The document provides information about the Ubuntu operating system. It discusses Ubuntu's history as a fork of Debian Linux that was created to be more user-friendly. It was founded by Mark Shuttleworth in 2004. The document also covers Ubuntu's design principles, use of the Linux kernel for processes, memory management, file systems, security features, and graphical user interface.
The document provides an overview of the Ubuntu operating system. It discusses Ubuntu's history as a Debian-based Linux distribution first released in 2004. It covers Ubuntu's design principles including its use of the Linux kernel for process management, memory management, and file systems. It also addresses security topics like hacking threats and strategies for hardening Ubuntu systems. Basic commands and utilities included in Ubuntu are outlined.
Linux kernel Architecture and PropertiesSaadi Rahman
This document discusses the key components and architecture of the Linux kernel. It begins by defining the kernel as the central module of an operating system that loads first and remains in memory, providing essential services. It then describes the major subsystems of Linux, including process management, memory management, virtual file systems, network stacks, and device drivers. It concludes that the modular design of the Linux kernel has supported its growth and success through independent and extensible development of these subsystems.
The document provides an overview of the Linux kernel architecture. It discusses that the kernel includes modules/subsystems that provide operating system functions and forms the core of the OS. It describes the kernel's user space and kernel space, with user processes running in user space and kernel processes running in kernel space. System calls are used to pass arguments between the spaces. The document also summarizes several key kernel functions, including the file system, process management, device drivers, memory management, and networking.
Kumar Setty gave a presentation on assessing UNIX security to IT and financial auditors. He discussed the objectives of educating auditors on UNIX risks and controls and how to conduct a risk assessment. The presentation covered UNIX history, advantages, and disadvantages. It provided an overview of how UNIX works and its file system. It also discussed common security risks like privileged accounts and files, and provided examples of assessing risks like examining root access, SUID/SGID permissions, and network security.
The document discusses the architecture of the Linux kernel. It describes the user space and kernel space components. In user space are the user applications, glibc library, and each process's virtual address space. In kernel space are the system call interface, architecture-independent kernel code, and architecture-dependent code. It then covers several kernel subsystems like process management, memory management, virtual file system, network stack, and device drivers.
The document discusses the four layer architecture of UNIX systems: hardware, kernel, shell, and utilities. The kernel is the core component that manages processes, memory allocation, I/O, and communication between hardware and processes. It runs in privileged kernel mode while user programs run in unprivileged user mode. The shell provides an interface for users to interact with the operating system and run commands. Common shell types are Bourne and C shells. Utilities are programs that perform tasks for users like copying files. Multiple shells can run simultaneously to serve different users while only one kernel runs.
The document provides an overview of the Ubuntu operating system. It discusses Ubuntu's history as a Debian-based Linux distribution first released in 2004. It covers Ubuntu's design principles including its use of the Linux kernel for process management, memory management, and file systems. It also addresses security topics like hacking threats and strategies for hardening Ubuntu systems. Basic commands and utilities included in Ubuntu are outlined.
Linux kernel Architecture and PropertiesSaadi Rahman
This document discusses the key components and architecture of the Linux kernel. It begins by defining the kernel as the central module of an operating system that loads first and remains in memory, providing essential services. It then describes the major subsystems of Linux, including process management, memory management, virtual file systems, network stacks, and device drivers. It concludes that the modular design of the Linux kernel has supported its growth and success through independent and extensible development of these subsystems.
The document provides an overview of the Linux kernel architecture. It discusses that the kernel includes modules/subsystems that provide operating system functions and forms the core of the OS. It describes the kernel's user space and kernel space, with user processes running in user space and kernel processes running in kernel space. System calls are used to pass arguments between the spaces. The document also summarizes several key kernel functions, including the file system, process management, device drivers, memory management, and networking.
Kumar Setty gave a presentation on assessing UNIX security to IT and financial auditors. He discussed the objectives of educating auditors on UNIX risks and controls and how to conduct a risk assessment. The presentation covered UNIX history, advantages, and disadvantages. It provided an overview of how UNIX works and its file system. It also discussed common security risks like privileged accounts and files, and provided examples of assessing risks like examining root access, SUID/SGID permissions, and network security.
The document discusses the architecture of the Linux kernel. It describes the user space and kernel space components. In user space are the user applications, glibc library, and each process's virtual address space. In kernel space are the system call interface, architecture-independent kernel code, and architecture-dependent code. It then covers several kernel subsystems like process management, memory management, virtual file system, network stack, and device drivers.
The document discusses the four layer architecture of UNIX systems: hardware, kernel, shell, and utilities. The kernel is the core component that manages processes, memory allocation, I/O, and communication between hardware and processes. It runs in privileged kernel mode while user programs run in unprivileged user mode. The shell provides an interface for users to interact with the operating system and run commands. Common shell types are Bourne and C shells. Utilities are programs that perform tasks for users like copying files. Multiple shells can run simultaneously to serve different users while only one kernel runs.
