This document provides guidance on resource sharing over a network in Windows and UNIX/Linux operating systems. It discusses setting up file, disk, and printer sharing through server network operating systems like Windows Server and UNIX/Linux. It covers configuring user accounts, groups, permissions and security to control access to shared resources. The document also provides examples of how to set up groups, assign permissions, and share disks and files on both Windows Server and UNIX/Linux networks.
This chapter discusses network connectivity and operating systems. It explains networking basics such as topologies, hardware, protocols, and how devices connect to networks. It describes client and server operating systems and their roles. It also covers common network protocols like TCP/IP, Ethernet, wireless technologies, and how they are configured in operating systems. Network devices, addressing, and automatic configuration using DHCP are also summarized.
This chapter discusses how operating systems interface with input and output devices through device drivers and adapters. It explains the general process for installing and configuring new devices, which involves installing software drivers, connecting the hardware, and configuring the device. It covers how operating systems use device drivers to communicate with hardware and support various device features. It also describes how to install and update drivers in Windows, Linux/UNIX, and Mac operating systems. Popular input devices like mice, keyboards, touchscreens, and digital pads are discussed.
This chapter discusses storage devices and technologies. It describes common disk storage options like hard drives, DVD/CD drives, removable drives, and flash drives. Hard drive interfaces like IDE, SATA, SCSI, and SAS are explained. The chapter also covers optical disc technologies like CDs, DVDs, and Blu-Ray discs. Network storage options such as SAN, NAS, cloud storage, and tape backup systems are introduced along with their capacities and features.
This chapter describes different types of modems and communication devices. It discusses analog modem architecture, including how analog modems modulate and demodulate signals. It also covers digital modems for wireless, ISDN, cable, DSL, and satellite connections. Finally, it describes how to configure modems and Internet connections in various operating systems like Windows, Linux, and Mac OS X.
The document provides guidance on installing and upgrading operating systems. It discusses preparing for installation by checking hardware compatibility and obtaining necessary drivers. The installation process typically involves gathering system information, loading the installation program, configuring devices, copying files, and restarting. Migrating to a new OS may require upgrading existing systems or performing a clean installation, and it is best to test the process first on a representative computer before deploying widely. Training users is also recommended when transitioning to a new desktop operating system.
This chapter discusses operating system hardware components and their interaction with operating systems. It describes the basic features of CPUs like design type, speed, cache, buses, and scheduling. CPUs can be CISC or RISC and include elements like cores, clocks, caches, and address/data/control buses. Popular PC processors include Intel, AMD, and server chips from companies like Sun and HP. Hardware and operating systems evolved together with OSes taking advantage of new processor capabilities.
This document provides an overview and objectives for Chapter 1 of the textbook "Guide to Operating Systems". It discusses basic operating system concepts like kernels, resource managers, device drivers, and applications. It covers the history of operating system development from early mainframes to modern desktop and server OSs. It also differentiates between single-tasking and multitasking systems as well as single-user and multiuser OSs. Current common operating systems like Windows, Linux, and Mac OS are also listed.
This document provides guidance on standard operating and maintenance procedures for file systems. It discusses file system maintenance techniques, such as creating an organized directory structure, finding and deleting unused files on a regular basis, and performing disk maintenance like defragmenting to optimize performance. Backup plans and software installation procedures are also covered. The document provides examples of directory structures and maintenance tasks for different operating systems including Windows, Linux/UNIX, and Mac OS X.
This chapter discusses network connectivity and operating systems. It explains networking basics such as topologies, hardware, protocols, and how devices connect to networks. It describes client and server operating systems and their roles. It also covers common network protocols like TCP/IP, Ethernet, wireless technologies, and how they are configured in operating systems. Network devices, addressing, and automatic configuration using DHCP are also summarized.
This chapter discusses how operating systems interface with input and output devices through device drivers and adapters. It explains the general process for installing and configuring new devices, which involves installing software drivers, connecting the hardware, and configuring the device. It covers how operating systems use device drivers to communicate with hardware and support various device features. It also describes how to install and update drivers in Windows, Linux/UNIX, and Mac operating systems. Popular input devices like mice, keyboards, touchscreens, and digital pads are discussed.
This chapter discusses storage devices and technologies. It describes common disk storage options like hard drives, DVD/CD drives, removable drives, and flash drives. Hard drive interfaces like IDE, SATA, SCSI, and SAS are explained. The chapter also covers optical disc technologies like CDs, DVDs, and Blu-Ray discs. Network storage options such as SAN, NAS, cloud storage, and tape backup systems are introduced along with their capacities and features.
This chapter describes different types of modems and communication devices. It discusses analog modem architecture, including how analog modems modulate and demodulate signals. It also covers digital modems for wireless, ISDN, cable, DSL, and satellite connections. Finally, it describes how to configure modems and Internet connections in various operating systems like Windows, Linux, and Mac OS X.
The document provides guidance on installing and upgrading operating systems. It discusses preparing for installation by checking hardware compatibility and obtaining necessary drivers. The installation process typically involves gathering system information, loading the installation program, configuring devices, copying files, and restarting. Migrating to a new OS may require upgrading existing systems or performing a clean installation, and it is best to test the process first on a representative computer before deploying widely. Training users is also recommended when transitioning to a new desktop operating system.
This chapter discusses operating system hardware components and their interaction with operating systems. It describes the basic features of CPUs like design type, speed, cache, buses, and scheduling. CPUs can be CISC or RISC and include elements like cores, clocks, caches, and address/data/control buses. Popular PC processors include Intel, AMD, and server chips from companies like Sun and HP. Hardware and operating systems evolved together with OSes taking advantage of new processor capabilities.
This document provides an overview and objectives for Chapter 1 of the textbook "Guide to Operating Systems". It discusses basic operating system concepts like kernels, resource managers, device drivers, and applications. It covers the history of operating system development from early mainframes to modern desktop and server OSs. It also differentiates between single-tasking and multitasking systems as well as single-user and multiuser OSs. Current common operating systems like Windows, Linux, and Mac OS are also listed.
This document provides guidance on standard operating and maintenance procedures for file systems. It discusses file system maintenance techniques, such as creating an organized directory structure, finding and deleting unused files on a regular basis, and performing disk maintenance like defragmenting to optimize performance. Backup plans and software installation procedures are also covered. The document provides examples of directory structures and maintenance tasks for different operating systems including Windows, Linux/UNIX, and Mac OS X.
This chapter discusses file systems used by various operating systems. It describes the basic functions of file systems including organizing files into directories, establishing naming conventions, and providing file integrity and security. It then covers the file systems used by Windows (FAT16, FAT32, FAT64, NTFS), UNIX/Linux (ufs, ext), and Mac OS X (HFS+). The key components and features of these various file systems are outlined.
This chapter describes popular desktop and server operating systems. It discusses early Microsoft operating systems like MS-DOS, Windows 3.x, and Windows 95. It then covers Windows 98/Me, Windows NT, Windows 2000, and Windows XP. It provides details on features, versions, and capabilities of each. The chapter also examines current operating systems including Windows Server 2003/R2, Windows Vista, Windows Server 2008/R2, and Windows 7.
