Saturday, October 23, 2010

Othee visual description watchdog works



Micro-chip microprocessor in the computer system, due to the work of SCM is often subject to interference from external electromagnetic fields, causing the program to run fly, and fall into an infinite loop, the program's normal operation is interrupted by a microprocessor controlled system can not continue宸ヤ綔 will causing the whole system of fall into stagnation, the consequences of occurrence of unpredictable, so out of right SCM Yunxing state real-time monitoring of the consideration, Bian produce the one kind of microcontroller dedicated to monitoring the running state of the chip, commonly known as "see Door Dog "(WatchDog)

Watchdog circuit applications, so that SCM can achieve in the absence of state for work, its working principle is: a watchdog chip and microcontroller I / O pins connected to the I / O pin is programmed to its regular Watchdog to go into this pin high (or low), this procedure statement is distributed to other control statements on the middle of the SCM, SCM as soon as due to interference proceedings but after running into a flying a program segment into the dead cycle state, write the watchdog pin can not be performed the procedure, this time, the watchdog circuit will be sent as a signal without MCU will reset pin in it and connected to Microcontroller The pin sends a reset signal to MCU reset occurs, the program from the program memory of the starting position started, this will automatically reset to achieve a single chip.

Watchdog, called WatchDog Timer, a timer circuit, generally have an input, called feed the dog (kicking the dog or service the dog), an output to the MCU's RST terminal, MCU normal work time, every side time to output a signal to feed the dog side, a WDT reset, if not feed the dog more than the stipulated time, (usually when Runaway), WDT time over, went back to give a reset signal to MCU, MCU is reset. MCU to prevent crashes. watchdog role is to prevent the occurrence of infinite loop processes, or procedures running fly.

How it works: After running in the system also starts the watchdog counter, watchdog starts counting automatically, if not to a certain amount of time to clear the watchdog, then the watchdog counter will overflow causing gatekeeper dog interrupted, causing a system reset. Therefore, use the chips watchdog should pay attention to clear the watchdog.

Is to use a hardware watchdog timer to monitor the operation of the main program that is running in the main program, we want time to time before the timer reset if there is an infinite loop, or PC pointer can not come back. So time after time to make MCU reset. Commonly used such as WDT chip MAX813, 5045, IMP 813 and so on, the price 4 to 10 per month.

Software Watchdog technical principles and the same, just the method is to use the software to achieve, we were still 51 speaking, we know that there are two in 51 single-chip timers, we can use two timer monitor the operation of the main program. We can set a certain time T0 time, when the timer interrupt generated when a variable assignment, and this variable in the main program already have a running start of the initial value, where we have to set the timing value is smaller in the main program running time, so that the tail of the main program to judge the value of the variable, if the value of the expected changes have taken place, it shows T0 interrupt normal, if not changed then make the program reset. For T1 we use to monitor the operation of the main program, we set a certain time to time T1, in the main program for its reduction, if not some time in their reset, T1 of the timer interrupt will cause the MCU reset. Here the timing of time T1 is greater than the main program to set the running time, to the main program and leave enough room in the margin. The T1 interrupt normal or not we then T0 timer interrupt subroutine to monitor. That's enough becomes a cycle, T0 monitor T1, T1 to monitor the main program, main program again monitor the T0, to ensure the stable operation of the system.







相关链接:



Enjoy it: lots to talk about topics for undying domain



3DS MAX of magical engraving



Compilation of various source - alarm



QT to WMV



Semiconductor India vied with New Deal



SWF TO MOV



FLV to iPhone



Sybase raise money for love during the full Sichuan



c # and class DIFFERENCES in the structure



Getting Started with Corel Draw 10 (4) hands to create vector graphics (1)



Inventory And Barcoding introduction



FOR you Icons



Complete DVD quiz



resolving quot corrupt registry quot error



Cisco's Chambers With 16 Billion U.S. Dollars That "partnership"



Wednesday, October 13, 2010

Assembly language instruction and by Example


From how to build the source file to debug a brief introduction to the next, and explain with examples. Since I is limited, if any errors below and in the place where you can further modify said please
Assembly language course:
First, prepare the machine before the software:
MS-DOS operating system (such as: MSDOS6.22, MSDOS7.0, etc.)
Text editor (such as: ED99v.COM, TURBO.EXE, TC.EXE, C. EXE, etc.)
Assembler (such as: MASM.EXE, ASM.EXE, etc.)
Connect program (such as: LINK.EXE, etc.)
Debugger (such as: DEBUG.EXE, etc.)

