

Image Credit: Dev

Why Both return and exit() Work in main()

  • In C programming, there are two ways to terminate a program from the main function: using return and using exit().
  • The exit function properly terminates a program. main is called after _start, which is the actual entry point of a C program.
  • In glibc, _start initializes the stack frame required for program execution, sets up command-line arguments (argc, argv) for the main function, and then calls __libc_start_main.
  • In __libc_start_call_main, the main function is executed and the return value is passed to exit to ensure proper program termination.
  • Therefore, when using return, the return value is passed to __libc_start_main, which then passes it to exit.
  • Similar implementations exist in other operating systems (like Windows and macOS) and different C standard libraries.
  • Through this mechanism, both return and exit() terminate the program properly.
  • This article focuses on the implementation in GNU/Linux environments, specifically using glibc.
  • C programs have the following mechanism in place - a program starts from _start, prepares for main's execution, and receives main's return value and uses it as an argument for exit.
  • Note that this mechanism is not limited to GNU/Linux.

Read Full Article

like

21 Likes

source image

Macdailynews

1w

read

209

img
dot

Image Credit: Macdailynews

Stock futures surge on president-elect Donald Trump’s sweeping victory

  • Stock futures surged as President-elect Donald Trump and running mate J.D. Vance won the 2024 presidential election.
  • Trump's victory brings a mixed bag of positives and negatives for the retail industry.
  • Retailers can expect a renewel of Trump's tax cut package, which will benefit consumer incomes.
  • However, there is uncertainty due to Trump's proposals on tariffs.

Read Full Article

like

12 Likes

source image

Macstories

1w

read

234

img
dot

Image Credit: Macstories

The Latest from NPC: Next Portable Console and AppStories

  • In the AppStories podcast, Federico and Jonathan Reed discuss watchOS 11 and browsing the web from an Apple Watch.
  • In the NPC podcast, smartphone gaming news, console mods, and the future of Windows handheld gaming are discussed.
  • Jonathan shares his first impressions of the Ayaneo Pocket Micro in the NPC podcast.
  • Jonathan's app recommendations include Reeder Classic, Reader by ElevenLabs, Reminders with Remind Me Faster, and Ulysses.

Read Full Article

like

14 Likes

source image

TechViral

1w

read

87

img
dot

Image Credit: TechViral

How To Setup AdGuard DNS On Windows 10/11 to Remove Ads

  • AdGuard DNS is a system-wide ad blocker for Windows.
  • It blocks ads from apps, browsers, games, and websites.
  • AdGuard DNS also removes online trackers and protects personal data.
  • To set up AdGuard DNS on Windows 10 or 11, follow the provided steps.

Read Full Article

like

5 Likes

source image

Pcgamer

1w

read

313

img
dot

Image Credit: Pcgamer

CrowdStrike and Windows are *gulp* having problems again but thankfully just with 24H2 and just in some Office programs

  • Windows 11's latest build, 24H2, is causing issues with CrowdStrike's Falcon sensor software.
  • After installing Windows 11, certain Office programs like Word and Excel may stop responding.
  • Affected devices have CrowdStrike's Falcon sensor software with a particular policy setting enabled.
  • CrowdStrike has temporarily disabled the problematic policy setting while collaborating with Microsoft for a solution.

Read Full Article

like

18 Likes

source image

TechViral

1w

read

411

img
dot

Image Credit: TechViral

Hotcleaner.com is it Safe? How to Get Rid of It

  • Hotcleaner.com is a browser hijacker that redirects users to a random website.
  • It is not safe and affects the performance of Google Chrome.
  • To remove the hotcleaner.com virus, users need to uninstall the Privacy Test extension, run a full PC scan with Malwarebytes, remove suspicious programs, or reset Chrome to default settings.
  • If users need further assistance, they can leave a comment or share the guide with others.

