I have described all about linux OS starting from basics.
I guess this PPT will really be very very helpful for you guys.
This was one of the most appreciable PPT in my time when i presented it in my class.
This ppt discusses the history of both the operating systems & compares both of them in terms of Kernel, memory management, GUI and application support.
I have described all about linux OS starting from basics.
I guess this PPT will really be very very helpful for you guys.
This was one of the most appreciable PPT in my time when i presented it in my class.
This ppt discusses the history of both the operating systems & compares both of them in terms of Kernel, memory management, GUI and application support.
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
** Linux Admin Certification Training: https://www.edureka.co/linux-admin **
This Edureka PPT on "Linux vs Windows" will help you understand the basic differences between both of these operating systems while giving you an idea about each of the Operating Systems. This also takes you through the features and limitations of both Linux & Windows.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Case study of windows a product of microsoft including the history and related to operating system with MS-DOS its scheduling, networking, performance, etc. It also contains the windows architecture, it's system components like kernel, and scheduling through threads in windows.
This ppt gives information about:
1. Administering the server
2. Correcting installation problems
3. Setting up user accounts
4. Connecting to the network
5. Configuring utilities
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
** Linux Admin Certification Training: https://www.edureka.co/linux-admin **
This Edureka PPT on "Linux vs Windows" will help you understand the basic differences between both of these operating systems while giving you an idea about each of the Operating Systems. This also takes you through the features and limitations of both Linux & Windows.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Case study of windows a product of microsoft including the history and related to operating system with MS-DOS its scheduling, networking, performance, etc. It also contains the windows architecture, it's system components like kernel, and scheduling through threads in windows.
This ppt gives information about:
1. Administering the server
2. Correcting installation problems
3. Setting up user accounts
4. Connecting to the network
5. Configuring utilities
Unix Process Management
Process management is an integral part of any modern day operating system (OS). The OS must allocate resources to processes, enable processes to share and exchange information, protect the resources of each process from other processes and enable synchronisation among processes
It is a simple powerpoint presentation on Linux Operating System of its brief and simplified introduction of this Operating System.
This is based on Ubuntu version of Linux.
Linux Implementation ProposalRichard JohnsonWhy Linux .docxcroysierkathey
Linux Implementation Proposal
Richard Johnson
Why Linux?
Costless
Stable
Reliable
Extremely powerful
Highly Secure
Why Linux
The Linux system is very stable and is not prone to crashes unlike Windows
Linux is completely free and users do not need to pay for anything.
Cost effective: Linux can be installed on old hardware, thus helping in optimal use of all the hardware resources.
Features of Linux Operating System:
Portable(Multiplatform)
Multitasking.
Multi User.
Multiprocessor (SMP) Support.
Multithreading Support.
Virtual Memory.
Hierarchical File System.
Graphical User Interface (X Window System, Wayland)
Basic Features of Linux
Portable − Portability means software can works on different types of hardware in same way.
Multiprogramming − Linux is a multiprogramming system means multiple applications can run at same time.
Security − Linux provides user security using authentication features like password protection/ controlled access to specific files/ encryption of data. Less prone to hackers!
Software application for Linux
OpenOffice (Microsoft Office)
Adobe Acrobat Reader
Konqueror: The KDE File Manager and Web Browser (Internet Explorer)
Gedit (Notepad/Wordpad)
Gimp (Photoshop)
Cinelerra (Movie Maker)
VLC (Media Player)
Comparison of Operating System Linux v/s Windows
Linux is freely available or online downloads, for windows companies have pay for their license.
Windows need up to date time to time, its updating process is slower than Linux.
Linux supports backward compatibility unlike to the windows.
Most of the software made on the windows are need to be licensed but in Linux all of them are freely available.
Hardware Requirements
The transition to the Linux environment will not require any changes to the present hardware components.
Windows utilize Intel Core and 8 GB of ram which is more than what is required for Linux
Graphical User Interface
Users will log in with the use of specially designated user ID and passwords. This functions the same as Windows.
Each password will be unique per the user.
Each user will have different access to the system, depending on their level of use; this means that a person will be allowed to access part of the system that they work on, and the rest will be blocked.
Server File Sharing Tool
Samba Server
Share files across Linux, Windows, and Mac OS X systems
pCloud
Is a cloud storage provider
ANY QUESTIONS?
Linux Implementation Proposal: Migration Proposal Presentation (due at the end of Week 3)
Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux. The company is specifically interested in seeing the following information:
· Based on your current understanding of Faster Computing's business, what are some potential benefits of Linux?
· The company is aware that many different Linux derivatives exist. Which would Go2Linux recommend, and why?
· Are there graphical interfaces availab ...
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxSHIVA101531
Linux and Windows Server Critique
Team C
POS 420
June 25, 2012
Yevgeniy Tovshteyn
Linux vs. Windows
Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming.
Kudler Fine Foods Current Systems:
3 locations: La Jolla, Del Mar, and Encinitas
La Jolla
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and
bubble jet printer.
1 Server with NT Server
1 56K modem
Del Mar
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and
bubble jet printer.