Second, the compilation process of establishing procedures for:




a. Through the establishment of assembly source code 鈹?鈹?鈹?鈹?鈫?b. compiled to object files 鈹?鈫?鈹?鈹?鈫?d. Connect to the executable file
鈫?br />鈹?c. do not pass, re-edit (statement error) 鈫?br />鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈫?br />鈫?f. is not correct, use the debugging tools to debug, re-modify the (logical errors) 鈫?br />鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈹?鈫?e run
鈫?correct
g. complete


3, now (b) marked with the letters of each process (PROCEDURE) for details

PROCEDURE a: the establishment of assembly source code (ie: the establishment of the file name. Asm)
This process is equivalent to the paper we write source code, only the paper into a computer, this process also known as source code entry. Source code will be many ways to input the computer, the following specific methods will be introduced.
1. Through MD-DOS text editor that comes with ED99v.EXE for input, in the DOS prompt, type: ED99v carriage return, then the system if you can call, ED99v operation screen will appear on the screen, You can be the prompt for input, and when the entry is completed, select Save and give you a file from the input file name, format: filename.asm; (where filename for you from the file name, by the characters 1-8 composition), asm is the assembler must be added to the identification, can not be changed. Save the file after the DOS command DIR is available under DOS to see if you find documents stored there, you can process b.
2. If your system does not ED99v, can also be you are familiar with a text editor to input, edit, such as the available c language and pascal language text editor to edit, and finally the form of documents can be saved as filename.asm .

PROCEDURE b: compiled object files (ie: compile. Obj. Lst. Crf file)
This process is the computer will correct your source code compiled into machine language, program listings and cross-reference table of the target file. If the statement at this time your application has an error, the system error, and pointed out that in the first few lines, what types of errors, you can suggest changes to each. Specific process are presented:
In the DOS prompt, type MASM filename ENTER
(Note: Your assembly program within the system as MASM.EXE, if your system is ASM.EXE assembler, and put order into the ASM filename Enter. Which filename you just created in the PROCEDURE a file name)
Then the assembler output file can have three (respectively:. Obj. Lst. Crf), there will be three questions, the way in which you can press Enter. The information shown below is the source of the error number, said if passed is 0, the process can be c. But if not for the 0 to illustrate the error, and that the line the error occurred, can be modified according to the prompt. However, if the error has not so much see the show passed the following order form will be available error message stored in a file you specify, and then a text editor to view. MASM filename> filen (filen since you have not used a file name to store error information) later to see filen to get an error message.

PROCEDURE c: compile do not pass, re-edit (error type: source statement is illegal)
After the implementation of over PROCEDURE b, if an error message, we should do our own press PROCEDURE c, and not jump to the PROCEDURE d, and if the Executive PROCEDURE d force will be no effective results.
Now open is misplaced it! First of all, make it clear, in the PROCEDURE b errors are detected in the syntax of each statement or the use of an error, it can not detect the logical design process (statement by row position) errors, so we'll remember good error line number. After the line number in the record, it should be re-implementation of the PROCEDURE a, time and action should be open source code has been programmed (to ED99v example: In the DOS prompt, type:
ED99v filename.asm carriage return), according to the line number to edit and save the file, compile again, until PROCEDURE b by far. Will continue down the implementation of the PROCEDURE d.
Here are some common error messages, in order to check:

1, Register already defined to internal logic error in compilation
2, Unknown symbol type in the symbol type of statement, some things can not be identified
3, Symbol is multi-defined repeat the definition of a symbol
4, Symbol not defined symbol is not defined
5, Syntax error statement syntax and grammar of any recognizable does not match
6, Symbol is reserved word
Attempted illegal use of an assembler of reserved words (example: add the definition of a variable)
7, Not proper align / combine type SEGMENT parameter is incorrect
8, One operand must be const it is illegal to use addition instructions
9, Operands must be same or 1 abs this is the illegal use of subtraction instruction
10, Already have base register base address of trying to duplicate
11, Illegal size for item reference to the length of the items is illegal, (such as: double word shift)
12, Illegal register value into the specified value can not register "reg" field
13, Must be AX or AL or some commands can only AL AX
14, Improper use of segment reg segment register to use illegal (such as: mov ds, 0)
15, Division by 0 or overflow gives an expression to use 0 for division
16, value is out of range values greater than the need to use
17, CS register illeal usage tried to register the illegal use of CS
18, DUP is too large for linker
DUP nested too long, so that the linker can not get from the record to be

PROCEDURE d: Connect to the executable file (ie: to connect to. Exe or. Com file)
In this process, generally do not have accidents, that is, if the file name wrong.
Type: In the DOS prompt: LINK filename ENTER

PROCEDURE e: run the compiled executable file
When PROCEDURE d passed, will produce an executable file, then simply run the program to see if it did according to what you imagine the outcome. During the pilot, to try to test some of the critical state, to see whether the procedures and stable operation, the result is correct. If everything works, can enter PROCEDURE g the.
May fear most is not OK, procedures produce some strange results (you can not think that is your computer does not listen to your command, in fact it is meticulously compiled in accordance with your procedures. I have always thought that my computer out the problems), if on the test time must not panic, hold their emotions, do not read the computer, quiet a few minutes (time is loads anyway). Then we should use the most critical and most common step in the conduct PROCEDURE f.