Read Full Article

like

24 Likes

source image

Macrumors

1w

read

129

img
dot

Image Credit: Macrumors

iOS 18.2 Could Show How Long Your iPhone Will Take to Charge

  • Apple is working on a new battery charging feature for iPhone that will show users how much time it will take to reach a full charge.
  • The latest iOS 18.2 beta includes code references to a 'BatteryIntelligence' framework that can calculate estimated charging completion times.
  • The feature is not enabled yet, but if implemented, iOS 18.2 may notify users about the expected time to reach a specific charge level.
  • iOS 18 introduced battery health options, allowing users to limit maximum charging and alerting them when using a slow charger.

Read Full Article

like

7 Likes

source image

Playerassist

1w

read

401

img
dot

Image Credit: Playerassist

The Sims 4 Life and Death Cheats

  • The Sims 4 Life and Death Cheats allow players to add new traits, skills, and career paths related to life and death.
  • The expansion introduces the Thanatology skill, which can be increased using the cheat 'stats.set_skill_level Minor_Thanatology X'.
  • There are two unique careers introduced: the Mortician Career and the Reaper Career. Cheats like 'careers.promote' and 'careers.demote' can be used to advance or demote Sims in these careers.
  • Different traits related to coping with loss and death can be added or removed using cheats like 'traits.equip_trait' and 'traits.remove_trait'.

Read Full Article

like

24 Likes

source image

Pcgamesn

1w

read

41

img
dot

Image Credit: Pcgamesn

Huge WW2 MMO Foxhole deserves more love, because it’s only getting better

  • Foxhole is an MMO that aims to provide a sense of consequence and permanence.
  • It combines the huge-scale WWII combat of Battlefield V, the production and building systems of Factorio, and the persistent sandbox world of WoW.
  • While it still resets every few weeks, there are novel ideas to make the game feel more weighty and meaningful.
  • The upcoming Airborne update is expected to further enhance the game and attract more players.

Read Full Article

like

2 Likes

source image

Ubuntu

1w

read

8

img
dot

Designing Canonical’s Figma libraries for performance and structure

  • Canonical's Design team revamped their Figma libraries that were outdated and inefficient. They started by aligning on how to structure the libraries and what rules and methods they wanted to follow when creating components and surveyed how designers used components. The libraries have been structured in a way that allows designers to easily understand and navigate different categories of libraries. Every library is maintained by at least one dedicated library maintainer who is responsible for managing contributions and keeping the library up to date.
  • The team adopted a multi-tiered Design system approach where they have a common base library, but additional libraries are created for each product category. For each level, there is a similar library and ownership structure that allows the team members to achieve greater consistency between products. Within each file, a strict policy of one component per page is maintained, with the pages sorted alphabetically and divided into sections that represent component levels.
  • The team also tackled performance issues at the file, page, and component level. Heavy assets are separated into their own library file, optimized, and refined. The team is also careful not to stack too many effects on top of each other while creating components. Furthermore, the team uses the instance swap property, which shows a searchable list of components and their previews and added keywords in component descriptions for better discoverability.
  • The team created a clear process for maintaining the libraries and keeping them up to date. A custom way was implemented to track the usage of Figma components and Figma libraries, giving an indication of which components may need work. A transition plan was created for the team from the old to the new library.
  • When the new libraries were finalized, the team created a beta version, and once they integrated all the feedback and moved to the stable version, they marked the old and smaller unofficial libraries that were floating around as deprecated. They put a notice everywhere to notify the users of the deprecation and advised the team to use the new library for any new work and fix anything in the old libraries or release new versions.
  • Now that they have completed all the transition period and finalizing the first set of new libraries they created, they are sharing the files with the Figma community and writing about it for designers to create more efficient Figma libraries.

Read Full Article

like

Like

source image

Rockpapershotgun

1w

read

108

img
dot

Image Credit: Rockpapershotgun

Stop putting hats on your pets, asks Stardew Valley creator

  • Stardew Valley creator, Eric Barone, has asked players to remove hats from pets to address performance issues in version 1.6 of the game.
  • Barone jokingly attributed the problem to a 'strange rash' affecting pets' ears in Zuzu City within the game's lore.
  • A bug causing chickens to vanish in players' coops was also given lore-appropriate reasoning, as Barone mentioned a wild coyote on the farm.
  • Barone assured players that the issues will be addressed and mentioned some humorous past bug fixes in Stardew Valley's updates.

