This ppt gives information about:
1. Administering the server
2. Correcting installation problems
3. Setting up user accounts
4. Connecting to the network
5. Configuring utilities
In the presentation I have tried to cover the Evolution of Linux as an Operating System. The most of the content used is freely available on Internet , I have just tried to streamline it and summarize it as cleanly as possible from my point of view. Any improvements, suggestions, comments are most welcom.
This ppt gives information about:
1. Administering the server
2. Correcting installation problems
3. Setting up user accounts
4. Connecting to the network
5. Configuring utilities
In the presentation I have tried to cover the Evolution of Linux as an Operating System. The most of the content used is freely available on Internet , I have just tried to streamline it and summarize it as cleanly as possible from my point of view. Any improvements, suggestions, comments are most welcom.
Linux History
Design Principles
Kernel Modules
Process Management
Scheduling
Memory Management
File Systems
Input and Output
Interprocess Communication
Network Structure
Security
A beginners guide to get familiar with the Linux and learn the most commonly and frequently used commands. Most of the commands are expected to run across all well known Linux distributions. Plus, there are a few commands for the advanced users as well.
Linux History
Design Principles
Kernel Modules
Process Management
Scheduling
Memory Management
File Systems
Input and Output
Interprocess Communication
Network Structure
Security
A beginners guide to get familiar with the Linux and learn the most commonly and frequently used commands. Most of the commands are expected to run across all well known Linux distributions. Plus, there are a few commands for the advanced users as well.
I have described all about linux OS starting from basics.
I guess this PPT will really be very very helpful for you guys.
This was one of the most appreciable PPT in my time when i presented it in my class.
It is a simple powerpoint presentation on Linux Operating System of its brief and simplified introduction of this Operating System.
This is based on Ubuntu version of Linux.
History of Linux
Brain behind development
Why Linux
GNU
Why GNU ?
Where can you find Linux?
Linux is Best!!
Core components of Linux
File system
Drive letter’s
Security
Facts about Linux
Linux is the best-known and most-used open source operating system. As an operating system, Linux is software that sits underneath all of the other software on a computer, receiving requests from those programs and relaying these requests to the computer's hardware.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2.
MSPMS’S
Deogiri Institute Of Engineering And Management
Studies, Aurangabad
Department Of Second Year Engineering
Name Of the Topic:
Linux
Under the Guidance of:
Prof. Pankaj Durole
Name Of Subject:
Operating Systems
Name Of Student:
Sahil Gothoskar (26020)
2
3.
Index
Contents Page no.
❖ Introduction 4
❖ Architecture 4
❖ Hardware support 6
❖ Components and Installations 8
❖ Servers Mainframes and Supercomputers 8
❖ Copyright Trading and Naming 9
❖ Characters of OS :
➢ Space Management. 10
➢ Memory management. 10
➢ Process Management. 11
➢ Network And Security. 14
❖ Relations & Maintenance
3
4.
❖ Introduction
1. Linux is a family of free and open-source software operating systems built around the
Linux kernel. Typically, Linux is packaged in a form known as a Linux distribution (or
distro for short) for both desktop and server use.
2. The defining component of a Linux distribution is the Linux kernel, an operating system
kernel first released on September 17, 1991, by Linus Torvalds.
3. Linux was originally developed for personal computers based on the Intel x86
architecture, but has since been ported to more platforms than any other operating
system.Because of the dominance of the Linux kernel-based Android OS on
smartphones, Linux has the largest installed base of all general-purpose operating
systems.
4. Linux is also the leading operating system on servers and other big iron systems such as
mainframe computers, and the only OS used on TOP500 supercomputers (since
November 2017, having gradually eliminated all competitors).
5. It is used by around 2.3% of desktop computers.The Chromebook, which runs the Linux
kernel-based Chrome OS, dominates the US K–12 education market and represents
nearly 20% of the sub-$300 notebook sales in the US.
6. Linux also runs on embedded systems, i.e. devices whose operating system is typically
built into the firmware and is highly tailored to the system.
7. This includes TiVo and similar DVR devices, network routers, facility automation
controls, televisions, video game consoles and smartwatches. Many smartphones and
tablet computers run Android and other Linux derivatives.
❖ Architecture:
1. The Linux kernel is a monolithic kernel, supporting true preemptive multitasking
(both in user mode and, since the 2.6 series, in kernel mode), virtual memory,
shared libraries, demand loading, shared copy-on-write executables (via KSM),
memory management, the Internet protocol suite, and threading.
2. Device drivers and kernel extensions run in kernel space (ring 0 in many CPU
architectures), with full access to the hardware, although some exceptions run in
user space, for example, filesystems based on FUSE/CUSE, and parts of UIO.
3. The graphics system most people use with Linux does not run within the kernel.
Unlike standard monolithic kernels, device drivers are easily configured as
modules, and loaded or unloaded while the system is running.