1 Server with NT Server
1 56K modem
Encinitas
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 56K modem
9 Access Databases: Customer, Inventory, Item, Order, Order Line, Store, Supplier, Tax Table, Tender.
It looks like they will need some type of Enterprise Server software and upgrades to their hardware for compatibility purposes.
Security
Overview of Windows Security
Windows security is used in many natural business settings. Windows Server incorporates features such as Encrypting File System (EFS), a feature allowing for encryption/decryption of files and algorithms as well as Access Management and Identity Protection, a feature that protects the policies and processes to control personal and private data. Windows Server uses networking security to combat viruses and provide network stability. Windows Server also uses secure messaging and collaborative solutions, such as SharePoint, for use when dealing with business partners (Adams, 2012).
Overview of Linux Security
Linux is an open platform allowing for users to add to the structure of the system. Strength in numbers helps Linux security in that security threats are often fixed right away and for all to see.
Why we choose Linux over Windows for Kudler Fine Foods, no system can ever be completely secure.
Network Administration
The total network size for the company is not that large, so administration of the network and the associated systems; including all the Point Of Sale (POS) terminals currently associated with the Novell 4.11 servers, Inventory Spreadshee ...
It is a Unix like operating system.
It can run on 32 bit and 64 bit hardware.
Linux OS, is a freely distributable, cross-platform
Supports multiple processors.
True multi-tasking, multi-user OS.
Following are some of the important features of Linux Operating System.
Portable - Portability means softwares can works on different types of hardwares in same way.Linux kernel and application programs supports their installation on any kind of hardware platform.
Open Source - Linux source code is freely available and it is community based development project. Multiple teams works in collaboration to enhance the capability of Linux operating system and it is continuously evolving.
Multi-User - Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time.
Multiprogramming - Linux is a multiprogramming system means multiple applications can run at same time.
Hierarchical File System - Linux provides a standard file structure in which system files/ user files are arranged.
Shell - Linux provides a special interpreter program which can be used to execute commands of the operating system. It can be used to do various types of operations, call application programs etc.
Security - Linux provides user security using authentication features like password protection/ controlled access to specific files/ encryption of data.
Linux is the best-known and most-used open source operating system. As an operating system, Linux is software that sits underneath all of the other software on a computer, receiving requests from those programs and relaying these requests to the computer's hardware.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. CONTENTSCONTENTS
What is an Operating System..???What is an Operating System..???
Introducing Linux..Introducing Linux..
Introducing Windows..Introducing Windows..
Comparison between Linux and WindowsComparison between Linux and Windows
ConclusionConclusion
3. What is an operating system?What is an operating system?
A program that controls the execution ofA program that controls the execution of
application programsapplication programs
An interface between applications andAn interface between applications and
hardware.hardware.
Makes the computer more convenient to useMakes the computer more convenient to use
Manages the resources of the computerManages the resources of the computer
Allows resources to be used in an efficientAllows resources to be used in an efficient
mannermanner
Examples of OS??Examples of OS??
4. Services Provided by the OSServices Provided by the OS
Program executionProgram execution
Access to Input/Output (I/O) devicesAccess to Input/Output (I/O) devices
Disks, screens, keyboards, miceDisks, screens, keyboards, mice
Printers, cameras, speakers, etc.Printers, cameras, speakers, etc.
Controlled access to filesControlled access to files
System accessSystem access
Sometimes: Program developmentSometimes: Program development
Compilers, editors and debuggersCompilers, editors and debuggers
5. Introducing LinuxIntroducing Linux
Linux was originally built by Linus Torvalds atLinux was originally built by Linus Torvalds at
the University of Helsinki in 1991.the University of Helsinki in 1991.
Linux is a Unix-like, Kernal-based, fully memory-Linux is a Unix-like, Kernal-based, fully memory-
protected, multitasking operating system .protected, multitasking operating system .
Open Source Operating System.Open Source Operating System.
Free SoftwareFree Software
Source Code AvailableSource Code Available
It runs on a wide range of hardware from PCs toIt runs on a wide range of hardware from PCs to
Macs.Macs.
6. Introducing WindowsIntroducing Windows
First version of Windows – Windows 3.1First version of Windows – Windows 3.1
released in 1992 by Microsoft.released in 1992 by Microsoft.
Windows is a GUI based operating systemWindows is a GUI based operating system
It has powerful networking capabilities, isIt has powerful networking capabilities, is
multitasking, and extremely user friendlymultitasking, and extremely user friendly
13. Fundamental Difference betweenFundamental Difference between
Linux & WindowsLinux & Windows
One fundamental difference between theOne fundamental difference between the
two systems is the fact that Linux is "opentwo systems is the fact that Linux is "open
source".source".
14. Comparing ApplicationsComparing Applications
Linux falls short in the number of differentLinux falls short in the number of different
applications available for it.applications available for it.
