mirror of
https://github.com/nbeaver/why-linux-is-better.git
synced 2025-09-01 01:51:49 +02:00
Typo-fixing and clarifying.
This commit is contained in:
42
readme.rst
42
readme.rst
@@ -390,7 +390,7 @@ were insufficient to include both control characters and special characters
|
|||||||
in addition to the required 26 alphabetics and 10 numerics,
|
in addition to the required 26 alphabetics and 10 numerics,
|
||||||
so they decided to use a 7-bit code.
|
so they decided to use a 7-bit code.
|
||||||
However, ASCII was designed to include a useful 6-bit subset,
|
However, ASCII was designed to include a useful 6-bit subset,
|
||||||
which could only include single alphabet.
|
which could only fit a single alphabet.
|
||||||
|
|
||||||
The consideration of a 6-bit, 64-character graphic subset was important
|
The consideration of a 6-bit, 64-character graphic subset was important
|
||||||
to the standards committee. If the ultimate decision was that columns 6
|
to the standards committee. If the ultimate decision was that columns 6
|
||||||
@@ -535,7 +535,7 @@ was optimized for its architecture.
|
|||||||
https://lkml.org/lkml/2002/7/30/257
|
https://lkml.org/lkml/2002/7/30/257
|
||||||
|
|
||||||
(CP/M was written for an eight-bit architecture,
|
(CP/M was written for an eight-bit architecture,
|
||||||
which is presumably why it used an 8.3 filename instead of 6.3 filename.) [#8.3_filename]_
|
which is presumably why it used an 8.3 filename instead of a 6.3 filename.) [#8.3_filename]_
|
||||||
|
|
||||||
Similarly, the RT-11 didn't use ASCII for filenames,
|
Similarly, the RT-11 didn't use ASCII for filenames,
|
||||||
but rather an encoding called RADIX-50,
|
but rather an encoding called RADIX-50,
|
||||||
@@ -929,15 +929,15 @@ Filename restrictions.
|
|||||||
In Linux and other Unix-derived operating systems,
|
In Linux and other Unix-derived operating systems,
|
||||||
the only characters that may not appear
|
the only characters that may not appear
|
||||||
in the name of a file or directory [#forbidden_characters]_
|
in the name of a file or directory [#forbidden_characters]_
|
||||||
are the slash ``/``,
|
are the slash ``/``
|
||||||
which is used to delimit paths,
|
(which is used to delimit paths)
|
||||||
and the ASCII null ``\0``,
|
and the ASCII null ``\0``
|
||||||
which is used to terminate strings in C. [#C_strings]_
|
(which is used to terminate strings in C). [#C_strings]_
|
||||||
|
|
||||||
Windows has the same restrictions,
|
Windows has the same restrictions,
|
||||||
as well as many other `restrictions which are considerably more complex`_
|
as well as many other `restrictions which are considerably more complex`_
|
||||||
and are partly the result
|
and are partly the result
|
||||||
of `backwards compatibility with operating systems from the early 1970s`_.
|
of `backwards compatibility with CP/M pseudofiles`_.
|
||||||
|
|
||||||
.. _backwards compatibility with operating systems from the early 1970s: http://bitquabit.com/post/zombie-operating-systems-and-aspnet-mvc/
|
.. _backwards compatibility with operating systems from the early 1970s: http://bitquabit.com/post/zombie-operating-systems-and-aspnet-mvc/
|
||||||
.. _restrictions which are considerably more complex: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247%28v=vs.85%29.aspx#naming_conventions
|
.. _restrictions which are considerably more complex: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247%28v=vs.85%29.aspx#naming_conventions
|
||||||
@@ -1145,8 +1145,7 @@ into `unintentionally running malware`_.
|
|||||||
.. _unintentionally running malware: http://windows.microsoft.com/en-us/windows-vista/recognizing-dangerous-file-types
|
.. _unintentionally running malware: http://windows.microsoft.com/en-us/windows-vista/recognizing-dangerous-file-types
|
||||||
|
|
||||||
Also, if the file extensions for different filetypes happen to collide,
|
Also, if the file extensions for different filetypes happen to collide,
|
||||||
as they inevitably do
|
as they inevitably do,
|
||||||
|---| it doesn't help that filenames are case-insensitive |---|
|
|
||||||
one program must take default precedence over the other for that file extension.
|
one program must take default precedence over the other for that file extension.
|
||||||
|
|
||||||
For example, there `a lot of different file formats`_ with a ``.dat`` file extension,
|
For example, there `a lot of different file formats`_ with a ``.dat`` file extension,
|
||||||
@@ -1568,7 +1567,7 @@ This was not without controversy.
|
|||||||
https://msdn.microsoft.com/en-us/library/windows/desktop/hh848042%28v=vs.85%29.aspx
|
https://msdn.microsoft.com/en-us/library/windows/desktop/hh848042%28v=vs.85%29.aspx
|
||||||
|
|
||||||
Linux also has an API,
|
Linux also has an API,
|
||||||
but it is based on a standard (POSIX),
|
but it is based on the POSIX standard,
|
||||||
is not tied to the desktop environment,
|
is not tied to the desktop environment,
|
||||||
and is not controlled by a single corporation
|
and is not controlled by a single corporation
|
||||||
in the same way that the Windows API is.
|
in the same way that the Windows API is.
|
||||||
@@ -2239,7 +2238,6 @@ which are not in the Chocolatey repository (as of July 2015).
