My Linux Book

Total Page:16

File Type:pdf, Size:1020Kb

My Linux Book My Linux Book Urs Lindegger My Linux Book Urs Lindegger Copyright © 2019-11-25 Urs Lindegger Table of Contents 1. Introduction .......................................................................................................... 1 Why again an other Linux Book .......................................................................... 1 About myself .................................................................................................... 1 Some terms ...................................................................................................... 2 TUX ........................................................................................................ 2 root ......................................................................................................... 3 Daemon ................................................................................................... 3 Zombie .................................................................................................... 3 N00b ....................................................................................................... 3 Gnu ......................................................................................................... 4 SoHo ....................................................................................................... 4 CamelCase ............................................................................................... 4 Foo, bar and foobar ................................................................................... 4 rc and init.d .............................................................................................. 4 shebang .................................................................................................... 4 Help ................................................................................................................ 4 Using the manual pages .............................................................................. 4 Man pages on the web ............................................................................... 5 Info pages ................................................................................................ 5 Using documentation from the packages ........................................................ 5 Writing your own man pages ....................................................................... 6 2. Working in the Console .......................................................................................... 7 The Console ..................................................................................................... 7 Console login ............................................................................................ 7 Terminals ................................................................................................. 8 Screen Manager ........................................................................................ 8 Working with bash .................................................................................... 8 Special characters .................................................................................... 11 Wild cards .............................................................................................. 11 Strings in Bash ........................................................................................ 12 Calculations ............................................................................................ 13 Command substitution .............................................................................. 13 Bash scripts ............................................................................................ 14 Bash processes ........................................................................................ 14 Bash variables ......................................................................................... 15 The [ program ......................................................................................... 19 Bracket overview ..................................................................................... 20 Debug of bash scripts ............................................................................... 20 Bash configuration ................................................................................... 22 Working with Windows ............................................................................ 22 Commands ...................................................................................................... 22 Midnight commander ................................................................................ 23 Text Web browser Links ........................................................................... 23 cat ......................................................................................................... 23 cd .......................................................................................................... 23 cp .......................................................................................................... 23 cut ......................................................................................................... 24 dd .......................................................................................................... 24 find ....................................................................................................... 24 grep ....................................................................................................... 25 ls ........................................................................................................... 25 more or less ............................................................................................ 26 mv ......................................................................................................... 26 rm and rmdir ........................................................................................... 26 strings .................................................................................................... 26 iv My Linux Book tail ......................................................................................................... 26 Time ...................................................................................................... 26 uname .................................................................................................... 26 watch ..................................................................................................... 27 Sed ................................................................................................................ 27 Filtering certain lines ................................................................................ 27 Sed Commands ........................................................................................ 28 Sed Options ............................................................................................ 28 Regular expressions .......................................................................................... 28 Character description ................................................................................ 28 Examples ................................................................................................ 28 Ranges of characters ................................................................................. 29 Localization .................................................................................................... 29 3. System ............................................................................................................... 31 Character encoding ........................................................................................... 31 ASCII .................................................................................................... 31 ASCII Table ........................................................................................... 31 UTF-8 .................................................................................................... 32 beep ....................................................................................................... 34 Hexadecimal ................................................................................................... 34 Booting .......................................................................................................... 35 BIOS ..................................................................................................... 35 BIOS update ........................................................................................... 35 UEFI ..................................................................................................... 36 Secure Boot ............................................................................................ 38 Bootloader .............................................................................................. 38 Booting the Kernel ........................................................................................... 40 SysVinit ................................................................................................. 41 systemd .................................................................................................. 45 Start up messages ............................................................................................ 48 Linux 32 bit and 64 bit ....................................................................................
Recommended publications
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Is -Open Source- a Keyword for a Successful Gis Development ?
    IS -OPEN SOURCE- A KEYWORD FOR A SUCCESSFUL GIS DEVELOPMENT ? Umit Isikdag(MSc,BSc) University of Salford,UK School of Construction & Property Management [email protected] 1.What is a Geographical Information System ? A GIS can be defined as an information system capable of assembling, storing, manipulating, and displaying geographically referenced information. GIS is also regarded as “a computer system for capturing, storing, checking, integrating, manipulating, analysing and displaying data related to positions on the Earth's surface. Typically, a Geographical Information System (or Spatial Information System) is used for handling maps of one kind or another. These might be represented as several different layers where each layer holds data about a particular kind of feature. Each feature is linked to a position on the graphical image of a map.”12 Figure 1.1-Typical Components of a GIS 1.1 The basic functions of a GIS The basic functions of a GIS are defined as13 capturing the data,integrating the data,projection and registration,sturucturing and modelling the data.The USGS web site(http://www.usgs.gov) defines these functions in detail as: Data Capture:Maps can be digitized, or hand-traced with at computer mouse, to collect the coordinates of features. Data capture - putting the information into the system - is the time-consuming component of GIS work. Identities of the objects on the map must be specified, as well as their spatial relationships. Editing of information that is automatically captured can also be difficult. Electronic scanners record blemishes on a map just as faithfully as they record the map features.