This document provides an overview of storage technologies and concepts. It discusses the history of storage technologies from early drum memory to modern hard disks and solid state drives. Key concepts covered include RAID configurations, disk interfaces like SATA and SAS, tape storage technologies, storage controllers, and virtual tape libraries. The document concludes with a discussion of Kryder's law and projections for future disk capacity growth.
Selecting and Installing Operating SystemAmir Villas
The document provides an overview of installing and troubleshooting various Windows operating systems, including DOS, Windows 3.1, 95/98/Me, NT/2000/XP. It discusses selecting an OS based on system requirements, starting the setup program from various sources, planning for upgrades or clean installs, and addressing common installation problems like hardware incompatibilities or errors reading from the installation media.
The document discusses key aspects of network administration including:
1. The network administrator is responsible for creating, protecting, and managing the network environment. This includes setting up user accounts, groups, software, and security measures.
2. Creating the network environment involves setting up user accounts, groups, network software, and external connectivity. User accounts need to be properly configured and managed.
3. Protecting the network requires implementing security, virus protection, backups, and disaster recovery plans. These help ensure the network runs smoothly and is protected from threats.
Windows is a popular operating system that runs on both PCs and servers. It provides a large collection of software solutions due to its popularity. While early versions of Windows were not true operating systems, modern versions like Windows Server provide stable and secure platforms for business applications and services. Failover clustering allows applications to remain highly available by failing over from one node to another in the case of hardware or software failures. The performance of an operating system depends on the underlying hardware, application load, and OS configuration.
The document discusses configuring network clients. It covers six common client operating systems: Windows 95, Windows NT Workstation, OS/2, MS-DOS, Macintosh, and Unix. It also discusses installing and configuring network adapters, including installing hardware and drivers. Additionally, it covers selecting network protocols like IPX/SPX, NetBEUI, and TCP/IP and connecting clients to network services.
This document discusses network server hardware, software, and applications. It describes the typical components of a client and server, including the server requiring more processing power, memory, and storage. It explains that a network operating system runs on the server to allow sharing of resources, while client software provides access to those shared resources. Common network applications like email, file sharing, and group scheduling are also outlined.
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...ijesajournal
Latest technology, new features and kernel bug fixes shows a need to explore a cost-effective and quick
upgradation of Embedded Linux BSP of Embedded Controllers to replace the existing U-Boot, Linux kernel,
Dtb file, and JFFS2 File system. This field upgrade technique is designed to perform an in-the-field flash
upgrade while the Linux is running. On successful build, the current version and platform specific information
will be updated to the script file and further with this technique the file system automates the upgrade
procedure after validating for the version information from the OS-release and if the version is different it will
self-extract and gets installed into the respective partitions. This Embedded Linux BSP field upgrade invention
is more secured and will essentially enable the developers and researchers working in this field to utilize this
method which can prove to be cost-effective on the field and beneficial to the stake holder.
This document summarizes key points from Chapter 3 of William Stallings' book "Computer Organization and Architecture". It discusses the top-level view of computer function and interconnection. The main components of a computer are the control unit, arithmetic logic unit, main memory, and input/output. Programs are sequences of steps that are executed via control signals. Buses are used to connect these components and transfer data, addresses, and control signals. Interrupts allow other devices to interrupt normal program execution.
This chapter discusses input/output (I/O) in computer systems. It covers the challenges posed by different peripheral devices having varying data amounts, speeds, and formats. I/O modules are used to interface between the CPU/memory and peripherals. The chapter describes various I/O module functions and the steps involved in I/O operations. It then discusses three main techniques for I/O - programmed I/O, interrupt-driven I/O, and direct memory access (DMA). Specific I/O components like the 8259A interrupt controller and 8237A DMA controller are also covered. The chapter concludes by examining external device types and I/O communication standards like FireWire and InfiniBand
Linux is a widely used open source operating system kernel that can also refer to full operating system distributions. It is commonly used in embedded systems due to its portability, modularity, and ability to run on hardware with limited resources. Device drivers can be dynamically loaded and unloaded from the Linux kernel as modules, allowing new functionality to be added without rebooting the system. This makes Linux well-suited for embedded device development.
The document discusses various aspects of computer system structures. It describes that a modern computer system consists of a CPU, memory, and device controllers connected through a system bus. I/O devices and the CPU can operate concurrently, with each device controller managing a specific device type. Interrupts are used to signal when I/O operations are complete. Memory is organized in a hierarchy from fastest and smallest registers to slower but larger magnetic disks. Various techniques like caching, paging and virtual memory help bridge differences in speed between CPU and I/O devices. The document also discusses hardware protection mechanisms like dual mode operation, memory protection using base and limit registers, and CPU protection using timers.
1. The document discusses various methods for managing memory in the Linux kernel, including physical memory, virtual memory, page tables, and different allocators like kmalloc, vmalloc, and SLAB for allocating memory to processes and the kernel.
2. It explains concepts like physical vs virtual addresses, page tables that map virtual to physical memory, and the Memory Management Unit (MMU) that handles virtual address translation.
3. Different allocators like kmalloc, vmalloc and SLAB are used depending on the size and properties of the memory needed, with kmalloc and SLAB handling physically contiguous memory and vmalloc only requiring virtual contiguity.
This chapter introduces computer architecture and organization. Architecture refers to attributes visible to programmers like the instruction set. Organization is how features are implemented internally. The x86 and IBM System/370 families share the same architectures but have different organizations between versions. Computer functions involve data processing, storage, movement, and control. The chapter outlines the book's topics and provides internet resources for further information.
This chapter discusses operating system support and functions including program creation, execution, I/O access, file access, system access, error handling, and accounting. It covers the evolution of operating systems from early single-program systems with no OS to modern time-sharing systems. Key topics include memory management techniques like paging, segmentation, and virtual memory which allow more efficient use of system resources through processes and virtual address translation.
This document provides an overview of computer history, fundamentals, operating systems, and system utilities. It discusses the evolution of computers from the past to present-day uses. The basic components of a computer system including hardware, software, memory and processors are defined. Common operating systems like Windows, Mac OS, and Linux are examined along with operating system functions. Finally, important system utilities for security, file management, disk maintenance and updates are outlined.
This document provides an overview of operating systems and computer system organization. It describes the basic components of a computer system including hardware, operating system, application programs, and users. It then discusses operating system functions like process management, memory management, storage management, and protection/security. It provides details on computer system architecture including multiprocessor systems and clustered systems. It also covers operating system structure for multiprogramming and timesharing systems.
The document discusses various components and services provided by operating systems. It describes system components like process management, memory management, file management, I/O management, and secondary storage management. It also discusses operating system services like program execution, I/O operations, file manipulation, communications, error detection, resource allocation, and accounting. The document explains system calls that provide an interface between processes and the operating system and covers types of system calls for process control, file management, device management, and information maintenance. It also briefly discusses system programs, communication models, and execution of programs in MS-DOS and UNIX operating systems.
For students wk4_computer_function_and_interconnectionlimyamahgoub
This chapter discusses the top-level view of computer function and interconnection. It explains that a program is a sequence of steps and operations that are executed through different control signals. The central processing unit consists of a control unit and arithmetic logic unit. Data and instructions are input and output through input/output components, while temporary storage is provided by main memory. The computer components are interconnected through buses that transfer data, addresses, and control signals between the CPU, memory, and input/output devices.
This document provides an overview of server management and administration topics including:
1. Managing user and group accounts, including creating accounts in Windows and Linux. Groups are used to organize users and assign permissions.