PROCEDURE f: using debugging tools to debug, re-modify the (logical errors)
In this I will introduce in the own use DOS debugger DEBUG.EXE to program debugging, check for errors.
First of all we have to understand basic use of DEBUG:
1, for debugging program input format:
DEBUG FILENAME.??? Enter
Where FILENAME is the main file name??? Is the extension file name, such as we had already compiled a file, it's name to: djx.exe to debug it at the DOS prompt when
Play: DEBUG djx.exe Enter, to see the''-'' prompt, without any prompts are correct, can debug it.
2, DEBUG DEBUG debug commands used in the process of introduction:
(Note: In the command using [] enclosed content can be the default)
1) D (Dump) show the contents of the specified memory modules (see the data with a number of general content, namely, DS section):
Format: d [address] from [address] the designated memory cell shows the contents of 128 bytes
[Address] by default, display the contents of the back of a DUMP command
d address range display the contents of the specified range of memory.
Example:-d100 show from the beginning of the content of DS Section 100H (hexadecimal display)

2) E (Enter) modify the contents of memory cells (typically in the DS section)
Format: e address [data] with a given [the data] to replace the contents of the specified range of storage units
e address of the memory cell changes the contents of a specified
Example:-e ds: 200''djx''FF00AA DS segment can be started from 200 to 205 of content for
For the 64 6A 78 FF 00 AA

3) G (GO) to run the command
Format:-g [= address] [break address 1 [breakpoint address 2 ... [breakpoint address 10]]]
From the specified [address] to start the implementation process (such as the address of the default from the current CS: IP starting), run to the [Breakpoint Address 1] to stop, show the contents of all registers and flags with the next instruction, such as after that there are breakpoints, can type g, continue.
Example:-g001a the execution from the current cs: ip to 001a of Directive
Note: Address setting must be set from the command from the first byte.

4) T (Trace) to execute a statement
Format:-t [= address] from the specified [address], after a statement from the implementation of the stop to show the contents of all registers and flags of the value of the next instruction. Such as [address] the default from the current CS: IP starting execution
-T [= address] [value] since the implementation of value from the specified address after the instruction to stop.

5) P (proceed) to perform a loop; a soft interrupt or subroutine call
Format:-p [= address] [n]
Example: mov ah, 02h
mov dl, 41h
int 21h
This time with:-p Enter the system will display a character A, if not in the P, while the switch T, then the system will enter the INT 21H interrupt call, get out, then you will think you program code is wrong, some attention!!

6) R (register) display and can modify the register contents
Format:-r Display the contents of all registers
-R register name changes the contents of the specified register (can be changed: AX, BX, CX, DX, SP,
BP, SI, DI, CS, DS, ES, SS, PC, IP, F)

7) U (Unassemble) disassemble
Format:-u [address] from a specified [address] Disassembly of 32 bytes, if the [address] from the current address of the default compilation of 32 bytes.
-U address range within the specified storage unit disassembly

These are the debugger commands may be used to explain DEBUG, DEBUG there are other commands will not be used in the inspection process, it is no longer introduced.

PROCEDURE g: program compiled well, it all OK!!! An assignment away with it! Eat, sleep.

The following procedure gives a wrong sentences, I hope you join me in debug, modify and adopt:
PROCEDURE a first implementation of the source code editor
Implementation function: on the screen: Hello world
My name is DJX
File Name: error.asm
Line number: source code:

1 data segment
2 out1 db''Hello world''
3 ax db''My name is DJX''
4 data ens
5
6 code segment
7 assume cs: code; ds: data
8 lea dx, out1
9 mov ah, 2
10 int 21h
11
12 mov dl, 0ah
13 mov ah, 2
14 int 21h
15 mov dl, 0dh
16 moo ah, 2
17 int 21h
18
19 lea dx, ax
20 mov ah,
21 int 21h
22 code ends

After you edit the implementation of the PROCEDURE b compile with masm: masm error Enter revealed the following:
Microsoft (R) Macro Assembler Version 5.00
Copyright (C) Microsoft Corp 1981-1985, 1987. All rights reserved.

