SlideShare a Scribd company logo
1 of 18
An Introduction to
Linux operating System
By Biplaba Samantaray
MCA, University of Hyderabad
Content
• What is Linux
• Why Linux
• The Linux system
• Security
• OS Comparison
What is Linux
• LINUX is a family of open source Unix like operating
system.
• Linux was created by Linus Torvalds in 1991
• Now it has evolved into a very functional, powerful and
usable clone of Unix which has at least 10 million users
worldwide.
• Now it runs on a variety of platforms including PowerPC,
Macintosh, Amiga, DEC Alpha, Sun Sparc, ARM, and
many others
Why Linux
• Free and Open source
• Distributions
• Security
• Virus treatment
• Multi processor
• Multi Tasking
• Stable
• Reliable
• Networking
The Linux System
• The Linux system excel in many area, ranging
from end user concerns such as stability, speed,
ease of use, to serious concerns such as
development and networking.
a) Linux kernel
b) Linux networking
c) Linux file system
Linux Kernel
• Central nervous system/main
component of Linux
• Coded in C language
• It provide resources to all the
other program that sits over it.
• Linux is a modular designed.
• Control major functions
Linux networking
• Networking comes naturally to Linux.
In a real sense, Linux is a product of the
Internet or World Wide Web (www).
• Linux is made for networking. Probably
all networking protocols in use on the
Internet are native to Unix and/or Linux.
A large part of the Web is running on
Linux boxes, e.g. : AOL
Linux Network Admin
Server Network
FTP
TELNET
SSH
DHCP
TFTP
Connfigu-
ration
protocols
Networking protocols
• The Linux kernel supports several
networking protocols:
– TCP/IP - Transport Control
Protocol/Internet Protocol
• IP is the primary network protocol
supported by Linux
– IPX - Internetwork Packet Exchange
– AppleTalk DDP
– Amateur Radio AX.25 Level 2
Linux File System
• Linux has an hierarchical,
unified file system
• Supports 256-character
filenames.
• All command line entries are
case sensitive.
• Use the slash(/) rather than the
backslash() you have been using
in DOS.
Security
• Encryption
• Secure shell(ssh)
• Principles of security
Encryption
• Encryption commonly used to secure data. It is the
ancient technique of hiding information in plain sight.
Include:
– strong encryption - is stronger than the 40-bit
encryption maximum that can be exported from the
United States under U.S. law.
– Public-key Encryption - is a type of asymmetric
encryption, which is a system that you encrypt your
message with one key, and the recipient decrypts it
with a mathematically related, but different key.
Secure shell(ssh)
ssh user_name@host(IP/Domain_name)
• The ssh and its tools use strong encryption to allow
remotely located systems to exchange data securely.
• By using strong encryption, ssh significantly enhances
the security of both the authentication process and
the session itself.
Principles of security
Unauthorized access
Active
Passive
Inside
Outside
Daniel of Service :
Defense against the attacks:
• enforce the use of password
• use TCP wrappers to limit which resources are made available
to which categories of users.
• monitor internal users, protect your organization against
unauthorized or inappropriate use of the computer facilities
to harass personnel.
UNIX vs LINUX
Unix
 It is an operating system which can
be only used by its copyrighters.
 It was developed mainly for
servers, workstations and
mainframes.
 Unix copyright vendors decide
different costs for their respective
Unix Operating systems.
Linux
 It is an open-source operating system which
is freely available to everyone.
 Nowadays, Linux is in great demand.
Anyone can use Linux whether a home
user, developer or a student.
 Linux is freely distributed, downloaded,
and distributed through magazines also.
And priced distros of Linux are also
cheaper than Windows.
Linux vs Windows
Linux
 Linux is a open source operating system.
 Linux is free of cost.
 It's file name case-sensitive.
 In Linux, monolithic kernel is used.
 Linux is more efficient in comparison of
windows.
 There is forward slash is used for
Separating the directories.
 Linux provides more security than
windows.
Windows
 While windows are the not the open
source operating system.
 While it is costly.
 While it's file name is case-insensitive.
 While in this, micro kernel is used.
 While windows are less efficient.
 While there is back slash is used for
Separating the directories.
 While it provides less security than Linux.
References :
• http://www.Linux.org
• http://www.croftj.net/~jam
• http://metalab.unc.edu/LDP/HOWTO/
NET-3-HOWTO-4.html#ss4.1
Linux basics

More Related Content

What's hot

Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
joycoronado
 

What's hot (20)

Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux ppt
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 
Linux
Linux Linux
Linux
 
Install ubuntu
Install ubuntuInstall ubuntu
Install ubuntu
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
 
windows vs Linux
windows vs Linuxwindows vs Linux
windows vs Linux
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
what is LINUX ? presentation.
what is LINUX ? presentation.what is LINUX ? presentation.
what is LINUX ? presentation.
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Kali linux
Kali linux Kali linux
Kali linux
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Ubuntu installation-presentations
Ubuntu installation-presentationsUbuntu installation-presentations
Ubuntu installation-presentations
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
 
Introduction to Linux basic
Introduction to Linux basicIntroduction to Linux basic
Introduction to Linux basic
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
 
What is Ubuntu - presentation
What is Ubuntu - presentationWhat is Ubuntu - presentation
What is Ubuntu - presentation
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Terminal Commands (Linux - ubuntu) (part-1)
Terminal Commands  (Linux - ubuntu) (part-1)Terminal Commands  (Linux - ubuntu) (part-1)
Terminal Commands (Linux - ubuntu) (part-1)
 

Similar to Linux basics

Linux [2005]
Linux [2005]Linux [2005]
Linux [2005]
Raul Soto
 
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
EidTahir
 

Similar to Linux basics (20)