2. Configuring storage and file systems such as NTFS and Linux partitions. NTFS permissions control file access on Windows servers.
3. Sharing files and printers using protocols like SMB and setting share permissions in Windows. Tools for sharing resources in Windows and Linux are described.
4. Monitoring system performance and reliability using tools in Windows Server like Event Viewer, Performance Monitor, and Windows System Resource Manager.
This document provides an overview of server management and administration topics, including:
1) Managing user and group accounts, including creating accounts in Windows domains and Linux. Groups are used to organize users and assign permissions.
2) Configuring storage and file systems, such as volumes, partitions, and different file system types (FAT, NTFS, Linux). Permissions are set on files, folders and shares to control access.
3) Monitoring system performance and reliability using tools in Windows Server like Event Viewer, Performance Monitor, and Windows System Resource Manager.
This chapter discusses file systems used by various operating systems. It describes the basic functions of file systems including organizing files into directories, establishing naming conventions, and providing file integrity and security. It then covers the file systems used by Windows (FAT16, FAT32, FAT64, NTFS), UNIX/Linux (ufs, ext), and Mac OS X (HFS+). The key components and features of these various file systems are outlined.
This chapter describes popular desktop and server operating systems. It discusses early Microsoft operating systems like MS-DOS, Windows 3.x, and Windows 95. It then covers Windows 98/Me, Windows NT, Windows 2000, and Windows XP. It provides details on features, versions, and capabilities of each. The chapter also examines current operating systems including Windows Server 2003/R2, Windows Vista, Windows Server 2008/R2, and Windows 7.
This document provides an overview of storage technologies and concepts. It discusses the history of storage technologies from early drum memory to modern hard disks and solid state drives. Key concepts covered include RAID configurations, disk interfaces like SATA and SAS, tape storage technologies, storage controllers, and virtual tape libraries. The document concludes with a discussion of Kryder's law and projections for future disk capacity growth.
Selecting and Installing Operating SystemAmir Villas
The document provides an overview of installing and troubleshooting various Windows operating systems, including DOS, Windows 3.1, 95/98/Me, NT/2000/XP. It discusses selecting an OS based on system requirements, starting the setup program from various sources, planning for upgrades or clean installs, and addressing common installation problems like hardware incompatibilities or errors reading from the installation media.
The document discusses key aspects of network administration including:
1. The network administrator is responsible for creating, protecting, and managing the network environment. This includes setting up user accounts, groups, software, and security measures.
2. Creating the network environment involves setting up user accounts, groups, network software, and external connectivity. User accounts need to be properly configured and managed.
3. Protecting the network requires implementing security, virus protection, backups, and disaster recovery plans. These help ensure the network runs smoothly and is protected from threats.
Windows is a popular operating system that runs on both PCs and servers. It provides a large collection of software solutions due to its popularity. While early versions of Windows were not true operating systems, modern versions like Windows Server provide stable and secure platforms for business applications and services. Failover clustering allows applications to remain highly available by failing over from one node to another in the case of hardware or software failures. The performance of an operating system depends on the underlying hardware, application load, and OS configuration.
The document discusses configuring network clients. It covers six common client operating systems: Windows 95, Windows NT Workstation, OS/2, MS-DOS, Macintosh, and Unix. It also discusses installing and configuring network adapters, including installing hardware and drivers. Additionally, it covers selecting network protocols like IPX/SPX, NetBEUI, and TCP/IP and connecting clients to network services.
This document discusses network server hardware, software, and applications. It describes the typical components of a client and server, including the server requiring more processing power, memory, and storage. It explains that a network operating system runs on the server to allow sharing of resources, while client software provides access to those shared resources. Common network applications like email, file sharing, and group scheduling are also outlined.
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...ijesajournal
Latest technology, new features and kernel bug fixes shows a need to explore a cost-effective and quick
upgradation of Embedded Linux BSP of Embedded Controllers to replace the existing U-Boot, Linux kernel,
Dtb file, and JFFS2 File system. This field upgrade technique is designed to perform an in-the-field flash
upgrade while the Linux is running. On successful build, the current version and platform specific information
will be updated to the script file and further with this technique the file system automates the upgrade
procedure after validating for the version information from the OS-release and if the version is different it will
self-extract and gets installed into the respective partitions. This Embedded Linux BSP field upgrade invention
is more secured and will essentially enable the developers and researchers working in this field to utilize this
method which can prove to be cost-effective on the field and beneficial to the stake holder.
This document summarizes key points from Chapter 3 of William Stallings' book "Computer Organization and Architecture". It discusses the top-level view of computer function and interconnection. The main components of a computer are the control unit, arithmetic logic unit, main memory, and input/output. Programs are sequences of steps that are executed via control signals. Buses are used to connect these components and transfer data, addresses, and control signals. Interrupts allow other devices to interrupt normal program execution.
This chapter discusses input/output (I/O) in computer systems. It covers the challenges posed by different peripheral devices having varying data amounts, speeds, and formats. I/O modules are used to interface between the CPU/memory and peripherals. The chapter describes various I/O module functions and the steps involved in I/O operations. It then discusses three main techniques for I/O - programmed I/O, interrupt-driven I/O, and direct memory access (DMA). Specific I/O components like the 8259A interrupt controller and 8237A DMA controller are also covered. The chapter concludes by examining external device types and I/O communication standards like FireWire and InfiniBand
Linux is a widely used open source operating system kernel that can also refer to full operating system distributions. It is commonly used in embedded systems due to its portability, modularity, and ability to run on hardware with limited resources. Device drivers can be dynamically loaded and unloaded from the Linux kernel as modules, allowing new functionality to be added without rebooting the system. This makes Linux well-suited for embedded device development.
The document discusses various aspects of computer system structures. It describes that a modern computer system consists of a CPU, memory, and device controllers connected through a system bus. I/O devices and the CPU can operate concurrently, with each device controller managing a specific device type. Interrupts are used to signal when I/O operations are complete. Memory is organized in a hierarchy from fastest and smallest registers to slower but larger magnetic disks. Various techniques like caching, paging and virtual memory help bridge differences in speed between CPU and I/O devices. The document also discusses hardware protection mechanisms like dual mode operation, memory protection using base and limit registers, and CPU protection using timers.
1. The document discusses various methods for managing memory in the Linux kernel, including physical memory, virtual memory, page tables, and different allocators like kmalloc, vmalloc, and SLAB for allocating memory to processes and the kernel.
2. It explains concepts like physical vs virtual addresses, page tables that map virtual to physical memory, and the Memory Management Unit (MMU) that handles virtual address translation.
3. Different allocators like kmalloc, vmalloc and SLAB are used depending on the size and properties of the memory needed, with kmalloc and SLAB handling physically contiguous memory and vmalloc only requiring virtual contiguity.
This chapter introduces computer architecture and organization. Architecture refers to attributes visible to programmers like the instruction set. Organization is how features are implemented internally. The x86 and IBM System/370 families share the same architectures but have different organizations between versions. Computer functions involve data processing, storage, movement, and control. The chapter outlines the book's topics and provides internet resources for further information.
This chapter discusses operating system support and functions including program creation, execution, I/O access, file access, system access, error handling, and accounting. It covers the evolution of operating systems from early single-program systems with no OS to modern time-sharing systems. Key topics include memory management techniques like paging, segmentation, and virtual memory which allow more efficient use of system resources through processes and virtual address translation.