Object filename [error.OBJ]:
Source listing [NUL.LST]:
Cross-reference [NUL.CRF]:
End of file encountered on input file
error.ASM (23): warning A4085: End of file, no END directive
Open segments: DATA
error.ASM (3): warning A4016: Reserved word used as symbol: AX
error.ASM (4): error A2105: Expected: instruction or directive
error.ASM (16): error A2105: Expected: instruction or directive
error.ASM (19): error A2049: Illegal use of register
End of file encountered on input file
error.ASM (23): warning A4085: End of file, no END directive

51566 + 406450 Bytes symbol space free

2 Warning Errors
4 Severe Errors

Illustrate this process wrong, and wrong in the first 3,4,16,19,23 line,
Let us go one by one, checking the implementation of PROCEDURE c
Third row: 3 ax db''My name is DJX''
Its error is not as variable names AX, corrections:
3 out2 db''My name is DJX''
Note that we have just AX for the variables defined in the following process variables AX''used''in the 19th row
19 lea dx, ax
Also reported in the error report, the first 19 lines wrong, because the effective address can not be assigned AX DX, corrections:
19 lea dx, out2
This solved two mistakes about
Fourth row: 4 data ens
The end of a section of this act, but the statement is missing playing letters, corrections:
4 data ends
16th row: 16 moo ah, 2
This line is also the statement wrong, correct:
16 mov ah, 2
Twenty-three lines:
Error message: error.ASM (23): warning A4085: End of file, no END directive
The end of the present procedures do not counterfeit operations, corrections:
Adding: In the seventh, eight lines to address flag: start:
The original 23 end start

PROCEDURE a source code implementation will be amended as follows:

data segment
out1 db''Hello world''
out2 db''My name is DJX''
data ends

code segment
assume cs: code; ds: data
start:
lea dx, out1
mov ah, 2
int 21h

mov dl, 0ah
mov ah, 2
int 21h
mov dl, 0dh
mov ah, 2
int 21h

lea dx, out2
mov ah, 9
int 21h
code ends
end start

PROCEDURE b compile again, the screen shows:

Microsoft (R) Macro Assembler Version 5.00
Copyright (C) Microsoft Corp 1981-1985, 1987. All rights reserved.

Object filename [error.OBJ]:
Source listing [NUL.LST]:
Cross-reference [NUL.CRF]:
51524 + 406492 Bytes symbol space free

0 Warning Errors
0 Severe Errors

This procedure is no longer an error on the statement.
Executive PROCEDURE d connected again for the executable file (link error return), the screen displays:

Microsoft (R) Overlay Linker Version 3.60
Copyright (C) Microsoft Corp 1983-1987. All rights reserved.

Run File [ERROR.EXE]:
List File [NUL.MAP]:
Libraries [. LIB]:
LINK: warning L4021: no stack segment

Then error.exe executable file already exists, you can perform PROCEDURE e to run to see if the correct
In the dos prompt, type: error carriage return (be careful!!!)
Screen: garbled, and crash. reset My computer!
Help program logic error, and serious.
This is necessary to use the PROCEDURE f, with the debugging tools to debug and find the error.
In the DOS prompt, type: debug error.exe Enter
Screen appears - prompt, then you can use the DEBUG command came to mistake,
First, I use the d command to view the data area and content, the development of the two strings are not defined in the data section of the first paragraph, and in the data segment location within the 100h, when he come to have an unwritten rule masm, End of data that is in the definition section, the variables are defined 100h units back, we need to ds segment register set, the program's start: add the following directives: (Executive PROCEDURE a)
mov ax, data
mov ds, ax
Further implementation of the PROCEDURE b, PROCEDURE d, PROCEDURE e to run the program,
Screen Display:
Wrap
My name is DJX and garbled, and crash. (Have to reboot!)
PROCEDURE a re-implementation of the inspection process, that:
1. Assembly language are provided by the $ at the end of each string
2. The first string in the output statement in the AH sub-functions should be No. 09H
The above two corrections.
Further implementation of the PROCEDURE b, PROCEDURE d, PROCEDURE e to run the program,
Screen Display:
Hello world
My name is DJX and crash and can not return to DOS
Analysis, in the program did not return DOS commands, corrections:
PROCEDURE a used to edit:
Using DOS 21H interrupt 4cH submenu to return to the DOS, add the code ends before:
mov ah, 4ch
int 21h
Further implementation of the PROCEDURE b, PROCEDURE d, PROCEDURE e to run the program,
Screen Display:
Hello word
My name is DJX
And return to DOS
Success!
Completion of the commissioning of such a program, and correctly.
The following is the correct source:

