Memory Management on the MO6 and Olivetti Prodest PC 128

In this 2nd article about Vintage Computing we’ll explore in details how memory was organised and mapped on the Thomson MO6 and the Olivetti Prodest PC 128.

Continue reading

Advertisements

How to force any Linux application to use Hugepages without modifying the source code

In this article we’ll have a look at how to force any software application to use Huge Pages (HugeTLB) without the need to modify the source and/or recompile them.

Continue reading

Maximum security and privacy using Mac OS sandbox and Tor browser bundle

In this article we give a look at a practical case of using BSD sandbox by sandboxing Tor WEB Browser Bundle on Mac OS X to reduce risks of exploits from malicious websites while preserving full anonymity using Tor network and Tor browser.

Continue reading

How to run your Applications in a Mac OS X sandbox to enhance security

In this article we’ll see how to configure and execute your software applications in an Apple Mac OS X sandbox. This kind of feature helps a lot to protect your Mac OS X security by executing an arbitrary application in a complete isoulated environment.

Continue reading

C code snippet to measure function execution time for both Linux and Mac OS X

In this article we’ll see how to write a simple yet effective code in C language to measure the time required to process a function. This code has been written to be  compiled without changes on both Linux-GCC and Mac OS X GCC compiler.

Continue reading

How to install and use autotools on Mac OS X

In this article we’ll learn how to install and configure autotools on Mac OS X so that we can start to compile Open Source Software on the Mac.

Continue reading

System Calls (Part I)

Syscalls are the way a Software Application Program can interact with the underlining Operating System, everything from displaying a character on the screen to reading a file from the harddrive will generate syscalls. In this post we’ll analyse syscalls in details with examples on different CPU architectures and Operating Systems.

Continue reading