{"type":"rich","blog_title":".h2o\u306e\u304a\u6c17\u697d\u65e5\u8a18","categories":["\u8aad\u66f8"],"provider_name":"Hatena Blog","blog_url":"https://dot-h2o2.hatenadiary.org/","published":"2009-07-30 00:00:00","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fdot-h2o2.hatenadiary.org%2Fentry%2F20090730%2Fp1\" title=\"GNU \u958b\u767a\u30c4\u30fc\u30eb\uff08GNU Development Tools\uff09 - .h2o\u306e\u304a\u6c17\u697d\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","url":"https://dot-h2o2.hatenadiary.org/entry/20090730/p1","description":"\u5e78\u904b\u306b\u3082\u6a5f\u4f1a\u304c\u3042\u3063\u305f\u306e\u3067\u8aad\u3080\u3053\u3068\u304c\u3067\u304d\u305f\u3002 BINARY HACKS\u3084Linkers & Loaders\u3092\u697d\u3057\u3093\u3067\u8aad\u3081\u308b\u65b9\u306b\u306f\u304a\u52e7\u3081\u3067\u3059\u3002 Computer Architecture Series\u3068\u3057\u3066\u51fa\u7248\u3055\u308c\u3066\u3044\u308b\u306e\u3067\u6b21\u56de\u4ee5\u964d\u306e\u4f5c\u54c1\u304c\u697d\u3057\u307f\u3067\u3059\u3002 http://reposj.wnishida.com/wiki/ComputerArchitectureSeries","author_url":"https://blog.hatena.ne.jp/dot_h2o2/","title":"GNU \u958b\u767a\u30c4\u30fc\u30eb\uff08GNU Development Tools\uff09","height":"190","author_name":"dot_h2o2","image_url":null,"version":"1.0"}