This document provides an overview of computer history, fundamentals, operating systems, and system utilities. It discusses the evolution of computers from the past to present-day uses. The basic components of a computer system including hardware, software, memory and processors are defined. Common operating systems like Windows, Mac OS, and Linux are examined along with operating system functions. Finally, important system utilities for security, file management, disk maintenance and updates are outlined.
This document provides an overview of operating systems and computer system organization. It describes the basic components of a computer system including hardware, operating system, application programs, and users. It then discusses operating system functions like process management, memory management, storage management, and protection/security. It provides details on computer system architecture including multiprocessor systems and clustered systems. It also covers operating system structure for multiprogramming and timesharing systems.
The document discusses various components and services provided by operating systems. It describes system components like process management, memory management, file management, I/O management, and secondary storage management. It also discusses operating system services like program execution, I/O operations, file manipulation, communications, error detection, resource allocation, and accounting. The document explains system calls that provide an interface between processes and the operating system and covers types of system calls for process control, file management, device management, and information maintenance. It also briefly discusses system programs, communication models, and execution of programs in MS-DOS and UNIX operating systems.
For students wk4_computer_function_and_interconnectionlimyamahgoub
This chapter discusses the top-level view of computer function and interconnection. It explains that a program is a sequence of steps and operations that are executed through different control signals. The central processing unit consists of a control unit and arithmetic logic unit. Data and instructions are input and output through input/output components, while temporary storage is provided by main memory. The computer components are interconnected through buses that transfer data, addresses, and control signals between the CPU, memory, and input/output devices.
This document provides an overview of server management and administration topics including:
1. Managing user and group accounts, including creating accounts in Windows and Linux. Groups are used to organize users and assign permissions.
2. Configuring storage and file systems such as NTFS and Linux partitions. NTFS permissions control file access on Windows servers.
3. Sharing files and printers using protocols like SMB and setting share permissions in Windows. Tools for sharing resources in Windows and Linux are described.
4. Monitoring system performance and reliability using tools in Windows Server like Event Viewer, Performance Monitor, and Windows System Resource Manager.
This document provides an overview of server management and administration topics, including:
1) Managing user and group accounts, including creating accounts in Windows domains and Linux. Groups are used to organize users and assign permissions.
2) Configuring storage and file systems, such as volumes, partitions, and different file system types (FAT, NTFS, Linux). Permissions are set on files, folders and shares to control access.
3) Monitoring system performance and reliability using tools in Windows Server like Event Viewer, Performance Monitor, and Windows System Resource Manager.
A database management system (DBMS) is a collection of programs that enable users to create and maintain a database. Key features of a DBMS include data storage, retrieval, and update capabilities, user-accessible catalogs, shared update support, backup and recovery services, security services, integrity services, data independence, replication support, and utility services. DBMS provide mechanisms for concurrency control like locking to ensure accuracy during shared updates and prevent deadlocks between transactions. They also employ security features like passwords, encryption, and views to restrict unauthorized access. Integrity constraints and referential integrity help ensure data consistency.
1. A database management system (DBMS) enables users to create and maintain a database through features like data storage, retrieval, and update; user-accessible catalogs; shared update support; and backup/recovery services.
2. DBMS provides mechanisms for ensuring data integrity and security when multiple users access and update shared data simultaneously through features like locking and two-phase locking to prevent data overrides and deadlocks.
3. Other DBMS features include data independence from application programs, replication of data across locations, and utility services for general database maintenance.
1. A database management system (DBMS) enables users to create and maintain a database through features like data storage, retrieval, and update; user-accessible catalogs; shared update support; and backup/recovery services.
2. DBMS provides mechanisms for ensuring data integrity and security when multiple users access and update data simultaneously through features like locking and two-phase locking to prevent data overrides and deadlocks.
3. Other DBMS features include data independence from application programs, replication of data across locations, and utility services for general database maintenance.
1. A database management system (DBMS) enables users to create and maintain a database through features like data storage, retrieval, and update; user-accessible catalogs; shared update support; and backup/recovery services.
2. DBMS provides mechanisms for ensuring data integrity and security when multiple users access and update data simultaneously through features such as locking and two-phase locking to prevent data overrides and deadlocks.
3. Other DBMS features include data independence from application programs, replication of data across locations, and utility services to assist with database maintenance.
This document summarizes key concepts around access control techniques including identity management, password management, account management, profile management, directory management, and single sign-on. It discusses decentralized access control, the goals of identity management including consolidating user IDs, bindings users to policies and privileges. It also covers technical aspects of password management, account locking, and challenges of full deployment of account management systems.
- There are two main security models in Windows environments: workgroups and domains. Workgroups use a decentralized model while domains use centralized authentication and administration.
- A workgroup allows for local account databases on each workstation while a domain uses Active Directory for authentication across all computers. Domains provide advantages like centralized administration and users being able to log in from any workstation.
- Windows supports several network protocols including NetBEUI, NWLink, and TCP/IP, with TCP/IP becoming the industry standard for connecting to the internet and larger corporate networks. Different protocols have advantages depending on network size and configuration.
Wharf T&T is planning a cloud storage solution to provide subscribers with secure network storage space through internet access. The solution would offer customers storage, retrieval and management of their data in data centers. It targets SME customers in Hong Kong and other countries, with storage needs ranging from 5TB to 200GB. The cloud storage service would provide file storage, transfer and sharing features through a web portal and client software.
Windows Server 2003 comes in four editions suited for different needs. It uses Active Directory for centralized authentication and management. Active Directory stores objects like users and groups, organized into a logical structure of domains, organizational units, trees, and forests. A key responsibility of Windows administrators is managing access to network resources while keeping the network secure.
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
4 Module - Operating Systems Configuration and Use
More on https://www.markjohn.cf/courses
This course will deliberate on the basics of an operating system, which may include Computer Memory, the Operating System, its Graphical User Interface, The Windows Operating System, and Desktop, Operating System Installation.
Directory services are used to store information about network resources and users in an enterprise. They provide a centralized, organized method for locating and managing these resources. A directory service stores data in a hierarchical structure with objects and attributes. Some key directory services are Microsoft Active Directory, Novell eDirectory, LDAP, and DNS. Active Directory in particular is widely used and provides features like user authentication, authorization, and policies across a Windows network.
This document provides an overview of file systems, permissions, and sharing in Windows Server 2008. It describes the FAT and NTFS file systems, features like disk quotas and shadow copies in NTFS, and how to secure access to files using share and NTFS permissions. It also covers configuring and managing file sharing, default shares, and storage management tools.
This document provides an overview of user and group account types and management in Active Directory. It discusses the three types of user accounts - local, domain, and built-in - and explains how domain accounts are stored centrally and replicated across domains. It also outlines the different types of groups - security, distribution, domain local, global, and universal - and how they can be nested to simplify permission assignments using the AGUDLP strategy. Finally, it lists several methods for automating user and group creation in Active Directory.
The document discusses file management and organization. It covers topics like file structures, directories, file sharing, blocking, and secondary storage management. Specifically, it describes:
1) The main file structures like sequential, indexed sequential, and hashed files and how they organize records in files.