    [Show full text]
  • Experience with a Livecd in an Education Process
    EXPERIENCE WITH A LIVECD IN AN EDUCATION PROCESS Experience with a LiveCD in an education process Jan R˚uˇziˇcka, FrantiˇsekKl´ımek Institute of Geoinformatics Faculty of Mining and Geology, VSB-TUO E-mail: [email protected] Key words: LiveCD, GIS´akLiveCD, Distance Learning, E-learning Abstract The paper describes how can be LiveCD (Bootable CD) used for geoinformatics distance learn- ing. We have prepared one LiveCD with basic software for learning geoinformatics and we have some feedback from users and teachers. The paper should evaluate this feedback. LiveCD is a CD-ROM, that can be used as a bootable device. After booting from the CD, the user can access all resources compiled to the CD. There are operating system (usually based on GNU/Linux) and (user, desktop) software installed and configured to be used directly after boot. Our CD named GIS´akLiveCD contains basic GIS software such as UMN MapServer, GRASS, Quantum GIS, Thuban, JUMP, GPS Drive, Blender and we work on other soft- ware packages such as MapLab for UMN MapServer, PostGIS, GeoNetwork Open Source, CatMDEdit, gvSIG, uDIG. GIS´akLiveCD contains set of spatial data from the Czech Re- public. Main part of the CD are tutorials for GIS software. CD is open for other e-learning materials. Now we have about 20 students using our LiveCD and few other users that are not curently our students. The paper should show Pros & Cons of the LiveCD usage for a distance learning. LiveCD Live CD is bootable CD-ROM with operating system and installed and configured programs. It is ready to use as full installed system directly after boot from CD-ROM drive.
    [Show full text]
  • Excerpts of Chapters From
    Excerpts of Chapters from A Practical Guide to Ubuntu Linux® FOURTH EDITION Mark G. Sobell ISBN-13: 978-0-13-392731-3 CopyrightExcerpt © 2015 Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Blank Excerpt 3 Step-by-Step Installation 3Chapter3 In This Chapter Objectives Booting Ubuntu and Running a After reading this chapter you should be able to: Live Session. 56 Run a live session and use gnome-disks to view and Automatic Boot Sequence . 56 change disk partitioning Running a Live Session. 59 Install Ubuntu from a live session Installing from a Live Session . 60 Install Ubuntu using the Server Image Installing from the Desktop Modify system behavior using boot parameters Boot Menu . 61Excerpt Modify partitions during installation The ubiquity Graphical Installer. 61 The ubiquity Advanced Partitioning List the requirement and considerations for a dual- Screen. 67 boot configuration Advanced Installation. 71 Modifying Boot Parameters (Options) . 75 debian-installer: The Ubuntu Textual Installer . 78 gnome-disks: The GNOME Disk Utility . 88 Setting Up a Dual-Boot System . 91 5555 56 Chapter 3 Step-by-Step Installation Chapter 2 covered planning the installation of Ubuntu: determining the requirements; planning the layout of the hard disk; obtaining the files you need for the installation, including how to download and burn or write Desktop and Server Images to installa- tion media; and collecting information about the system. This chapter focuses on installing Ubuntu. Frequently the installation is quite simple, especially if you have done a good job of planning.
    [Show full text]
  • The GNOME Census: Who Writes GNOME?