|
|||||||
- `HEPHAESTUS`_ periodic table for X-ray spectroscopy `* <https://chocolatey.org/packages?q=HEPHAESTUS>`__
|
- `HEPHAESTUS`_ periodic table for X-ray spectroscopy `* <https://chocolatey.org/packages?q=HEPHAESTUS>`__
|
||||||
- `EXPGUI`_ XRD analysis `* <https://chocolatey.org/packages?q=EXPGUI>`__
|
- `EXPGUI`_ XRD analysis `* <https://chocolatey.org/packages?q=EXPGUI>`__
|
||||||
- `DiffPDF`_ PDF comparison `* <http://chocolatey.org/packages?q=DiffPDF>`__
|
- `DiffPDF`_ PDF comparison `* <http://chocolatey.org/packages?q=DiffPDF>`__
|
||||||
- `Unison`_ file synchronizer `* <http://chocolatey.org/packages?q=Unison>`__
|
|
||||||
- `xchat`_ IRC client `* <http://chocolatey.org/packages?q=xchat>`__
|
- `xchat`_ IRC client `* <http://chocolatey.org/packages?q=xchat>`__
|
||||||
|
|
||||||
.. _Chocolatey: http://chocolatey.org/
|
.. _Chocolatey: http://chocolatey.org/
|
||||||
@@ -2374,6 +2372,7 @@ like ``Tools -> Options -> General Options -> ...``
|
|||||||
The emphasis on textuality also makes diagnosing problems easier.
|
The emphasis on textuality also makes diagnosing problems easier.
|
||||||
For example:
|
For example:
|
||||||
|
|
||||||
|
- Want to see what disks and partitions are mounts? Run ``lsblk``.
|
||||||
- Want to see which displays you're connected to? Run ``xrandr``.
|
- Want to see which displays you're connected to? Run ``xrandr``.
|
||||||
- Want to see what USB devices are connected? Run ``lsusb``.
|
- Want to see what USB devices are connected? Run ``lsusb``.
|
||||||
- Want to restart your networking daemon? Run ``sudo /etc/init.d/networking restart``.
|
- Want to restart your networking daemon? Run ``sudo /etc/init.d/networking restart``.
|
||||||
@@ -2490,7 +2489,7 @@ rather than reproducing and reporting bugs.
|
|||||||
.. _reboots: http://www.howtogeek.com/howto/31204/why-do-application-installs-make-you-reboot-and-close-other-apps/
|
.. _reboots: http://www.howtogeek.com/howto/31204/why-do-application-installs-make-you-reboot-and-close-other-apps/
|
||||||
|
|
||||||
In 2000, when Hotmail switched from FreeBSD to Windows server,
|
In 2000, when Hotmail switched from FreeBSD to Windows server,
|
||||||
a white paper noted this problem, which persists 15 years later:
|
a white paper noted this problem:
|
||||||
|
|
||||||
Windows operations still involves too many reboots. Sometimes they are
|
Windows operations still involves too many reboots. Sometimes they are
|
||||||
unnecessary, but operators reboot a system rather than take the time to
|
unnecessary, but operators reboot a system rather than take the time to
|
||||||
@@ -2550,24 +2549,23 @@ As a result,
|
|||||||
.. _falsely attribute: http://www.combofix.org/suspect-a-malware-infection-heres-the-right-way-to-remove-it.php
|
.. _falsely attribute: http://www.combofix.org/suspect-a-malware-infection-heres-the-right-way-to-remove-it.php
|
||||||
.. _software misbehavior to malware: http://lifehacker.com/5958001/the-5-biggest-myths-about-slow-pcs-and-how-you-can-actually-fix-them
|
.. _software misbehavior to malware: http://lifehacker.com/5958001/the-5-biggest-myths-about-slow-pcs-and-how-you-can-actually-fix-them
|
||||||
|
|
||||||
.. [#not_a_virus]
|
|
||||||
https://dniinoi.wordpress.com/2008/03/26/the-myth-behind-virus-attack-and-hardware/
|
|
||||||
https://security.stackexchange.com/questions/65153/is-there-any-virus-that-can-cause-physical-damage
|
|
||||||
http://askbobrankin.com/can_a_virus_really_destroy_your_hard_drive.html
|
|
||||||
|
|
||||||
This also has consequences for developers.
|
This also has consequences for developers.
|
||||||
Because few Linux users experience problems due to malware,
|
Because few Linux users experience problems due to malware,
|
||||||
they will report bugs caused by the actual applications,
|
they will report bugs caused by the actual applications,
|
||||||
not ones caused by malware.
|
not ones caused by malware.
|
||||||
|
|
||||||
Most Linux distributions have a better security model
|
Most Linux distributions use cryptographically secure package managers
|
||||||
which uses secure package installation by default,
|
which is a signifiantly better security model
|
||||||
but allows installing software from other sources as well,
|
than downloading unsigned executables over a network
|
||||||
unlike the overly restrictive app-store model
|
and then granting them administrative privileges.
|
||||||
seen in more recent versions of Windows.
|
|
||||||
|
|
||||||
Finally, because Linux is a ubiquitous server operating system,
|
Finally, because Linux is a ubiquitous server operating system,
|
||||||
its security is under constant attack,
|
its security is under constant attack,
|
||||||
and Linux desktop users benefit from fixes to the vulnerabilities.
|
and Linux desktop users benefit from fixes to the vulnerabilities.
|
||||||
|
|
||||||
|
.. [#not_a_virus]
|
||||||
|
https://dniinoi.wordpress.com/2008/03/26/the-myth-behind-virus-attack-and-hardware/
|
||||||
|
https://security.stackexchange.com/questions/65153/is-there-any-virus-that-can-cause-physical-damage
|
||||||
|
http://askbobrankin.com/can_a_virus_really_destroy_your_hard_drive.html
|
||||||
|
|
||||||
.. TODO: addendum of commonly cited, but incorrect, advantages?
|
.. TODO: addendum of commonly cited, but incorrect, advantages?
|
||||||
|
Reference in New Issue
Block a user