There are much more various applicationsThere are much more various applications
available for Microsoft since the populationavailable for Microsoft since the population
of Window’s users is greater than Linux’sof Window’s users is greater than Linux’s
Since Microsoft is more popular, theSince Microsoft is more popular, the
Hardware products are aimed at theHardware products are aimed at the
biggest market – Windows, such that thebiggest market – Windows, such that the
product would be sold and used widelyproduct would be sold and used widely
15. Comparing Applications Cont.Comparing Applications Cont.
Linux programs distributes freely sinceLinux programs distributes freely since
they are not developed by commercialthey are not developed by commercial
software companies, but instead aresoftware companies, but instead are
created under the GNU Public License,created under the GNU Public License,
which makes the software freewhich makes the software free
Linux software lacks the GUI and isLinux software lacks the GUI and is
therefore not “liked” by many userstherefore not “liked” by many users
16. Comparing Applications Cont.Comparing Applications Cont.
Windows has its own share of problems –Windows has its own share of problems –
the fact that some software is notthe fact that some software is not
compliant for different versions of windowscompliant for different versions of windows
(i.e. Windows 95/98) and many times the(i.e. Windows 95/98) and many times the
GUI concept is overused such thatGUI concept is overused such that
command arguments cannot be passed tocommand arguments cannot be passed to
the programthe program
17. Linux advantages in Kernel and theLinux advantages in Kernel and the
OS environmentOS environment
Linux requires 386 architecture to run.Linux requires 386 architecture to run.
Thus, it is compatible with any improvedThus, it is compatible with any improved
architecture such as 486, Pentium,architecture such as 486, Pentium,
Pentium Pro, etcPentium Pro, etc
There are drivers available for much manyThere are drivers available for much many
types of hardware devicestypes of hardware devices
18. Contd…Contd…
Linux program installation seems to beLinux program installation seems to be
easier since it only requires a restart wheneasier since it only requires a restart when
hardware device has been changedhardware device has been changed
Linux supports multiple copies of theLinux supports multiple copies of the
Kernel on the system such that if an errorKernel on the system such that if an error
is encountered and the Kernel becomesis encountered and the Kernel becomes
corrupted, a different copy of the Kernelcorrupted, a different copy of the Kernel
can be used to boot up the systemcan be used to boot up the system
19. ReliabilityReliability
OS it must not crash, even under extremeOS it must not crash, even under extreme
loads. OS should process requests even ifloads. OS should process requests even if
the operating system or hardware failsthe operating system or hardware fails
Windows seems to be less stable evenWindows seems to be less stable even
though the latest versions of Windows –though the latest versions of Windows –
2000 and XP are far more improved than2000 and XP are far more improved than
the incredibly buggy Windows 95the incredibly buggy Windows 95
20. SecuritySecurity
Linux seems to be more prepared forLinux seems to be more prepared for
protecting itself because of the beginningprotecting itself because of the beginning
developments of Linux, UNIX, anddevelopments of Linux, UNIX, and
FreeBSD which were aimed at top notchFreeBSD which were aimed at top notch
securitysecurity
Linux allows does not create registry keysLinux allows does not create registry keys
in a way Windows does allowing a user toin a way Windows does allowing a user to
browse installed components registrybrowse installed components registry
keys, which contain important informationkeys, which contain important information
21. Security contd…Security contd…
Linux is more virus proof since viruses –Linux is more virus proof since viruses –
malicious programs either cannot be runmalicious programs either cannot be run
automatically on the Linux machine, orautomatically on the Linux machine, or
simply are not capable of being executedsimply are not capable of being executed
on a 386 architectureon a 386 architecture
Windows is often known for a largeWindows is often known for a large
amount of loop holesamount of loop holes
22. Information Protection and
Security
Access control
regulate user access to the system
Information flow control
regulate flow of data within the system and
its delivery to users
Certification
proving that access and flow control
perform according to specifications
24. Financial DifferencesFinancial Differences
Companies have to spend millions forCompanies have to spend millions for
licenses for ever individual windowslicenses for ever individual windows
computercomputer
For Linux companies don’t have to spendFor Linux companies don’t have to spend
anythinganything
25. Technical DifferencesTechnical Differences
Keeping up to date: Linux upgrades fasterKeeping up to date: Linux upgrades faster
than Windowsthan Windows
Compatibility: Linux is BackwardCompatibility: Linux is Backward
Compatible unlike Windows.Compatible unlike Windows.
26. Technical DifferencesTechnical Differences
Features Provided:Features Provided:
Both support Dynamic CachingBoth support Dynamic Caching
Both have Multi-user SupportBoth have Multi-user Support
Application differencesApplication differences
No commercial word processor for Linux,No commercial word processor for Linux,
which matches the quality for Windowswhich matches the quality for Windows
27. End-User DifferencesEnd-User Differences
Proprietary vs. Open sourceProprietary vs. Open source
Windows is a Proprietary TechnologyWindows is a Proprietary Technology
Applications will only work on WindowsApplications will only work on Windows
Linux – Open SourceLinux – Open Source
28. FILE SYSTEMFILE SYSTEM
Implements long-term store
Information stored in named objects
called files
OS typically offers the following file
operations:
creating, deleting, renaming
reading, writing
locking, unlocking
29. FILE SYSTEM Contd…FILE SYSTEM Contd…
NTFS v EXT3
We have used EXT2 and EXT3 as the
Linux FS due to their popularity
NTFS is the primary XP FS
– Not backwards compatible with Win2k