data segment
out1 db''Hello world $''
out2 db''My name is DJX $''
data ends

code segment
assume cs: code; ds: data
start:
mov ax, data
mov ds, ax

lea dx, out1
mov ah, 9
int 21h

mov dl, 0ah
mov ah, 2
int 21h
mov dl, 0dh
mov ah, 2
int 21h

lea dx, out2
mov ah, 9
int 21h

mov ah, 4ch
int 21h
code ends
end start

The above procedure is simple, just to illustrate the realization of assembly language programming and debugging process on the machine, assembly language to be more practice to master its characteristics, in order to successfully pass the exam.






相关链接:



Evaluate Chat And Instant Messaging



Shenzhen Julong Year Launched China's First Six-generation LCD Line



"Sacred 2 Fallen Angel," Raiders Special mounts detailed process



Excellent Fujitsu UD board really gives whiteboard courseware courseware second life



MII further notice irregularities SP will be ordered to Stop



MKV to PSP



DOS, also use Flash tips



RM to AVI



SATA Disk Drives Imperfection



Best Search Or Lookup Tools



AVI TO FLV



3DS Max 7 Mental Ray Renderer Whole Strategy: Global Illumination



Lists Tools And Editors



How out of the trap of pseudo-BI



My favorite Animation Tools



mdcrashreporttool exe has stopped Working



Sunday, October 10, 2010

Using VMware, vowed to computer "cloned a technique"


On what basis the virtual machine software, the temptation to you?

鈽?want to try Linux, do not re-partition, as installed software, like Office for Windows in the early adopters of you directly.
鈽?can repeatedly practice Fdisk, PQmagic other dangerous software to use without fear of destruction of the actual computer system.
鈽?a computer into a three, four, run multiple operating systems is no longer a fantasy, to delete a folder as long as the operating system to complete uninstall.
鈽?formation of virtual local area network, network management easy to learn, to conduct a variety of network test, no need to buy switches, routers, and cable and other network equipment.

1. What is a virtual machine?

The so-called virtual machine (the virtual machine), is actually an application, broadly speaking Word, WPS also be regarded as a virtual machine, but they can only do it word-processing machines. Today we will introduce the narrow VMware virtual machine software, in fact only an application, its special feature is that virtual machines created by it and the real computer is almost exactly the same, not only has its own virtual CPU, memory, hard drive , drive, and even their own BIOS. In the virtual machine, you can install Windows, Linux and other real operating system, and a variety of applications.

2. The election which virtual machine software?

The popular virtual machine software with VMware and Virtual PC, they can be out in the virtual Windows system on multiple computers, used to install Linux, OS / 2, FreeBSD and other operating systems. Microsoft acquired Connectix in February 2003 soon after the release of Microsoft Virtual PC 2004. But due to various considerations, the new release of Virtual PC 2004 is no longer clear support for Linux, FreeBSD, NetWare, Solaris and other operating systems, retaining only the OS / 2, if a virtual Linux computer, only their own manual settings. In contrast, VMware, whether in support of multiple operating systems, or in the execution efficiency, significantly higher than Virtual PC 2004 for a raise, and this is one of the reasons this select it.

Computer and a change of two, learning to use Linux no longer have to worry about

VMware 4.5 with Workstation, GSX server and other versions, including Windows version of Workstation the most widely used, this paper is that it as the basis for a variety of combat exercises.

Example 1: In the existing Windows, then install a Linux

In this case, we will in the actual Windows XP (the host computer) and then out of a virtual computer (virtual machine) and install the Linux system in the above so that you can safely carry out a variety of Linux operating practice without fear host due to improper system collapsed. And you can judge the whole, a computer will become three, four, and then the rest of the system were installed.

Old bird to Return Weapon

What kind of configuration of the computer for the establishment of a virtual machine?

When the hardware configuration fail, the virtual machine is running too slow, can not even run, VMware's configuration requirements are as follows.
CPU: minimum frequency 266MB, recommended P3 1GHz or above;
Memory: minimum 128MB, recommended 512MB;
Hard Disk: minimum free space 600MB, recommended free space 5GB;
Operating system: Windows NT kernel operating system must be recommended Windows 2000 SP2 or later.

The first step: start VMware, in its main interface, "Home" tab click "New Virtual Machine" button to open the New wizard (because the difference in English and Chinese characters, Chinese Version here show incomplete text, see Figure 1).