2) How directories store metadata about files like their location, attributes, and access permissions to map file names to files.
3) Methods for sharing files between users through access rights and managing simultaneous access.
4) Techniques for blocking records into units for storage like fixed, variable spanned, and unspanned blocking.
5) Secondary storage management including file allocation methods like contiguous, chained, and indexed allocation
This document provides an overview of Module 10 which covers implementing file and print services in Microsoft Official Course. It includes lessons on securing files and folders with NTFS permissions, protecting shared files using shadow copies, configuring work folders, and configuring network printing. The module aims to help students secure files and folders, enable offline access to work files, and simplify printer management. It contains demonstrations and a lab exercise for hands-on practice of these topics.
Windows networks can be configured as either a workgroup or domain model. A workgroup treats each computer as equal peers where users directly access shared resources, while a domain uses a centralized domain controller server to authenticate users and allow single sign-on access to resources across multiple client computers. The domain controller contains user and system access credentials and policies to securely manage the network domain. DNS is the domain name system that translates hostname requests to IP addresses through a hierarchical global namespace and allows networks and Internet resources to be located and identified.
File service architecture and network file systemSukhman Kaur
Distributed file systems allow users to access and share files located on multiple computer systems. They provide transparency so that clients can access local and remote files in the same way. Issues include maintaining consistent concurrent updates and caching files for improved performance. Network File System (NFS) is an open standard protocol that allows remote file access like a local file system. It uses remote procedure calls and has evolved through several versions to support features like locking, caching, and security.
The document discusses object-oriented programming concepts in JavaScript, including creating custom objects using object literals, constructor functions, and the new operator. It provides examples of defining object properties and methods, and using nested functions to manage the state of buttons for a poker game application. The key topics covered are creating custom objects, defining object properties and methods, object constructor functions, and instantiating objects.
This document discusses using JavaScript to program web forms. It covers exploring the forms and elements objects to reference form fields and values. Methods are presented for setting field values, navigating between fields, and working with selection lists, radio buttons, check boxes, and hidden fields. The document also discusses formatting numeric values, applying form events, appending form data to URLs, and using regular expressions to extract data. Validation techniques like validating credit card numbers are also mentioned.
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
This document discusses working with document nodes and style sheets in JavaScript. It covers exploring the node tree structure, creating element and text nodes, and appending nodes to documents. It also discusses creating external and embedded style sheets, adding them to documents, and enabling or disabling style sheets through JavaScript. The document provides examples of how to loop through child nodes, access node properties, and restructure node trees by moving nodes. It also explains working with attribute nodes and style sheet rules.
This document discusses working with events and styles in JavaScript. It covers creating event handlers, using the event object, exploring object properties, working with mouse and keyboard events, and controlling event propagation. Specific topics include adding and removing event listeners, changing inline styles, creating object collections with CSS selectors, and changing the cursor style. The overall goal is to teach how to build interactive elements that respond to user input through events.
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
This document discusses using arrays, loops, and conditional statements in JavaScript. It begins by introducing the objectives of creating an array, working with array properties and methods, creating a for loop, using comparison and logical operators, and creating an if conditional statement. It then provides examples and explanations of creating and populating arrays, extracting values from arrays, sorting arrays, and using arrays as data stacks. The overall purpose is to demonstrate various array and loop techniques to generate a monthly calendar using JavaScript.
This document provides an overview of JavaScript programming concepts including:
1) It discusses server-side and client-side programming, with JavaScript being a client-side language that runs programs on a user's computer.
2) Core JavaScript concepts are explained such as objects, properties, methods, and how to reference browser and document objects.
3) Techniques for writing JavaScript programs are covered like adding comments, writing commands, debugging code, and working with variables.
This document discusses various methods for adding multimedia like audio and video to webpages. It covers HTML5 audio and video elements, supported file formats and codecs, adding captions and subtitles, applying CSS styles, embedding content from sites like YouTube, and using plugins as fallback options. The goal is to understand how to enhance a website with rich multimedia content in an accessible way across different browsers.
This document discusses designing web forms in HTML. It covers the basics of forms, including common form controls like text boxes, radio buttons, checkboxes, dropdown lists and more. It also discusses how to lay out forms, add labels and default values, and how forms interact with web servers. The goal is to explore the key elements for creating effective and functional web forms.
This document discusses using tables in HTML and CSS. It covers how to structure tables with <table>, <tr>, <th>, and <td> tags, style tables with CSS including borders and captions, work with rows and columns including grouping and spanning, and make tables responsive. The goal is to teach how to effectively organize and present information using tables and make those tables readable on different devices.
This document discusses responsive design and flexbox layouts for mobile web design. It covers creating media queries to apply different styles based on screen size, introducing the viewport and its relationship to device width, creating a responsive pulldown menu with CSS, and defining flexbox properties like flex-direction, flex-basis, flex-grow, and flex-shrink to create flexible layouts. The objectives are to make a website render well on devices of various sizes using these responsive design and flexbox techniques.
This document provides an overview of techniques for applying graphical effects to elements using CSS, including:
- Creating figure boxes and adding background images, borders, rounded corners, and gradients.
- Applying transformations, shadows, filters and semi-transparency to elements.
- Introducing 3D transformations and perspective.
- The document contains examples and explanations of CSS properties for each graphical effect.
This document discusses various page layout techniques in CSS including floats, grids, and positioning. It begins by explaining the objectives of creating a reset style sheet, exploring page layout designs, and various positioning techniques. It then covers creating floats, clearing floats, and preventing container collapse. The document ends by discussing grid-based layouts including setting up grids, fixed and fluid grids, and frameworks to support grid layouts.
This document discusses various CSS concepts including style sheets, selectors, inheritance, and properties for styling text, colors, and fonts. It covers the different types of style sheets like external, embedded, and inline styles. Contextual and attribute selectors are explained. Methods for applying colors like RGB, hex codes, and HSL are provided. The use of web fonts with the @font-face rule is also summarized.
The document discusses the objectives and structure of an HTML5 tutorial, including exploring the history of the web, creating the structure of an HTML document, inserting elements and attributes, and linking to other resources. It covers the basics of HTML5 such as the document type declaration, element tags, attributes, comments, and different types of elements like headings, paragraphs, images, and links.
An integer overflow occurs when the result of an arithmetic operation exceeds the maximum size of the integer type used to store it. This causes the value to wrap around and can lead to unexpected results. For example, adding 1 to the maximum 8-bit signed integer value of 127 would result in -128 instead of 128. Integer overflows can be exploited by attackers and cause issues like buffer overflows. Developers should choose appropriate integer types that can store all possible values and check for overflow conditions.
This document provides an overview of software testing fundamentals. It discusses why testing is necessary due to human errors that can lead to defects. It then defines software testing as a process used to evaluate a product against requirements and design specifications through execution of tests to detect defects. The document outlines the general test process, including test planning, analysis and design, implementation and execution, evaluating results against exit criteria, and closing testing activities.
The document discusses risk mitigation strategies for network security. It covers assessing threats through formal threat assessments that examine the likelihood and seriousness of potential threats. Risk assessments involve testing systems for vulnerabilities, managing changes to systems, auditing user privileges, and planning for incident response. The document outlines approaches to calculating risk both qualitatively and quantitatively by evaluating the likelihood and potential impact of risks based on historical data from sources like police, insurance companies, and computer incident monitoring organizations. Effective risk mitigation involves knowing potential threats, assessing related risks, and implementing strategies to reduce vulnerabilities and consequences.