The document discusses the UNIX operating system. It defines UNIX as an interactive, reliable, multi-user operating system that optimizes hardware resources. Most bioinformatics software is written for UNIX. The document outlines the history and development of UNIX, its core components like the kernel and shell, common commands, and differences between UNIX variants like Linux, BSD, and SVR4.
The document discusses the Linux kernel architecture. The kernel manages resources and arbitrates access between users and applications. It includes functions like file systems, process management, device drivers, memory management, and networking. The kernel space runs kernel processes while the user space runs user applications, which interact with the kernel through system calls. The kernel presents a consistent view of data stored on devices using a virtual file system.
The document presents an overview of the software architecture of the Linux operating system. It discusses the need to study software architecture to support design decisions, enhance communication, and understand system abstractions. The Linux system structure contains five major subsystems: the process scheduler, memory manager, virtual file system, network interface, and interprocess communication. Each subsystem is inspected in more detail, including its functions, dependencies, and role within the overall Linux architecture. The presentation concludes by discussing future work refining the conceptual and concrete architecture models of Linux.
What is a Kernel? : Introduction And Architecturepec2013
An Assembly car that has all stuffs except exteriors.This assembly is responsible for the movement of car and various other functions but we cannot travel in it as it has no seats or exteriors.
This assembly is analogous to kernel. Without it operating system is nothing. More formally, we can also call kernel a type of micro OS that handles all the very important functions.
While the main OS contains various other functions and kernel in the same way the car has shafts and tyres for rotations.
This document provides an overview of the Linux architecture. It describes Linux as a free UNIX-like kernel that forms the GNU/Linux operating system together with the GNU project software. The kernel acts as an intermediary between hardware and software, managing processes, scheduling, and resources. Processes can be in different states like running, waiting, or sleeping. The kernel uses preemptive multitasking to switch between processes and prioritize interrupts. System calls allow processes to be created and managed.
The document discusses the history and characteristics of UNIX operating systems. It describes how UNIX was developed in the 1960s and has since evolved into many different versions. Some key aspects of UNIX include its multi-user and multi-tasking capabilities, large number of free and commercial applications, and importance in internet development. The document also covers UNIX system calls, memory management, process management, and file systems.
This seminar presentation provides an overview of UNIX, including its history, structure, commands, file structure, applications, and advantages/disadvantages. Specifically, it discusses how UNIX was developed in the 1960s and is now widely used. It describes UNIX's multi-user and multitasking capabilities, hierarchical file structure, and shell interface. Finally, it notes applications of UNIX across industries and its advantages like access control and portability, as well as potential disadvantages like software incompatibility.
This document provides an overview of the CSC 539 Operating Systems Structure and Design course. It discusses influential early operating systems like Atlas, CTSS, MULTICS, OS/360, UNIX, Alto and Mach. It then focuses on case studies of the Linux and Windows XP operating systems, describing their histories, design principles, process management, memory management, virtual memory, file systems and more.
The document discusses the architecture of the Linux operating system. It contains five main components: the kernel, system libraries, hardware layer, system utilities, and shell. The kernel is the core of the operating system that facilitates interactions between hardware and software. It connects applications to system hardware. The system libraries help applications access the kernel's features through system calls. System utilities provide specialized functions to users. The hardware layer refers to physical machine components like RAM and CPU. The shell acts as an interface between the kernel and user, running kernel functions and taking user commands.
This document provides an overview of UNIX memory management. It discusses the history of UNIX and how it evolved from earlier systems like Multics. It describes swapping as an early technique for virtual memory management in UNIX and how demand paging was later introduced. Key concepts discussed include page tables, page replacement algorithms like two-handed clock, and the kernel memory allocator.
The document provides an overview of the Linux architecture including:
1) It discusses the history of Linux from its origins as a free UNIX-like operating system developed by Linus Torvalds to the over 18 million lines of code it contains today.
2) It describes the key components of the Linux system architecture including the hardware layer, kernel, shell, and utilities. The kernel acts as the core of the OS and interacts with hardware to perform low-level services.
3) It outlines several important kernel functions including file system management, process management and scheduling, memory management, and device drivers which allow communication with I/O devices through device files.
The document discusses the architecture and internals of Unix operating systems. It describes the high-level architecture with the hardware at the bottom providing basic services, the operating system kernel interacting directly with hardware and providing common services to user programs, and user programs being isolated from hardware. It also discusses topics like multiprocessing, multi-core processors, operating system services like process management and scheduling, and the file subsystem as a key part of the Unix kernel architecture.