Step Two: Click the "Next" button to enter the virtual machine configuration interface, there are two options: One is "typical" way, it uses under the automatic adjustment of the virtual machine configuration; second is "Custom" mode, it allows users to set their own main parameters of the virtual machine. Way than the typical custom is simple, but the lack of flexibility. Convenience, here we choose the typical way.

Step Three: Click the "Next" button to enter the virtual machine operating system select screen, you can see Windows, Linux, Novell and many different systems, here we select "Linux". Linux is divided into multiple versions, I do have a Red Hat Linux 8.0, naturally want to select "Red Hat Linux" entry of the.

Step Four: Click "Next" in the next interface, for the new virtual machine a name (in this case "Red Hat Linux"), and "positioning" stored in the selected virtual machine position (see Figure 2).



Old bird to Return Weapon

Each virtual machine will have a number of special file formats, so it is best for each virtual machine to create a separate folder, such as Linux to put "Linux" folder, Windows 98 will put "Win98" folder This easy to backup and restore virtual machines later.

Step Five: Click "Next", type in the web interface there are four options: "Use bridged networking", "use Network Address Translation (NAT)", "only using the host network," "do not use the network connection. " After the network connection can be modified at any time, so here can first arbitrarily choose one.

Step Six: Click the "Next", then will ask the user to set the size of hard drives, software, the default size is 4GB, available hard disk space can increase or decrease the actual situation. Finally click "Finish" button to return to the main interface, VMware, will see the main interface, one more "Red Hat Linux" tab, which displays the new virtual machine that sets the various configuration (see Figure 3).



Step Seven: The following is the virtual machine to install on Linux operating system, as it work like a real computer. Before installing, first click the virtual machine's CD-ROM set. In the interface shown in Figure 3, double-click the "equipment" under the "CD-ROM" entry, open the configuration window (see Figure 4).



This example uses the Linux installation CD, so click on the "Use physical drive" entry, and in the drop-down list, select the correct drive letter (in this case the drive letter for the "J"); if downloaded from the Internet ISO installation image file, then click the "Use ISO image" item, and through the "Browse" button to select download files from the installation image. Is set up, click "OK" button.

Step eight: The Red Hat Linux installation CD into your optical drive (if selected "Use ISO image" means you do not need this step), click on the main interface "command" in "Start this virtual machine", or click Tools bar green triangle button, which opens like a real computer, like the power switch to start the virtual machine. Note: If the physical memory pressure, it will pop up a prompt box that prompts a virtual opportunity to take up a lot of memory, click "OK" button. If you check the "no show" items, the next time this tip will no longer appear.

After the black window, be sure to use the mouse click in the middle to switch to the virtual machine. VMware simulation is Phoenix's BIOS, continuously press the F2 key until you reach the BIOS settings screen, press the left and right arrow keys to select the "BOOT" menu item, then up and down arrow keys to select "CD-ROM Drive" entry, then press "+ "was transferred to the top level of its key, so that priority can be set to start the drive. Press F10 key and press Enter to save the BIOS settings and exit the virtual machine to start the Linux installation program to install the. Click on the toolbar penultimate button allows the virtual machine full screen, it will look more cool.

Linux installation and use is a big topic of the limited space, not presented here. But be sure the virtual machine is actually just a few more specific documents, all of which operate only a few files to change the data, will not affect the existing operating system, so you can rest assured that for Linux to practice.

Old bird to Return Weapon

Switch to the virtual machine, it will shield the host computer (in this case is Windows XP) all the mouse or keyboard operation, including Alt + Tab key combination to switch operation. But you can press Ctrl + Alt key combination back to XP, the virtual machine in full screen mode, they can use this combination to go back to XP.
Virtual machine restart, shutdown, etc. for both the virtual host computer, but the virtual machine operating system installed is genuine. Therefore, the installed operating system, virtual machine, as first through "Start" menu off, and finally click the box on the toolbar button (the first icon from left) turn off the virtual machine's power. Can not force shut down the virtual machine power supply, or when the next time you start the virtual machine will be the same as the real test of computer disks.

Just Do It

NTFS partition upload Windows 98

NTFS file system is not only more efficient than FAT32 is high and security is greatly enhanced, such that it can set the folder access password. But NTFS hard disk is not installed Windows 98, if some software must be running under 98, you may wish to draw the above method to create a Windows 98 virtual machine.

鈽?virtual machine floppy drive can also be used, use it to start the Windows 98 installation program, use the same methods and drive, can be found in this case, the seventh step. If there is no boot floppy, use vFloppy the BOOTDISK.img image file instead. Note: If the default is not to create a virtual machine floppy drive entry, please refer to below "Add a second hard disk" method to add.

