Cultivating Young Makers | The Unmanned Lunar Loading and Unloading System by Haidian Students

Cultivating Young Makers | The Unmanned Lunar Loading and Unloading System by Haidian Students

New users can click the “blue text” above to follow us “Cultivating Young Makers” is an educational practice aimed at fostering innovation, practical skills, and social responsibility. In recent years, this initiative has focused on the needs of students for innovation and creativity, encouraging young people to actively identify problems in their daily lives, engage … Read more

Bilateral Rehabilitation System Using Bilateral or Unilateral Assistive Robots Developed by Kagawa University Research Team

Bilateral Rehabilitation System Using Bilateral or Unilateral Assistive Robots Developed by Kagawa University Research Team

To treat hemiplegic patients with unilateral paralysis, a bilateral rehabilitation system using bilateral or unilateral assistive robots has been developed. However, the challenge of promoting coordination between bilateral limbs with flexible robot assistance remains to be addressed.The research team at Kagawa University has published a paper titled An EMG‑Based Biomimetic Variable Stiffness Modulation Strategy for … Read more

Detailed Analysis of Buildroot and Yocto Package Dependency Build Mechanisms: Who is Smarter? Who is More Efficient?

Detailed Analysis of Buildroot and Yocto Package Dependency Build Mechanisms: Who is Smarter? Who is More Efficient?

In the process of building embedded Linux systems, the “capability to handle package dependencies” is one of the core indicators of the maturity of a build system. Today, we will focus on a detailed topic — how Buildroot and Yocto handle package dependencies? What are their respective advantages and disadvantages? This not only concerns build … Read more

Several Methods to Force Overwrite with the cp Command in Linux Without Prompting

Several Methods to Force Overwrite with the cp Command in Linux Without Prompting

In Linux, the cp command by default prompts for confirmation before overwriting (due to the system alias alias cp=’cp -i’). Here are several methods to force overwrite without prompting: 1. Bypass the alias using a backslash \cp -rf source_file destination_file The backslash \ ignores the alias and directly calls the native cp command, where -rf … Read more

Understanding the Differences Between Linux Commands ‘su’ and ‘sudo’

Understanding the Differences Between Linux Commands 'su' and 'sudo'

Understanding the Differences Between Linux Commands ‘su’ and ‘sudo’ Previously, I was confused about the two commands su and sudo. Recently, I specifically searched for information on this topic and finally clarified the relationship and usage of both commands. This article aims to systematically summarize the findings. 1 Preparation Since this blog involves user switching, … Read more

Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios

Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios

Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios Table of Contents • Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios • • Introduction • 1. Background: When Concurrent Connections Encounter Performance Bottlenecks • • 1.1 Case Environment • 1.2 Initial Parameter Analysis • 2. In-Depth Diagnosis: Connection Status and Kernel Parameters … Read more

Accessing Local Files Perfectly with WeChat on Linux

Accessing Local Files Perfectly with WeChat on Linux

Due to personal preference, I have been using Fedora as my desktop system. Although I am not fond of WeChat, it is unavoidable in my work. Currently, the Flatpak version of WeChat for Linux is significantly better than the previous web version. However, I have found that when using it, the Flatpak version does not … Read more

Discussing the Linux Signal Mechanism in .NET Dumps

Discussing the Linux Signal Mechanism in .NET Dumps

1. Background 1. Storytelling When a <span>.NET application</span> crashes on Linux, we can configure some references to obtain the corresponding core file. After obtaining the core file, we can open it with windbg, and often see a message like this: <span>Signal SIGABRT code SI_USER (Sent by kill, sigsend, raise)</span>, as shown below: (1.1d): Signal SIGABRT … Read more

Summary of Common Linux Hooking Techniques

Summary of Common Linux Hooking Techniques

01Hook FunctionsHook functions are predefined hooks in a program that allow you to attach or register a hook function when needed, making it available for the target.If there are no hooks, you can also obtain function pointers to encapsulate functions, but this can only be attached before or after the function runs, not during its … Read more

Linux User Permissions

Linux User Permissions

1. Basic Permissions Permission Basics Users and Groups File Owner (User): The user who created the file, possessing the highest level of control. Group: A set of users that share file permissions. Others: Users who are neither the owner nor part of the group. Three Basic Permissions Read <span>r=4</span>: Permission to read. View file contents … Read more