Licão 01 introduction
Licão 01 introductionLicão 01 introduction
Licão 01 introduction
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
Linux [2005]
Linux [2005]Linux [2005]
Linux [2005]
 
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
 
Linux Operating System.pptx
Linux Operating System.pptxLinux Operating System.pptx
Linux Operating System.pptx
 
Module1
Module1Module1
Module1
 
Unix ppt
Unix pptUnix ppt
Unix ppt
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
 
College copy
College copyCollege copy
College copy
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Introduction, Features, Basic Commands and Distribution of LINUX
Introduction, Features, Basic Commands and Distribution of LINUXIntroduction, Features, Basic Commands and Distribution of LINUX
Introduction, Features, Basic Commands and Distribution of LINUX
 
Unix Security
Unix SecurityUnix Security
Unix Security
 
Linux Operating System.pdf
Linux Operating System.pdfLinux Operating System.pdf
Linux Operating System.pdf
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Linux Environment- Linux vs Unix
Linux Environment- Linux vs UnixLinux Environment- Linux vs Unix
Linux Environment- Linux vs Unix
 
A general Overview of linux !!
A general Overview of linux !!A general Overview of linux !!
A general Overview of linux !!
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.ppt
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Linux Operating System. UOG MARGHAZAR Campus
 Linux Operating System. UOG MARGHAZAR Campus Linux Operating System. UOG MARGHAZAR Campus
Linux Operating System. UOG MARGHAZAR Campus
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Linux basics

  • 1. An Introduction to Linux operating System By Biplaba Samantaray MCA, University of Hyderabad
  • 2. Content • What is Linux • Why Linux • The Linux system • Security • OS Comparison
  • 3. What is Linux • LINUX is a family of open source Unix like operating system. • Linux was created by Linus Torvalds in 1991 • Now it has evolved into a very functional, powerful and usable clone of Unix which has at least 10 million users worldwide. • Now it runs on a variety of platforms including PowerPC, Macintosh, Amiga, DEC Alpha, Sun Sparc, ARM, and many others
  • 4. Why Linux • Free and Open source • Distributions • Security • Virus treatment • Multi processor • Multi Tasking • Stable • Reliable • Networking
  • 5. The Linux System • The Linux system excel in many area, ranging from end user concerns such as stability, speed, ease of use, to serious concerns such as development and networking. a) Linux kernel b) Linux networking c) Linux file system
  • 6. Linux Kernel • Central nervous system/main component of Linux • Coded in C language • It provide resources to all the other program that sits over it. • Linux is a modular designed. • Control major functions
  • 7. Linux networking • Networking comes naturally to Linux. In a real sense, Linux is a product of the Internet or World Wide Web (www). • Linux is made for networking. Probably all networking protocols in use on the Internet are native to Unix and/or Linux. A large part of the Web is running on Linux boxes, e.g. : AOL Linux Network Admin Server Network FTP TELNET SSH DHCP TFTP Connfigu- ration protocols
  • 8. Networking protocols • The Linux kernel supports several networking protocols: – TCP/IP - Transport Control Protocol/Internet Protocol • IP is the primary network protocol supported by Linux – IPX - Internetwork Packet Exchange – AppleTalk DDP – Amateur Radio AX.25 Level 2
  • 9. Linux File System • Linux has an hierarchical, unified file system • Supports 256-character filenames. • All command line entries are case sensitive. • Use the slash(/) rather than the backslash() you have been using in DOS.
  • 10. Security • Encryption • Secure shell(ssh) • Principles of security
  • 11. Encryption • Encryption commonly used to secure data. It is the ancient technique of hiding information in plain sight. Include: – strong encryption - is stronger than the 40-bit encryption maximum that can be exported from the United States under U.S. law. – Public-key Encryption - is a type of asymmetric encryption, which is a system that you encrypt your message with one key, and the recipient decrypts it with a mathematically related, but different key.
  • 12. Secure shell(ssh) ssh user_name@host(IP/Domain_name) • The ssh and its tools use strong encryption to allow remotely located systems to exchange data securely. • By using strong encryption, ssh significantly enhances the security of both the authentication process and the session itself.
  • 13. Principles of security Unauthorized access Active Passive Inside Outside
  • 14. Daniel of Service : Defense against the attacks: • enforce the use of password • use TCP wrappers to limit which resources are made available to which categories of users. • monitor internal users, protect your organization against unauthorized or inappropriate use of the computer facilities to harass personnel.
  • 15. UNIX vs LINUX Unix  It is an operating system which can be only used by its copyrighters.  It was developed mainly for servers, workstations and mainframes.  Unix copyright vendors decide different costs for their respective Unix Operating systems. Linux  It is an open-source operating system which is freely available to everyone.  Nowadays, Linux is in great demand. Anyone can use Linux whether a home user, developer or a student.  Linux is freely distributed, downloaded, and distributed through magazines also. And priced distros of Linux are also cheaper than Windows.
  • 16. Linux vs Windows Linux  Linux is a open source operating system.  Linux is free of cost.  It's file name case-sensitive.  In Linux, monolithic kernel is used.  Linux is more efficient in comparison of windows.  There is forward slash is used for Separating the directories.  Linux provides more security than windows. Windows  While windows are the not the open source operating system.  While it is costly.  While it's file name is case-insensitive.  While in this, micro kernel is used.  While windows are less efficient.  While there is back slash is used for Separating the directories.  While it provides less security than Linux.
  • 17. References : • http://www.Linux.org • http://www.croftj.net/~jam • http://metalab.unc.edu/LDP/HOWTO/ NET-3-HOWTO-4.html#ss4.1