Read Full Article

like

6 Likes

source image

Ubuntu

1w

read

46

img
dot

Image Credit: Ubuntu

Ubuntu Blog: Charmed MySQL enters General Availability

  • Canonical has announced the General Availability of Charmed MySQL, an enterprise solution for deploying, securing, and automating MySQL databases across private and public clouds.
  • Charmed MySQL offers up to 10 years of security maintenance and support, as well as advanced automation for managing MySQL fleets.
  • Canonical provides secure and supported MySQL packages in various formats, including deb packages, OCI-compliant images, and snaps.
  • Users can choose between self-managed MySQL operations or opt for Canonical's managed services and support.

Read Full Article

like

2 Likes

source image

Ubuntu

1w

read

364

img
dot

Image Credit: Ubuntu

Ubuntu Blog: Meet Canonical at KubeCon + CloudNativeCon North America 2024

  • Canonical, the force behind Ubuntu, is returning as a gold sponsor at KubeCon + CloudNativeCon North America 2024.
  • Canonical recently celebrated 20 years as publishers of Ubuntu, the world’s most popular Linux operating system.
  • Canonical containers are designed for modern software deployment.
  • Canonical’s open source data solutions deliver better ROI across clouds.
  • Canonical's Kubeflow distribution is designed to run on any infrastructure.
  • Canonical and its close partners are moving AI forward.
  • Canonical Kubernetes provides zeroops for small clusters and intelligent automation for larger production environments.
  • Canonical’s open source solutions come with reliable security maintenance.
  • Canonical is offering meetings with their team for those attending KubeCon NA.
  • At booth K10, people can learn about the full RAG pipeline setup that can be deployed using Canonical products like Charmed Kubeflow and MLflow.

Read Full Article

like

21 Likes

source image

Dev

1w

read

146

img
dot

Image Credit: Dev

Understanding Kerberos: How It Manages Authentication and Encryption on Linux Systems

  • Kerberos is a secure authentication technology, notably used in Linux environments and enterprise settings to ensure users’ identity verification and data encryption.
  • Kerberos authentication protocol relies on three main components, including the Key Distribution Center (KDC), Client, Server, Tickets, and Session Keys.
  • Kerberos encryption Method on Linux involves installing packages, configuring the Kerberos server to manage tickets, and handling client requests, among other steps.
  • Symmetric-key cryptography and timestamps are utilized as the essential components of Kerberos encryption to prevent unauthorized access to the network.
  • The Kerberos authentication process requires a multi-step procedure to ensure secure communication between the Client and Server.
  • Encrypting Kerberos communication on Linux ensures that sensitive data such as passwords and session data is protected from unauthorized access.
  • Kerberos is a versatile authentication tool that can be used in conjunction with other security frameworks, including Lightweight Directory Access Protocol (LDAP) and Network File System (NFS).
  • Although a complicated process, configuring Kerberos on Linux systems provides an increased level of security and safeguards against violations of data security and unauthorized access.
  • Kerberos continues to be a dependable and resilient solution for secure authentication and communication when appropriately used and configured.
  • Linux-based networks can protect themselves against a wide variety of security threats by implementing Kerberos with care and appropriate encryption mechanisms.

Read Full Article

like

8 Likes

source image

Macdailynews

1w

read

728

img
dot

Image Credit: Macdailynews

Apple to offer additional investments in Indonesia to remove iPhone ban

  • Apple has proposed investing almost $10 million in Indonesia to remove the ban on sales of its latest iPhone models.
  • The investment plan involves partnering with suppliers to set up a factory in Bandung, southeast of Jakarta.
  • The proposed facility would manufacture accessories and components for Apple gadgets.
  • The Indonesian Ministry of Industry is deliberating on the proposal and is expected to reach a decision soon.

Read Full Article

like

13 Likes

For uninterrupted reading, download the app