鈽?beginning to be a way to start the installation floppy disk priority program, and in the process of installing Windows 98 will restart the system, then in accordance with the F2 key to enter the BIOS to manually set the hard disk boot priority (refer to the case of the eighth step in the method ), can only go on a normal installation.

Example 2: Virtual hardware upgrade free

In real life, whether to expand or upgrade memory, hard drive, spend money, and in the virtual machine, you can always modify the virtual machine's hardware configuration, upgrade it for free.

Click the appropriate tab virtual machine, in which the click on the "Edit virtual machine settings", or click menu "Virtual 鈫?Settings", can open the configuration window, shown in Figure 5.



1. Increase or decrease the memory

Equipment list on the left select the "memory" key, then drag the right side, "This virtual machine's memory size" under the slider, you can set the virtual machine memory size used (see Figure 5). Note that the virtual machine memory settings too large beyond the actual physical memory, virtual machines will not run, then a small memory can be properly adjusted and then try.

2. Add a second hard drive

Click the "Add" button, increase the Hardware Wizard, click "Next" after the type of hardware interface options, select the "hard", then click "Next" button, you are prompted to set the hard disk format, size, location of hard disk file and other information, you can add a second hard disk for the virtual machine.

Old bird to Return Weapon

For the virtual machine's hard disk defragging

Real need for regular defragging the hard disk, the virtual machine's hard drive is this: select "hard", and in the right side click on "Disk Defragmenter" button, the software will very quickly order the virtual machine hard disk fragments.


3. Unplug the network card

In the device list select the "NIC" item, click on "delete" button to remove the virtual machine on the network card.

4. To understand a virtual machine flash drive

Select the "USB controller", and in the right side select the "new USB device when access to automatically connect to the virtual machine", after the host computer's USB interface into flash after-hours, the host computer and virtual machine on will automatically load the driver, identified flash drive.

Example 3: Virtual machine has Internet access

Since virtual machines can communicate with the host computer, so too will the real computer like the same LAN, sharing the host computer's Internet connection. Here, with the host computer to a virtual dial-up Internet access ADSL, dial-up connection to share the method with an example.

Step one: Click the menu VMware "virtual 鈫?Settings", then click on LAN NIC and set its properties, can "bridge", "NAT", "host only" in either one, but be sure to remember the selected projects.

Step two: the host computer's IP address as the network connection automatically.
The third step: the host computer, "Network and Dial-up Connections" window, right-click the ADSL virtual dial-up connection, select "Properties" command in the "Sharing" tab within the select "Enable Internet Connection Sharing for this connection", and then virtual machine network card work select a network connection (see Figure 6), the specific correspondence as follows:



Bridge - local connection

NAT-VMware Network Adapter VMnet8
Only host-VMware Network Adapter Vmnet1

Step four: the host computer to enable the network connection, the corresponding IP address of the network connection is automatically set to 192.168.0.1. Therefore, the need to set the virtual machine IP address for the 192.168.0.X (X ranges from 2 to 254), also make DNS server addresses, default gateway are set to 192.168.0.1. In this way, the Internet host computers, the virtual machine also can be shared by the host computer online.

Old bird to Return Weapon

How to remove an existing virtual machine?

In the "common" in the right-click the corresponding item, and select "Remove from the commonly used", then click the appropriate tab on the right side, right-click and select "Close" button. At this point can be the appropriate folder under the virtual machine files are deleted, but if you do not delete these files, then the next can also "File 鈫?Open Virtual Machine" command to retrieve it.

VMware Application Made Easy

1. Enhance the multimedia capabilities of the virtual machine

Installed in the virtual machine Windows, by default, only 16 colors, but also sound, with a computer far from real life. To improve the effectiveness of multimedia virtual machine, VMware for everyone to prepare a set of software tools known as the VMware tools. Its main functions are as follows:

(1) analog video card, so the virtual machine to support 32-bit display and high resolution.

(2) the host computer and enable time synchronization between the virtual machine.

(3) does not install VMware tools, the need to use the keyboard keys Ctrl + Alt to release the virtual machine bound mouse. The installation of VMware tools, the mouse can be in a virtual machine, move freely between the host, switch.

(4) allows the host and client or between virtual machines from one to another directly between virtual machines to copy and paste operations.

Start the virtual machine on Windows, click menu "Virtual 鈫?Install Virtual Machine Tools", will drive in the virtual machine to load the appropriate version of VMware tools, and then automate the installation process, we have to do is a few clicks OK button only.

2. Interception boot screen

Can be crawling in the VMware boot screen, BIOS interface, the operating system interface and other special interface to install, click the menu "File 鈫?capture screen image" command, will be able to run virtual machine images are preserved.