4
5.
4. Also, unlike standard monolithic kernels, device drivers can be preempted under
certain conditions; this feature was added to handle hardware interrupts correctly
and to better support symmetric multiprocessing. By choice, the Linux kernel has
no binary kernel interface.
5. The hardware is also incorporated into the file hierarchy. Device drivers interface
to user applications via an entry in the /dev or /sys directories.
6. Process information as well is mapped to the file system through the /proc
directory.
Map of the Linux kernel
5
6.
❖ Hardware Support
1. The Linux kernel is a widely ported operating system kernel, available for devices
ranging from mobile phones to supercomputers; it runs on a highly diverse range of
computer architectures, including the hand-held ARM-based iPAQ and the IBM
mainframes System z9 or System z10.
2. Specialized distributions and kernel forks exist for less mainstream architectures; for
example, the ELKS kernel fork can run on Intel 8086 or Intel 80286 16-bit
microprocessors, while the µClinux kernel fork may run on systems without a memory
management unit.
3. The kernel also runs on architectures that were only ever intended to use a
manufacturer-created operating system, such as Macintosh computers (with both
PowerPC and Intel processors), PDAs, video game consoles, portable music players,
and mobile phones.
4. There are several industry associations and hardware conferences devoted to
maintaining and improving support for diverse hardware under Linux, such as Freedom
HEC. Over time, support for different hardware has improved in Linux, resulting in any
off-the-shelf purchase having a "good chance" of being compatible.
Linux is ubiquitously found on various types of hardware.
6
7.
❖ Desktop
Desktop environment and Linux adoption:
1. The popularity of Linux on standard desktop computers and laptops has been increasing
over the years. Most modern distributions include a graphical user environment, with, as
of February 2015, the two most popular environments being the KDE Plasma Desktop
and Xfce.
2. No single official Linux desktop exists: rather desktop environments and Linux
distributions select components from a pool of free and open-source software with which
they construct a GUI implementing some more or less strict design guide.
3. GNOME, for example, has its human interface guidelines as a design guide, which gives
the human–machine interface an important role, not just when doing the graphical
design, but also when considering people with disabilities, and even when focusing on
security.
4. The collaborative nature of free software development allows distributed teams to
perform language localization of some Linux distributions for use in locales where
localizing proprietary systems would not be cost-effective.
5. For example, the Sinhalese language version of the Knoppix distribution became
available significantly before Microsoft translated Windows XP into Sinhalese. In this
case the Lanka Linux User Group played a major part in developing the localized system
by combining the knowledge of university professors, linguists, and local developers.
7
8.
Visible software components of the Linux desktop stack include the display server, widget
engines, and some of the more widespread widget toolkits. There are also components not
directly visible to end users, including D-Bus and PulseAudio.
❖ Components and installation
1. Besides externally visible components, such as X window managers, a non-obvious but
quite central role is played by the programs hosted by freedesktop.org, such as D-Bus or
PulseAudio; both major desktop environments (GNOME and KDE) include them, each
offering graphical front-ends written using the corresponding toolkit (GTK+ or Qt).
2. A display server is another component, which for the longest time has been
communicating in the X11 display server protocol with its clients; prominent software
talking X11 includes the X.Org Server and Xlib.
3. Frustration over the cumbersome X11 core protocol, and especially over its numerous
extensions, has led to the creation of a new display server protocol, Wayland.
4. Installing, updating and removing software in Linux is typically done through the use of
package managers such as the Synaptic Package Manager, PackageKit, and Yum
Extender.
5. While most major Linux distributions have extensive repositories, often containing tens of
thousands of packages, not all the software that can run on Linux is available from the
official repositories.
❖ Servers, mainframes and supercomputers
1) Broad overview of the LAMP software bundle, displayed here together with Squid. A
high-performance and high-availability web server solution providing security in a hostile
environment.
2) Linux distributions have long been used as server operating systems, and have risen to
prominence in that area; Netcraft reported in September 2006, that eight of the ten
(other two with "unknown" OS) most reliable internet hosting companies ran Linux
distributions on their web servers, with Linux in the top position.
3) In June 2008, Linux distributions represented five of the top ten, FreeBSD three of ten,
and Microsoft two of ten; since February 2010, Linux distributions represented six of the
top ten, FreeBSD three of ten, and Microsoft one of ten, with Linux in the top position.
8
9.
4) Linux distributions are the cornerstone of the LAMP server-software combination (Linux,
Apache, MariaDB/MySQL, Perl/PHP/Python) which has achieved popularity among
developers, and which is one of the more common platforms for website hosting.
5) Linux distributions have become increasingly popular on mainframes, partly due to
pricing and the open-source model. In December 2009, computer giant IBM reported
that it would predominantly market and sell mainframe-based Enterprise Linux Server.