The document discusses business continuity, which involves maintaining business operations after disruptive events through business continuity planning, business impact analysis, and disaster recovery planning. It describes business continuity planning as identifying threats, creating preventative and recovery procedures, and testing them. A business impact analysis identifies critical business functions and systems to prioritize in the event of disruption. The disaster recovery plan focuses on restoring IT resources and systems in a documented, tested process following a disruptive event through alternative processing sites and data resynchronization.
The document discusses vulnerability assessment and data security. It explains that vulnerability assessment involves systematically evaluating an enterprise's security posture by identifying assets, evaluating threats, assessing vulnerabilities, analyzing risks, and mitigating risks. This includes inventorying and prioritizing assets, modeling potential threats, cataloging existing weaknesses, estimating the impact of risks, and determining how to address risks. A variety of tools can be used for vulnerability assessment, such as port scanners, vulnerability scanners, and protocol analyzers.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
9781111306366 ppt ch10
1. Guide to Operating Systems,
4th
ed.
Chapter 10: Resource Sharing over a
Network
2. Guide to Operating Systems, 4th ed. 2
Objectives
2
• Explain the principles behind sharing disks, files,
and printers on a network
• Set up accounts, groups, security, and disk and file
sharing on network server operating systems
• Set up disk and file sharing on client (workstation)
operating systems
• Set up printer sharing on server and client
operating systems
• Discuss how network and Internet servers are used
for vast information-sharing networks
3. Guide to Operating Systems, 4th ed. 3
Sharing Disks, Files, and Printers
• Sharing files was one of the first reasons to network
computers
• Network OSs were available at the start of the 1980’s
to share files through a server. There were two
methods:
– By downloading a file from a file server to a workstation
– Purchasing third-party software to create a special shared drive
for other workstations to access over a network
• Mapping – software process that enables a client
workstation to attach to a shared drive and assign it
a drive letter
– In UNIX/Linux and Mac OS X a mapped drive is called a
mounted volume
4. Guide to Operating Systems, 4th ed. 4
Securing Shared Resources
• Sharing disks, files and printers is a potential
security risk (possible for non-authorized users to
access a file or use a printer)
• All OSs discussed in this book offer security
measures for protecting shared resources
– Access to a file can be denied to unauthorized users
– You may want a user to be able to read a file but not change it
• Security privileges can be used to limit users to only those
capabilities
– Access to a shared network printer can be given only to a
specific group of people
• Permission to manage print jobs can be assigned on a user by
user basis (only those who are qualified to do so)
5. Guide to Operating Systems, 4th ed. 5
Sharing Disks and Files through
Server Network Operating Systems
• Windows Server 2003/R2 and Server 2008/R2,
UNIX/Linux, and Mac OS X are examples of server
network operating systems
– Enables the network administrator to establish security through
techniques such as:
• Assigning accounts
• Account passwords
• Creating groups
• Access privileges
6. Guide to Operating Systems, 4th ed. 6
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• The steps involved in sharing resources over a
network include setting up the following:
– Groups
– Account policies
– User accounts
– Permissions
– Shared disks and folders
• Group – a collection of computers and users
– Reduce the amount of work of managing user accounts and
security
– Settings can be created for each group and applied to all
computers and users in that group instead of applying the settings
at one time
7. Guide to Operating Systems, 4th ed. 7
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• The following types of groups can be used in all
Windows Server 2003/Server 2008 OSs:
– Local – used on servers that are not part of a domain
– Domain local – used when there is a single domain or to
manage resources in a particular domain so that global and
universal groups can access those resources
– Global – used to group accounts from the same domain so that
those accounts can access resources in the same and other
domains
– Universal – used to provide access to resources in any domain
within a forest
• All of these groups are also defined as security or
distribution groups
8. Guide to Operating Systems, 4th ed. 8
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Security groups – used to enable access to
resources on a standalone server or in Active
Directory
– Active Directory is a database of computers, users, shared
printers, shared folders, and other network resources that are
used to manage a network
• Distribution groups – used for e-mail or telephone
lists, to provide quick, mass distribution of
information
• In a small office setting, Active Directory may not
be installed so only local groups can be created to
manage access
9. Guide to Operating Systems, 4th ed. 9
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Container object – an entity that is used to group
together resources in a directory service
• Directory service – provides 3 important functions:
– central listing of resources
– a way to quickly find resources
– the ability to access and manage resources
• Domain – fundamental component or container that
holds information about all network resources that
are grouped within it
• Tree – consists of one or more domains
• Forest – houses one or more trees
10. Guide to Operating Systems, 4th ed. 10
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
Sample Windows Server domain and tree models
11. Guide to Operating Systems, 4th ed. 11
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Example of working with groups:
– College – has a domain for:
• Students
• Faculty and staff
• Research organizations associated with the college
– College’s executive council – needs access to all 3 domains
• Create a domain local group called LocalExec in each domain
• Give that group access to files, folders and other resource
• Next, create a GlobalExec global group in the faculty and staff
domain that has the executive council as members
• Make that global group a member of all LocalExec groups
• See figure on next slide
12. Guide to Operating Systems, 4th ed. 12
Windows Server 2003/Server 2003 R2 and
Server 2008/Server 2008 R2
Managing security through domain local and global
groups
13. Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Guidelines to help simplify how to use groups:
– Use global groups to hold user accounts as members
• Give members access to resources by making the global group
members of domain local or universal groups (or both)
– Use domain local groups to provide access to resources in a
specific domain
• Avoid placing user accounts in domain local groups – give domain
local groups access to shared folders and printers
– Use universal groups to provide extensive access to resources
• To simplify access when there are multiple domains
• Give universal groups access to resources in any domain, tree or
forest
– Manage user account access by placing accounts in global groups
and join those groups to domain local or universal groups
Guide to Operating Systems, 4th ed. 13
14. Guide to Operating Systems, 4th ed. 14
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Trusted domain – is given access to resources in
another domain
• Trusting domain – allows the access to its
resources
– A mutual relationship of trust between domain, managed by an
Active Directory administrator or a security specialist
15. Guide to Operating Systems, 4th ed. 15
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Account Policies – used to set restrictions and
security to help ensure that only authorized users
are accessing the accounts
• Parameters you can configure through Account
Policies:
– Password Policy
– Account Lockout Policy
– Kerberos Policy
• Account policies should be configured before
setting up user accounts
16. Guide to Operating Systems, 4th ed. 16
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Password security enables you to set requirements
for how users set passwords
• Some password security options
– Enforce password history – users must choose new passwords
and cannot use previously used passwords
– Maximum password age – set a maximum time allowed until a
password expires
– Minimum password age – password must be used a minimum
amount of time before being changed
– Minimum password length
– Passwords must meet complexity requirements – create a filter of
customized password requirements
– Store password using reversible encryption
17. Guide to Operating Systems, 4th ed. 17
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Account lockout – ability to lock out an account
after a number of unsuccessful tries to login
• Some lockout parameters that can be configured:
– Account lockout duration – specify in minutes how long the
system will keep an account locked out after reaching the
specified number of unsuccessful logon attempts
– Account lockout threshold – set a limit to the number of
unsuccessful attempts to log onto an account
– Reset account lockout count after – specify the number of
minutes between two consecutive unsuccessful logon attempts
to make sure that the account will not be lockout out too soon
18. Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Kerberos security – tickets are exchanged between
the client who requests logon and the server that
grants access
• Kerberos configuration options:
– Enforce user logon restrictions – turns on Kerberos security
– Maximum lifetime for a service ticket
– Maximum lifetime for a user ticket
– Maximum lifetime for user ticket renewal – maximum # of days
the same Kerberos ticket can be renewed each time a user
logs on
– Maximum tolerance for computer clock synchronization – how
long a client will wait until synchronizing its clock with that of a
server or Active Directory
Guide to Operating Systems, 4th ed. 18
19. Guide to Operating Systems, 4th ed. 19
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Configuring User Accounts – to be performed after
account policies have been configured
• When Active Directory is not installed:
– A user account is created by right-clicking My Computer,
Manage, and then click on Local Users and Groups
• When Active Directory is installed:
– Use the Active Directory Users and Computers tool to create a
new account
– Hands-on Project 10-4 enables you to create an account
• After creating users, they are typically added to
global groups
20. Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Configuring Access Privileges (Permissions) –
enable you to protect the contents of files and
folders
• Permissions are set by clicking on Properties
(Security Tab) for the file or folder you wish to set
access to
– Permissions from a higher-level folder can be automatically
inherited. This is the default setting.