    The GNOME Census: Who writes GNOME? Dave Neary & Vanessa David, Neary Consulting © Neary Consulting 2010: Some rights reserved Table of Contents Introduction.........................................................................................3 What is GNOME?.............................................................................3 Project governance...........................................................................3 Why survey GNOME?.......................................................................4 Scope and methodology...................................................................5 Tools and Observations on Data Quality..........................................7 Results and analysis...........................................................................10 GNOME Project size.......................................................................10 The Long Tail..................................................................................11 Effects of commercialisation..........................................................14 Who does the work?.......................................................................15 Who maintains GNOME?................................................................17 Conclusions........................................................................................22 References.........................................................................................24 Appendix 1: Modules included in survey...........................................25 2 Introduction What
    [Show full text]
  • 1. D-Bus a D-Bus FAQ Szerint D-Bus Egy Interprocessz-Kommunikációs Protokoll, És Annak Referenciamegvalósítása
    Az Udev / D-Bus rendszer - a modern asztali Linuxok alapja A D-Bus rendszer minden modern Linux disztribúcióban jelen van, sőt mára már a Linux, és más UNIX jellegű, sőt nem UNIX rendszerek (különösen a desktopon futó változatok) egyik legalapvetőbb technológiája, és az ismerete a rendszergazdák számára lehetővé tesz néhány rendkívül hasznos trükköt, az alkalmazásfejlesztőknek pedig egyszerűen KÖTELEZŐ ismerniük. Miért ilyen fontos a D-Bus? Mit csinál? D-Bus alapú technológiát teszik lehetővé többek között azt, hogy közönséges felhasználóként a kedvenc asztali környezetünkbe bejelentkezve olyan feladatokat hajtsunk végre, amiket a kernel csak a root felasználónak engedne meg. Felmountolunk egy USB meghajtót? NetworkManagerrel konfiguráljuk a WiFi-t, a 3G internetet vagy bármilyen más hálózati csatolót, és kapcsolódunk egy hálózathoz? Figyelmeztetést kapunk a rendszertől, hogy új szoftverfrissítések érkeztek, majd telepítjük ezeket? Hibernáljuk, felfüggesztjük a gépet? A legtöbb esetben ma már D-Bus alapú technológiát használunk ilyen esetben. A D-Bus lehetővé teszi, hogy egymástól függetlenül, jellemzően más UID alatt indított szoftverösszetevők szabványos és biztonságos módon igénybe vegyék egymás szolgáltatásait. Ha valaha lesz a Linuxhoz professzionális desktop tűzfal vagy vírusirtó megoldás, a dolgok jelenlegi állasa szerint annak is D- Bus technológiát kell használnia. A D-Bus technológia legfontosabb ihletője a KDE DCOP rendszere volt, és mára a D-Bus leváltotta a DCOP-ot, csakúgy, mint a Gnome Bonobo technológiáját. 1. D-Bus A D-Bus FAQ szerint D-Bus egy interprocessz-kommunikációs protokoll, és annak referenciamegvalósítása. Ezen referenciamegvalósítás egyik összetevője, a libdbus könyvtár a D- Bus szabványnak megfelelő kommunikáció megvalósítását segíti. Egy másik összetevő, a dbus- daemon a D-Bus üzenetek routolásáért, szórásáért felelős.
    [Show full text]
  • EMS Web App Installation, Configuration, & User Guides May 2019
    EMS Web App Installation, Configuration, & User Guides May 2019 Accruent, LLC 11500 Alterra Parkway, Suite 110, Austin, TX 78758 www.accruent.com Accruent Confidential and Proprietary, copyright 2019. All rights reserved. This material contains confidential information that is proprietary to, and the property of, Accruent, LLC. Any unauthorized use, duplication, or disclosure of this material, in whole or in part, is prohibited. No part of this publication may be reproduced, recorded, or stored in a retrieval system or transmitted in any form or by any means—whether electronic, mechanical, photographic, or otherwise—without the written permission of Accruent, LLC. The information contained in this document is subject to change without notice. Accruent makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Accruent, or any of its subsidiaries, shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. Accruent Confidential and Proprietary © 2019 Page | i Table of Contents CHAPTER 1: EMS Web App Installation Guide 1 Contact Customer Support 2 CHAPTER 2: EMS Web App (V44.1) Introduction 3 Introduction to the EMS Web App 3 Installation Requirements 3 Upgrade Considerations 3 Contact Customer Support 4 CHAPTER 3: System Architecture 5 CHAPTER 4: Prerequisites and Requirements 7 Prerequisites 7 EMS Database Server Requirements