6) At LinuxCon North America 2015, IBM announced LinuxONE, a series of mainframes
specifically designed to run Linux and open-source software.
7) Linux distributions are also dominant as operating systems for supercomputers. As of
November 2017, all supercomputers on the 500 list run some variant of Linux.
❖ Copyright, trademark, and naming
01. Linux kernel is licensed under the GNU General Public License (GPL), version 2. The
GPL requires that anyone who distributes software based on source code under this
license, must make the originating source code (and any modifications) available to the
recipient under the same terms.
02. Other key components of a typical Linux distribution are also mainly licensed under the
GPL, but they may use other licenses; many libraries use the GNU Lesser General
Public License (LGPL), a more permissive variant of the GPL, and the X.Org
implementation of the X Window System uses the MIT License.
03. Torvalds states that the Linux kernel will not move from version 2 of the GPL to version
3. He specifically dislikes some provisions in the new license which prohibit the use of
the software in digital rights management.
04. It would also be impractical to obtain permission from all the copyright holders, who
number in the thousands.
05. A 2001 study of Red Hat Linux 7.1 found that this distribution contained 30 million
source lines of code. Using the Constructive Cost Model, the study estimated that this
distribution required about eight thousand person-years of development time.
06. According to the study, if all this software had been developed by conventional
proprietary means, it would have cost about $1.57 billion (2019 US dollars) to develop in
the United States.
07. Most of the source code (71%) was written in the C programming language, but many
other languages were used, including C++, Lisp, assembly language, Perl, Python,
Fortran, and various shell scripting languages. Slightly over half of all lines of code were
9
10.
licensed under the GPL. The Linux kernel itself was 2.4 million lines of code, or 8% of
the total.
08. In a later study, the same analysis was performed for Debian version 4.0 (etch, which
was released in 2007).
09. This distribution contained close to 283 million source lines of code, and the study
estimated that it would have required about seventy three thousand man-years and cost
US$8.66 billion (in 2019 dollars) to develop by conventional means.
❖ SPACE MANAGEMENT
The „du“ (Disk Usage) command line is a standard command under Unix and Linux. It is
used to list the disk space used by files on a machine and crucial for disk space
management on unix and linux systems. Several paramaters enable users to format and
filter the results.
Using du is a good starting point when trying to clean up unsed disk space under Unix.
Many smaller machines run Microsoft Windows. There is a wide range of graphical disk
space managers for Windows, but few will enable you to scan Linux and Unix servers
without having to resort to Samba. The Enterprise Edition of SpaceObServer will scan
Unix and Linux servers via SSH.
❖ The Memory Management:
1. The memory management subsystem is one of the most important parts of the
operating system. Since the early days of computing, there has been a need for
more memory than exists physically in a system.
2. Strategies have been developed to overcome this limitation and the most
successful of these is virtual memory. Virtual memory makes the system appear
to have more memory than it actually has by sharing it between competing
processes as they need it.
3. Virtual memory does more than just make your computer's memory go further.
The memory management subsystem provides:
1. Large Address Spaces:
The operating system makes the system appear as if it has a larger amount of memory
than it actually has. The virtual memory can be many times larger than the physical
memory in the system,
10
11.
2. Protection:
Each process in the system has its own virtual address space. These virtual address
spaces are completely separate from each other and so a process running one
application cannot affect another. Also, the hardware virtual memory mechanisms allow
areas of memory to be protected against writing. This protects code and data from being
overwritten by rogue applications.
3. Memory Mapping:
Memory mapping is used to map image and data files into a processes address space.
In memory mapping, the contents of a file are linked directly into the virtual address
space of a process.
4. Fair Physical Memory Allocation:
The memory management subsystem allows each running process in the system a fair
share of the physical memory of the system,
5. Shared Virtual Memory:
Although virtual memory allows processes to have separate (virtual) address spaces,
there are times when you need processes to share memory. For example there could be
several processes in the system running the bash command shell. Rather than have
several copies of bash, one in each processes virtual address space, it is better to have
only one copy in physical memory and all of the processes running bash share it.
Dynamic libraries are another common example of executing code shared between
several processes.
Shared memory can also be used as an Inter Process Communication (IPC)
mechanism, with two or more processes exchanging information via memory common to
all of them. Linux supports the Unix TM
System V shared memory IPC.
❖ Process Management:
Process management is a case in point. Linux creates a process whenever a program is
launched, either by you or by Linux. This process is a container of information about how that
program is running and what’s happening.
If the process runs and terminates correctly, then everything is hunky-dory; however, if it hogs
the CPU, or refuses to go when its time is up, then the Linux commands described below may
help you to restore law and order.
11
12.
