2007年,苹果公司推出的iPhone成为全球的焦点,引起了人们的极大关注,它是一款支持Web应用的手机。本文在分析iPhone特性的基础上,基于Mac OS X平台下图文日记本的设计及实现进行了研究,主要是对系统数据结构、架构、功能设计及界面设计...2007年,苹果公司推出的iPhone成为全球的焦点,引起了人们的极大关注,它是一款支持Web应用的手机。本文在分析iPhone特性的基础上,基于Mac OS X平台下图文日记本的设计及实现进行了研究,主要是对系统数据结构、架构、功能设计及界面设计等一系列关键技术进行了研究。展开更多
桌面操作系统随着个人计算机硬件的进步飞速发展。以Unix为基础的MacOSX在最近一次主要升级Mac OS X 10.6 Snow Leopard中对底层技术进行了重要的革新,引入了64位内核、Grand Central Dispatch、Open CL等新技术。底层技术的更新为开...桌面操作系统随着个人计算机硬件的进步飞速发展。以Unix为基础的MacOSX在最近一次主要升级Mac OS X 10.6 Snow Leopard中对底层技术进行了重要的革新,引入了64位内核、Grand Central Dispatch、Open CL等新技术。底层技术的更新为开发人员提供了更友好的多线程,更深入的发掘了硬件的潜力,也为操作系统的进一步的发展奠定了基础。展开更多
Memory analysis is one of the key techniques in computer live forensics. Especially,the analysis of a Mac OS X operating system's memory image file plays an important role in identifying the running status of an a...Memory analysis is one of the key techniques in computer live forensics. Especially,the analysis of a Mac OS X operating system's memory image file plays an important role in identifying the running status of an apple computer. However,how to analyze the image file without using extra"mach-kernel"file is one of the unsolved difficulties. In this paper,we firstly compare several approaches for physical memory acquisition and analyze the effects of each approach on physical memory. Then,we discuss the traditional methods for the physical memory file analysis of Mac OS X. A novel physical memory image file analysis approach without using extra"mach-kernel"file is proposed base on the discussion. We verify the performance of the new approach on Mac OS X 10. 8. 2. The experimental results show that the proposed approach is simpler and more practical than previous ones.展开更多
Mac OS X tiger平台上的应用软件需要进行自动化的测试。Eggplant是Mac OS X平台上的一种自动测试工具。文中主要介绍了这个工具和运用此工具设计一个应用软件的版本验证测试。最后实现了这个设计的部分并表明此工具是一个便捷有效的自...Mac OS X tiger平台上的应用软件需要进行自动化的测试。Eggplant是Mac OS X平台上的一种自动测试工具。文中主要介绍了这个工具和运用此工具设计一个应用软件的版本验证测试。最后实现了这个设计的部分并表明此工具是一个便捷有效的自动测试工具。展开更多
There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer system...There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer systems or servers. In this paper, we investigate impact of different ICMP based security attacks on two popular server systems namely Microsoft’s Windows Server and Apple’s Mac Server OS running on same hardware platform, and compare their performance under different types of ICMP based security attacks.展开更多
文摘桌面操作系统随着个人计算机硬件的进步飞速发展。以Unix为基础的MacOSX在最近一次主要升级Mac OS X 10.6 Snow Leopard中对底层技术进行了重要的革新,引入了64位内核、Grand Central Dispatch、Open CL等新技术。底层技术的更新为开发人员提供了更友好的多线程,更深入的发掘了硬件的潜力,也为操作系统的进一步的发展奠定了基础。
基金Sponsored by the National Natural Science Foundation of China (Grant No.61303199)Natural Science Foundation of Shandong Province (Grant No.ZR2013FQ001 and ZR2011FQ030)+1 种基金Outstanding Research Award Fund for Young Scientists of Shandong Province (Grant No.BS2013DX010)Academy of Sciences Youth Fund Project of Shandong Province (Grant No.2013QN007)
文摘Memory analysis is one of the key techniques in computer live forensics. Especially,the analysis of a Mac OS X operating system's memory image file plays an important role in identifying the running status of an apple computer. However,how to analyze the image file without using extra"mach-kernel"file is one of the unsolved difficulties. In this paper,we firstly compare several approaches for physical memory acquisition and analyze the effects of each approach on physical memory. Then,we discuss the traditional methods for the physical memory file analysis of Mac OS X. A novel physical memory image file analysis approach without using extra"mach-kernel"file is proposed base on the discussion. We verify the performance of the new approach on Mac OS X 10. 8. 2. The experimental results show that the proposed approach is simpler and more practical than previous ones.
文摘There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer systems or servers. In this paper, we investigate impact of different ICMP based security attacks on two popular server systems namely Microsoft’s Windows Server and Apple’s Mac Server OS running on same hardware platform, and compare their performance under different types of ICMP based security attacks.