    [Show full text]
  • Bigfix Content Sites
    BigFix Content Sites Open Source Licenses and Notices June, 2010 BigFix® Content Sites Open Source Licenses and Notices BigFix delivers its various applications that run on the BigFix Platform through a series of content sites. These content sites contain programs that include the open source software listed below. A list of content sites is attached as Appendix A. The software listed below may be included in only one site or multiple sites. Please contact BigFix at [email protected] if you would like more information regarding which specific open source software components are included on which BigFix content sites and how the content sites correspond to BigFix products. (1) Adobe Auto Complete Copyright (C) 2003‐2006 Adobe Macromedia Software LLC and its licensors. All Rights Reserved. The following is Source Code and is subject to all restrictions on such code as contained in the End User License Agreement accompanying this product. Modified by Jens Krause [www.websector.de] to avoid issues using Flex 3 @see: http://www.websector.de/blog/2008/04/30/quick‐tip‐avoid‐issues‐using‐ adobes‐autocomplete‐input‐component‐using‐flex‐3/ (2) AlivePDF No copyright information is provided in the file for AlivePDF. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
    [Show full text]
  • Complete Issue 40:3 As One
    TUGBOAT Volume 40, Number 3 / 2019 General Delivery 211 From the president / Boris Veytsman 212 Editorial comments / Barbara Beeton TEX Users Group 2019 sponsors; Kerning between lowercase+uppercase; Differential “d”; Bibliographic archives in BibTEX form 213 Ukraine at BachoTEX 2019: Thoughts and impressions / Yevhen Strakhov Publishing 215 An experience of trying to submit a paper in LATEX in an XML-first world / David Walden 217 Studying the histories of computerizing publishing and desktop publishing, 2017–19 / David Walden Resources 229 TEX services at texlive.info / Norbert Preining 231 Providing Docker images for TEX Live and ConTEXt / Island of TEX 232 TEX on the Raspberry Pi / Hans Hagen Software & Tools 234 MuPDF tools / Taco Hoekwater 236 LATEX on the road / Piet van Oostrum Graphics 247 A Brazilian Portuguese work on MetaPost, and how mathematics is embedded in it / Estev˜aoVin´ıcius Candia LATEX 251 LATEX news, issue 30, October 2019 / LATEX Project Team Methods 255 Understanding scientific documents with synthetic analysis on mathematical expressions and natural language / Takuto Asakura Fonts 257 Modern Type 3 fonts / Hans Hagen Multilingual 263 Typesetting the Bangla script in Unicode TEX engines—experiences and insights Document Processing / Md Qutub Uddin Sajib Typography 270 Typographers’ Inn / Peter Flynn Book Reviews 272 Book review: Hermann Zapf and the World He Designed: A Biography by Jerry Kelly / Barbara Beeton 274 Book review: Carol Twombly: Her brief but brilliant career in type design by Nancy Stock-Allen / Karl
    [Show full text]
  • A High Performance Ldm Data Cluster
    55 A HIGH PERFORMANCE LDM DATA CLUSTER Robert C. Lipschutz, David Hagerty*, Paul Hamer, Peter Lannigan*, and Chris MacDermaid Cooperative Institute for Research in the Atmosphere (CIRA) Colorado State University, Fort Collins, Colorado USA, and NOAA Earth System Research Laboratory (ESRL), Boulder, Colorado USA *NOAA Earth System Research Laboratory (ESRL), Boulder, Colorado USA Contract with Riverside Technology, Inc., Fort Collins, Colorado USA 1. INTRODUCTION Data Manager (LDM) have enabled us to construct a high performance real-time data Within the NOAA Earth System Research processing environment that serves the GSD Laboratory (ESRL), the Global Systems Division community. Given the central role of LDM in the (GSD) develops weather information systems, architecture, we particularly focus on the how weather forecast models, and other applications LDM provides cluster services for data transport, in support of the National Weather Service, the and on the use of event notifications in LDM. Federal Aviation Administration, and other agencies. Well-known GSD products include the 2. LIMITATIONS OF THE HA ARCHITECTURE Rapid Update Cycle (RUC) model, the Local Analysis and Prediction System (LAPS), the While GSD's HA pairs have operated Meteorological Assimilation Data Ingest System successfully for a number of years (MADIS), and Science On a Sphere® (SOS). A (Lipschutz and MacDermaid, 2005), and provided common feature of these and other projects is robust availability through their automated fail- that they require observational and model data over mechanism, a major drawback has been the provided by acquisition systems running within need for two machines, one of which is mostly GSD’s Central Facility. These systems handle idle, to support a single processing configuration.