Let’s start with a list of things you may want to do when managing Linux processes:
● See which processes are running
● See how much of your Linux system the processes are using (especially any greedy
ones)
● Locate a particular process to see what it’s doing or to take action on it
● Define or change the level of priority associated with that process
● Terminate the process if it has outlived its usefulness or if it’s misbehaving
The commands described below should be entered via the command line interface. Simply
open a terminal (all-text) window to access this interface. It may look basic, but it’s actually very
powerful and flexible – just the thing for keeping all those processes in line.
1.top
12
13.
The top command gives you information on the processes that currently exist. As the sample
output above shows, the first part of the information is an overview of the situation.
The second part, organized in columns, gives details for each process, including its unique
reference number (PID), priority (PR), status (S), and resource usage (%CPU, for example).
2. htop
The htop command is like top, but prettier and smarter. The information is presented in a clearer
format, and you can select a particular process (use the arrow keys) and then act on it (use the
F1, F2, etc. keys) with the htop display.
So why would anyone use anything other than htop? Simply because htop is not always
available by default on Linux systems (whereas top is always available).
You may have an extra installation step before you can use it. Your installation instruction will
be sudo apt-get install htop if you’re using Ubuntu or Debian, for instance.
The colors htop uses in its display help convey its message.
The CPU and memory bars may show blue bars for low priority processes, green for normal
priority, or red for kernel. Yellow corresponds to IRQ (interrupt request) time, magenta to soft
IRQ time, and gray to I/O (input/output) wait time.
The load average figure represents the degree to which the CPU is being kept busy. A figure of
“1.0” corresponds to 100 percent busy. The figure of “0.37” in the screenshot below corresponds
to 37 percent.
This is the load average over the last minute. The two other load average figures are the load
averages over the last five and the last 15 minutes, respectively.
13
14.
❖ Linux Security:
Security should be one of the foremost thoughts at all stages of
setting up your Linux computer. To implement a good security
policy on a machine requires a good knowledge of the
fundamentals of Linux as well as some of the applications and
protocols that are used.
Security of Linux is a massive subject and there are many
complete books on the subject. I couldn't put everything in this one
tutorial, but this does give a basic introduction to security and how
the techniques, and tools can be used to provide additional security
on a Linux computer. Hopefully this will provide sufficient
information to be able to investigate other sources of information.
● Why do we need security?
Although Linux users are must less prone to viruses than some
other major operating systems, there are still many security issues
facing Linux users and administrators.
One of the most important steps in any task is to identify why you
are doing it. Rather than just saying we need to make a system
14
15.
secure you need to consider what is meant by secure, what risks
there are associated with any data that's available, what impact
your security measures will have on your users. Without first
considering any of these factors how else will you know if you've
met your goal of making a system secure.
● Security requirements
After establishing why security is to be implemented you should
consider the aspects of security that are required. The main
security requirements are:
Authorisation - Only allow those that need access to the data
Authenticity - Verifying they are who they say they are
Privacy / Confidentiality - Ensure personal information is not
being compromised
Integrity - Ensuring that the data has not been tampered with
Non-repudiation - Confirmation that data is received. The ability to
prove it in court
Availability - Ensure that the system can perform it's required
function
● Imposed requirements
Some security requirements are not ones that are directly under
your control but are instead imposed upon you. These may be legal
requirements (e.g. Data Protection Act 1998), compliance with
standards (e.g. ISO 7984-2 International Standards Organisation
Security Standard), or corporate policy. If you handle credit card
transactions then you may be required to comply with minimum
security standards as described by the Payment Card Industry
(PCI).
Some of these standards are very vague (e.g. the Data Protection
Act just specifies that appropriate security should be in place)
whereas some may be more specific (e.g. a corporate policy may
insist on a minimum length of passwords etc.)
15
16.
❖ Relation with Linux distributions
Most Linux users run a kernel supplied by their Linux distribution. Some distributions ship the
"vanilla" or "stable" kernels.
However, several Linux distribution vendors (such as Red Hat and Debian) maintain another
set of Linux kernel branches which are integrated into their products.
These are usually updated at a slower pace compared to the "vanilla" branch, and they usually
include all fixes from the relevant "stable" branch, but at the same time they can also add
support for drivers or features which had not been released in the "vanilla" version the
distribution vendor started basing their branch from.
❖ Maintenance
The latest kernel version and older kernel versions are maintained separately. Most latest kernel
releases were supervised by Linus Torvalds.Current versions are released by Greg
Kroah-Hartman.
Maintenance of older kernel versions happens separately. Major releases as old as 2.0
(officially made obsolete with the kernel 2.2.0 release in January 1999) are maintained as
needed, although at a very slow pace.
Linux kernel 4.14 has been released and with it long-term support (LTS) has been increased to
6 years, which was partially motivated by Google's desire to provide longer support for Android
devices.
-0-
16