– See Table 10-1 on the next slide for some of the permissions
available for files and folders in Windows Server 2003/R2 and
Server 2008/R2
Guide to Operating Systems, 4th ed. 20
21. Guide to Operating Systems, 4th ed. 21
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
22. Guide to Operating Systems, 4th ed. 22
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• Configuring Shared Disks and Folders
– A drive or folder is shared through its properties
– When choosing to share a driver or folder you must provide a
name for the share and configure how many people can
access the share at the same time
– Available share permissions:
• Full Control – Provides full access to the folder including the ability
to take control or change share permissions
• Read – Permits groups or users to read and execute files
• Change – Enables users to read, add, modify, execute, and delete
files
– You can also setup Web sharing, which makes files available
on a Web server for HTML or FTP access
• Must have Internet Information Services (IIS) installed
23. Guide to Operating Systems, 4th ed. 23
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
Web sharing access permissions
24. Guide to Operating Systems, 4th ed. 24
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• NTFS permission conflicts
– If a user account has Read permission for a folder and belongs
to a group that has Write permission, that user has both Read
and Write permissions
• The exception is Deny – If a user who has Read permission of a
folder but belongs to a group for which all permissions are denied
to that folder, the user does not have access to the folder
– Summary of permission rules:
• NTFS permissions are cumulative with the exception that if an
account or group is denied access, this overrides other
permissions
• When a folder has both NTFS and share permissions, the most
restrictive permissions apply
25. Guide to Operating Systems, 4th ed. 25
Windows Server 2003/Server 2003 R2
and Server 2008/Server 2008 R2
• When a file or folder is created, copied, or moved,
the permissions can be affected:
– A newly created file inherits the permissions already set up in a
folder
– A file that is copied from one folder to another on the same
volume inherits the permissions of the folder to which it is copied
– A file or folder moved from one folder to another on the same
volume takes its permissions with it
– A file or folder that is moved/copied to a different volume inherits
the permissions of the folder to which it is moved/copied
– A file or folder that is moved/copied from a FAT volume to a folder
in an NTFS volume inherits the permissions already assigned in
the NTFS folder
26. Guide to Operating Systems, 4th ed. 26
UNIX and Linux
• Each user account is associated with a user
identification number (UID)
• Users who have common access needs can be
assigned to a group via a group identification
number (GID)
– Then permissions to access resources are assigned to the
group, instead of each user
• When a user logs on to access resources, the
password file is checked to permit logon
authorization
27. UNIX and Linux
• The password file contains:
– The user name
– An encrypted password or a reference to a shadow file (file
associated with the password file that makes it difficult for
intruders to determine the passwords of others)
– The UID, can be a number as large as 60,000
– The GID, which is the primary group id
– Information about the user, such as a description of the user’s
job
– The location of the user’s home directory (a work area for the
user to store data on the server)
– A command that is executed as the user logs on, such as
which shell to use
Guide to Operating Systems, 4th ed. 27
28. Guide to Operating Systems, 4th ed. 28
UNIX and Linux
• The shadow file (/etc/shadow) is normally only
available to the system administrator
• Contains password restriction information that
includes:
– The minimum and maximum number of days between
password changes
– Information on when the password was last changed
– Warning information about when a password will expire
– Amount of time that the account can be inactive before access
is prohibited
29. Guide to Operating Systems, 4th ed. 29
UNIX and Linux
• Information about groups is stored in the etc/group
file
– Typically contains an entry for each group consisting of the
name, an encrypted group password, the GID, and a list of
group members
– In some versions of UNIX/Linux, every account is assigned to
at least one group
• User accounts and groups can be created by
editing the password, shadow, and group files
– Or by entering UNIX/Linux commands (recommended way)
– Important to make sure that each group has a unique GID
30. UNIX and Linux
• The useradd command enables you to create a
new user
– See page 509 for a list of some of the parameters that can be
used with this command
• Example:
– useradd –c “Lisa Ramirez, Accounting Department, ext 221” –p
green$thumb –u 700 lramirez
– This command creates an account called lramirez with a
comment that includes personal information, a password set to
green$thumb, and a UID equal to 700
• Useradd, usermod, and userdel generally work in
all versions of UNIX/Linux
– Except IBM’s AIX which uses mkuser, chuser, and rmuser
Guide to Operating Systems, 4th ed. 30
31. UNIX and Linux
• Groups are created using the groupadd command
– -g parameter is used to establish the GID and the group string
creates a group name
– Example – to create the auditors group:
• groupadd –g 2000 auditors
• Once a group is created, it is modified through the
groupmod command
• Groups are deleted using the groupdel command
Guide to Operating Systems, 4th ed. 31
32. UNIX and Linux
• Files are assigned any combination of 3
permissions:
– Read – enables the user to display its contents (signified by the
letter r)
– Write – ability to modify, save, and delete a file (signified by the
letter w)
– Execute – enables a user or group of users to run a program
(signified by the letter x)
• Permissions are granted on the basis of 4 criteria:
– Ownership
– Group membership
– Other (or World)
– All (All is not used in every version of UNIX/Linux)
Guide to Operating Systems, 4th ed. 32
33. UNIX and Linux
• The owner of a file or directory typically has:
– all permissions
– can assign permissions
– has the designation of u
• Group members (g) – users who may have a
complete set of permissions, one permission, or a
combination of two (such as read and execute)
• Other (o) – consists of non-owners who represent
generic users
• All (a) – represents the combination of u + g + o
Guide to Operating Systems, 4th ed. 33
34. UNIX and Linux
• Permissions are set up by using the chmod
– In the command chmod go -r-w-x * (used on all files – signified
by the * )
• The g signifies groups and o signifies others
• The – means to remove a permission
• The -r-w-x signifies removing the read, write, and execute
permissions
– In this example, only the owner and members of the owner’s
group are left with read, write, and execute permissions on the
files in this directory
• Hands-On Project 10-10 offers practice configuring
permissions in UNIX/Linux
Guide to Operating Systems, 4th ed. 34
35. Mac OS X Server
• Built on the foundation of Mac OS X but is
designed as a true server
• A computer running Mac OS X Server can support
up to several thousand users
• Might deploy this OS Server in a company that
creates publications or advertising materials or in a
school laboratory
• Mac OS X Server includes Apache Web server
software
• Permissions are similar to those for UNIX/Linux