    [Show full text]
  • Kali Linux Penetration Testing Bible
    Telegram Channel : @IRFaraExam Table of Contents Cover Title Page Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Telegram Channel : @IRFaraExam Summary CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary CHAPTER 10: Linux Privilege Escalation Telegram Channel : @IRFaraExam Introduction to Kernel Exploits and Missing Configurations
    [Show full text]
  • Linux: Come E Perchх
    ÄÒÙÜ Ô ©2007 mcz 12 luglio 2008 ½º I 1. Indice II ½º Á ¾º ¿º ÈÖÞÓÒ ½ º È ÄÒÙÜ ¿ º ÔÔÖÓÓÒÑÒØÓ º ÖÒÞ ×Ó×ØÒÞÐ ÏÒÓÛ× ¾½ º ÄÒÙÜ ÕÙÐ ×ØÖÙÞÓÒ ¾ º ÄÒÙÜ ÀÖÛÖ ×ÙÔÔ ÓÖØØÓ ¾ º È Ð ÖÒÞ ØÖ ÖÓ ÓØ Ù×Ö ¿½ ½¼º ÄÒÙÜ × Ò×ØÐÐ ¿¿ ½½º ÓÑ × Ò×ØÐÐÒÓ ÔÖÓÖÑÑ ¿ ½¾º ÒÓÒ ØÖÓÚÓ ÒÐ ×ØÓ ÐÐ ×ØÖÙÞÓÒ ¿ ½¿º Ó׳ ÙÒÓ ¿ ½º ÓÑ × Ð ××ØÑ ½º ÓÑ Ð ½º Ð× Ñ ½º Ð Ñ ØÐ ¿ ½º ÐÓ ½º ÓÑ × Ò×ØÐÐ Ð ×ØÑÔÒØ ¾¼º ÓÑ ÐØØÖ¸ Ø×Ø ÐÖ III Indice ¾½º ÓÑ ÚÖ Ð ØÐÚ×ÓÒ ¿ 21.1. Televisioneanalogica . 63 21.2. Televisione digitale (terrestre o satellitare) . ....... 64 ¾¾º ÐÑØ ¾¿º Ä 23.1. Fotoritocco ............................. 67 23.2. Grafica3D.............................. 67 23.3. Disegnovettoriale-CAD . 69 23.4.Filtricoloreecalibrazionecolori . .. 69 ¾º ×ÖÚ Ð ½ 24.1.Vari.................................. 72 24.2. Navigazionedirectoriesefiles . 73 24.3. CopiaCD .............................. 74 24.4. Editaretesto............................. 74 24.5.RPM ................................. 75 ¾º ×ÑÔ Ô ´ËÐе 25.1.Montareundiscoounapenna . 77 25.2. Trovareunfilenelsistema . 79 25.3.Vedereilcontenutodiunfile . 79 25.4.Alias ................................. 80 ¾º × ÚÓÐ×× ÔÖÓÖÑÑÖ ½ ¾º ÖÓÛ×Ö¸ ÑÐ ººº ¿ ¾º ÖÛÐРгÒØÚÖÙ× Ð ÑØØÑÓ ¾º ÄÒÙÜ ½ ¿¼º ÓÑ ØÖÓÚÖ ÙØÓ ÖÖÑÒØ ¿ ¿½º Ð Ø×ØÙÐ Ô Ö Ð ×ØÓÔ ÄÒÙÜ ¿¾º ´ÃµÍÙÒØÙ¸ ÙÒ ×ØÖÙÞÓÒ ÑÓÐØÓ ÑØ ¿¿º ËÙÜ ÙÒ³ÓØØÑ ×ØÖÙÞÓÒ ÄÒÙÜ ½¼½ ¿º Á Ó Ò ÄÒÙÜ ½¼ ¿º ÃÓÒÕÙÖÓÖ¸ ÕÙ×ØÓ ½¼ ¿º ÃÓÒÕÙÖÓÖ¸ Ñ ØÒØÓ Ô Ö ½½¿ 36.1.Unaprimaocchiata . .114 36.2.ImenudiKonqueror . .115 36.3.Configurazione . .116 IV Indice 36.4.Alcuniesempidiviste . 116 36.5.Iservizidimenu(ServiceMenu) . 119 ¿º ÃÓÒÕÙÖÓÖ Ø ½¾¿ ¿º à ÙÒ ÖÖÒØ ½¾ ¿º à ÙÒ ÐÙ×ÓÒ ½¿½ ¼º ÓÒÖÓÒØÓ Ò×ØÐÐÞÓÒ ÏÒÓÛ×È ÃÍÙÒØÙ º½¼ ½¿¿ 40.1.
    [Show full text]