3. Recognize the virtual hard disk SCSI interface

If the virtual machine's hard drive is a SCSI interface, the simulation of hard disk (which is the default virtual machine), when you install Windows 2000 will prompt can not find hard drive solution is to add a virtual floppy drive home from the VMware Download VMware-back BusLogic-SCSIDriver-1.2.0.0.flp file, and then start the Windows 2000 Setup time, press the F6 key to load from the floppy drive, will be able to install Windows 2000 on a virtual SCSI hard drives.

4. Test dangerous software

The so-called dangerous software are those who have not been rigorously tested, may have hurt the software system to produce unknown. In the virtual machine to install a system is also very time-consuming, so the dangers in testing before the software can back up what the virtual machine files to quickly restore the virtual machine.

(1) backup the virtual machine

On the host computer, the VMware virtual machine is just a few files only. VMware to create virtual machines in the process, one step is to ask you to save the file where the virtual machine, when we installed the operating system for the virtual machine and set, you can be in this folder so all files a backup, when the virtual machine when problems arise, as long as the backup files to be overwritten with what, on what issues are resolved.

(2) virtual machine is also a key recovery

VMware also offers a Restore feature, any time you can click on the toolbar's "Snapshot" button to save the current system state, a problem once the virtual machine, you can click on the "Restore" button, the system back to the problem as before.

5. Review under the old DOS game

Some players may often nostalgic recalling of the DOS game 486 times, but now find a computer to install the DOS system is not easy things. By VMware to create a DOS virtual machine, select the operating system for virtual machine, first choose "other" and then selected from the following drop-down list of "DOS"; but the DOS boot disk into the floppy drive (can also use the DOS boot image files), start the system can be installed DOS. The use of virtual machine floppy drive and optical drive is similar to here is not presented.

6. Virtual machine host to share a folder?

Step one: Click the menu VMware "virtual 鈫?Settings" in the configuration window's "Options" tab and click on the "shared folder" in right click on the "Add" button to add to the shared folder.

Step two: a virtual Windows XP, for example, start the virtual machine, right-click "My Computer" select "Map Network Drive" command, click the "Browse" button, the "entire network" under the select "VMware Shared Folders" under the the appropriate directory, you can put in a virtual machine shared folder mapped to drive.

A good partner-VMware DiskMount VMware

Generally established for the VMware virtual machine hard disk, can only start after the adoption of VMware virtual machine, view the contents of this inconvenience for the user management. To solve this problem, VMware has introduced a tool called VMware DiskMount (Download: http://vmware-svca.www.conxion.com/software/VMware-mount-3.1.0-9089.exe), it VMware virtual machine allows users to create virtual disks directly attached to the Windows host system's file system, do not start the VMware to view its contents.

Each is mounted virtual disk has a separate letter, we can read and write local physical disks as the same, arbitrary read and write virtual disk, as if it really is a partition on the Windows host. By VMware DiskMount tools virtual disk and easily transfer files between the host system.

VMware DiskMount is a command line tool, the command format is as follows:

VMware-mount [options] [drive letter:] [\ pathtovirtual disk]

Parameter definition

/ V: N mapping virtual disk in the first n partitions (volumes), n default equal to 1.
/ P display the virtual disk partitions (volumes).
/ D deletion mapping.
/ F force delete the mapping.
/ N does not open a snapshot and virtual disk in use.
/ Y regardless of whether a snapshot of all open with.
/? Show VMware-mount tool of use of information.

Example 1: to C: VMWw2k.vmdk H mapping system tray:

VMware-mount h: C: VMWw2k.vmdk

Example 2: the virtual disk C: VMWw2k.vmdk 2 in the district map for the system H-disk:

VMware-mount / v: 2 h: C: VMWw2k.vmdk

Example 3: to lift the mapping of virtual disks:

VMware-mount h: / d or VMware-mount h: / f force delete the mapping.







相关链接:



Flash the perfect Lover



DivX to VOB



FLV to 3GP



Complementary to IPSec VPN SSL VPN



Flash Tools Directory



Essays on CMMI [1]



Planning red boiler out of the discrete uniform



Gartner: Q4 PC shipments in Asia-Pacific region Surged 32.6 percent year on year



Refused to applaud for the rotten tomatoes



TS to WMV



Log multiple Gmail accounts at the same time - Firefox extension



Hot PIMS And Calendars



CorelDRAW 12 step by step (3) - Basic image creation and editing curves



Picked Personal Finance



The Ps3 Ylod Fix The Yellow Light Of Death