Guide to Operating Systems, 4th ed. 35
36. Mac OS X Server
• Mac OS X Server supports TCP/IP
– Opens door to communication with other computers that use
TCP/IP
– Compatible with the Internet e-mail protocol Simple Mail
Transfer Protocol (SMTP)
• Server Admin tool – used to:
– Create and manage accounts and groups
– Manage file and print sharing
– Establishes share points (shared resources on the server)
– Log events such as login and logout, opening, creating, and
deleting files and folders
– Monitor/create print queues
– Hold, release, and delete print jobs
Guide to Operating Systems, 4th ed. 36
37. Accessing and Sharing Resources in
Windows XP/Server 2003/R2
• Click the Start menu, right click My Computer, and
click Map Network Drive
• Click the Browser button
• Find the workgroup, domain, or other entity in
which the computer sharing the drive resides, click
it
• Click the folder that you want to access, click OK
• Set the Drive letter to which you want to map the
network drive
• Click Finish
Guide to Operating Systems, 4th ed. 37
38. Accessing and Sharing Resources in
Windows XP/Server 2003/R2
Configuring a shared folder in Windows XP
Guide to Operating Systems, 4th ed. 38
39. Accessing and Sharing Resources in
Windows Vista/7/Server 2008/R2
• Click the Start menu, click Computer, and click Map
network drive
• Set the drive letter to which you want to map the
network drive
• Click the Browse button
• Find the workgroup, domain, or other entity in which the
computer sharing the drive resides, click it
• Click the folder you want to access, click OK
• Check the Reconnect at Login box if you want the
mapping to be there after a reboot
• Click Finished when done
Guide to Operating Systems, 4th ed. 39
40. Accessing and Sharing Resources in
Windows Vista/7/Server 2008/R2
Mapping a drive in Windows 7
Guide to Operating Systems, 4th ed. 40
41. Accessing Shared Resources via
UNIX/Linux and Specialized Utilities
• UNIX/Linux enable resource sharing by using
Network File System (NFS)
– NFS enables one computer to mount a partition on another
computer and then access file systems on the mounted
partition as if they were local
• To use NFS in Red Hat Enterprise Linux, the
following services must be enabled:
– portmap – establishes and manages the remote connections
through designated User Datagram Protocol (UDP) ports
– rpc.mounted – handles the RPC request to mount a partition
– rpc.nfsd – enables the Linux kernel to manage specific
requests from a client
Guide to Operating Systems, 4th ed. 41
42. Accessing Shared Resources via
UNIX/Linux and Specialized Utilities
• Security that controls which clients can use NFS is
handled through entries in two files:
– /etc/hosts.allow – contains the clients that are allowed to use
NFS
– /etc/hosts.deny – contains computers that are not allowed to
use NFS
• Samba – utility that uses the Server Message
Block (SMB) protocol to allow access to shared
Windows drives
Guide to Operating Systems, 4th ed. 42
43. Accessing and Sharing Resources via
Mac OS
• Uses Samba to connect to another computer that is
sharing a disk or folder
• To mount a shared drive:
– Open the Go menu, select Connect to Server, and enter the
address of the server or use the Browse button to find it
Connect to Server dialog box in Mac OS X
Guide to Operating Systems, 4th ed. 43
44. Accessing and Sharing Resources via
Mac OS
• In Mac OS X – turn on file sharing through System
Preferences
• Some of the resources that you can configure for
sharing:
– File Sharing – To share folders with other Mac OS X computers
– Web Sharing – To share information on the Web
– Remote Login – To allow another computer to remotely log into
your computer
– Remote Apple Events – So that other Mac OS X computers
can send events to this computer
– Printer Sharing – To enable others to use your computer’s
printer
Guide to Operating Systems, 4th ed. 44
45. Sharing Printing Devices
• Windows Systems – once a printer is setup, it can be
configured for printer sharing through Properties
– Different Windows versions have different steps in order to
share a printer
• When you configure sharing, make sure you
configure share permissions for the shared printer
– The following are share permissions you will see:
• Print – Can send print jobs and manage your own jobs
• Manage Documents – Can manage your print jobs or those sent
by any other user
• Manage Printers – Can access the share, change share
permissions, turn off sharing, configure printer properties
• Special Permissions – shows whether special permissions are
configured, and if they are allowed or denied
Guide to Operating Systems, 4th ed. 45
46. Sharing Printing Devices
• UNIX/Linux printing is essentially the process of
logging onto the UNIX/Linux server and printing to
one of its printers
– Uses Berkeley Software Distribution (BSD) spooling system
– BSD uses 3 components for printing
• lpr print program
• lpd daemon
• The file /etc/printcap to specify printer properties (a text file that
can be modified via a text editor)
• In Red Hat Enterprise Linux or Fedora – use the
GNOME Print Manager tool
Guide to Operating Systems, 4th ed. 46
47. Sharing Printing Devices
• In Mac OS X Systems there are 2 ways to set up
printer sharing
– First method:
• Open System Preferences from the Dock or by clicking Go,
clicking Applications, and double-clicking System Preferences
• Double-click Sharing
• Check the box for Printer Sharing
• Close the Sharing Window
– Second method:
• Open System Preferences from the Dock or by clicking Go,
clicking Applications, and double-click System Preferences
• Double-click Print & Fax
• Check the box for Share my printers with other computers and
close the window
Guide to Operating Systems, 4th ed. 47
49. Network and Internet Resource
Servers
• UNIX/Linux, Windows, and Mac OS X servers can
be set up as resource servers to provide network
and Internet resources
– E-mail servers
– E-commerce
– Videoconferencing
– Multimedia
– Instant messaging
– Alerts for weather and security-related activities
– Web servers
– Intranet and virtual private network (VPN) servers
– FTP servers
Guide to Operating Systems, 4th ed. 49
50. Chapter Summary
• Resource sharing is why networks exist starting with sharing
files, which led to sharing disks and folders, which led to
printing and program services
• Whenever network resources such as folder and printers are
shared, it is important to secure these resources to make
sure that only authorized users can access them
• When you configure Windows resources, the process
typically involves creating security groups for easier
management, establishing account policies and user
accounts, setting permissions on the resources, and
configuring sharing of the resources
• UNIX/Linux systems also use groups, user accounts, and
permissions to enable resource access and security
Guide to Operating Systems, 4th ed. 50
51. Chapter Summary
• Mac OS X Server is a server version of Mac OS X for providing
more extensive access to resources through user accounts and
sharing services
• Client operating systems – such as Windows, UNIX/Linux, and
Mac OS X – come with utilities to enable them to access shared
resources over a network and to offer resources to share
• All of the OSs discussed in this book offer the ability to share
printers and to access printers that are shared through a
network
• Network server OSs continue to offer more and more ways to
share resources such as e-mail, e-commerce,
videoconferencing, multimedia distribution, and database
access
Guide to Operating Systems, 4th ed. 51