Unix and shell programming | Unix File System | Unix File Permission | BlocksLOKESH KUMAR
This document provides an introduction to the Unix operating system, including its history, components, features, and file system organization. It discusses the kernel and shell components, types of shells like Bourn shell and C shell, and features such as multi-user capability, multitasking, security, and portability. It also describes the Unix file system structure, types of files, directories, and permission blocks.
This document provides an overview of UNIX and shell programming. It discusses the features of UNIX including its multi-user and multi-tasking capabilities. It then briefly outlines the history of UNIX and describes the command structure and usage. The document explains how to use man pages and other commands like man -k and apropos for getting help. It also discusses how to troubleshoot terminal issues and provides keyboard shortcuts.
This document presents information about the UNIX operating system from a group consisting of 5 members. It provides a brief history of UNIX, noting it was developed in the 1970s at Bell Labs and was intended as a programmer's workbench. The document outlines some key advantages of UNIX, including its portability, multi-tasking abilities, and security features. It also mentions some disadvantages such as its less user-friendly command line interface. In conclusion, it notes UNIX now runs on almost every type of computer.
1. The document provides an overview of the history and development of UNIX/Linux operating systems. It originated from projects in the 1960s and was further developed by Ken Thompson, Dennis Ritchie and others.
2. UNIX became popular due to its modular design, use of a hierarchical file system, treating all system resources as files, and ability to combine simple programs together.
3. The basic architecture of UNIX involves application programs interacting with the kernel via system calls to perform tasks like process and memory management.
The document discusses several topics related to Linux file systems, users and permissions, and basic system administration. It describes the default EXT3 and improved EXT4 file systems, as well as other options like XFS, Reiser4, GFS, and BTRFS. It also outlines how to add and manage users and groups, set environment variables, and configure permissions for files using commands like chmod, chown, and chgrp. Finally, it mentions monitoring system resources, updating the system and kernel, configuring Samba for file sharing, and implementing network and physical security measures.
The document provides an introduction to Unix presented by Ananthi Murugesan. It covers:
1. The history and origins of Unix from its development at Bell Labs in the 1960s-1970s.
2. An overview of what Unix is, including its portability, multi-user capabilities, and hierarchical file structure.
3. Details about the core components of Unix including the kernel, shell, and file management system.
This document discusses the Unix operating system architecture including the boot process, shutdown process, process management, memory management, and networking. It describes how the boot program loads the kernel which then initializes hardware, sets up RAM tables for processes, and creates the init process. Key process management topics covered include process hierarchy, creation, states, and signaling.
The document discusses the UNIX operating system. It defines UNIX as an interactive, reliable, multi-user operating system that optimizes hardware resources. Most bioinformatics software is written for UNIX. The document outlines the history and development of UNIX, its core components like the kernel and shell, common commands, and differences between UNIX variants like Linux, BSD, and SVR4.
The document discusses the Linux kernel architecture. The kernel manages resources and arbitrates access between users and applications. It includes functions like file systems, process management, device drivers, memory management, and networking. The kernel space runs kernel processes while the user space runs user applications, which interact with the kernel through system calls. The kernel presents a consistent view of data stored on devices using a virtual file system.
The document presents an overview of the software architecture of the Linux operating system. It discusses the need to study software architecture to support design decisions, enhance communication, and understand system abstractions. The Linux system structure contains five major subsystems: the process scheduler, memory manager, virtual file system, network interface, and interprocess communication. Each subsystem is inspected in more detail, including its functions, dependencies, and role within the overall Linux architecture. The presentation concludes by discussing future work refining the conceptual and concrete architecture models of Linux.
What is a Kernel? : Introduction And Architecturepec2013
An Assembly car that has all stuffs except exteriors.This assembly is responsible for the movement of car and various other functions but we cannot travel in it as it has no seats or exteriors.
This assembly is analogous to kernel. Without it operating system is nothing. More formally, we can also call kernel a type of micro OS that handles all the very important functions.
While the main OS contains various other functions and kernel in the same way the car has shafts and tyres for rotations.
This document provides an overview of the Linux architecture. It describes Linux as a free UNIX-like kernel that forms the GNU/Linux operating system together with the GNU project software. The kernel acts as an intermediary between hardware and software, managing processes, scheduling, and resources. Processes can be in different states like running, waiting, or sleeping. The kernel uses preemptive multitasking to switch between processes and prioritize interrupts. System calls allow processes to be created and managed.
The document discusses the history and characteristics of UNIX operating systems. It describes how UNIX was developed in the 1960s and has since evolved into many different versions. Some key aspects of UNIX include its multi-user and multi-tasking capabilities, large number of free and commercial applications, and importance in internet development. The document also covers UNIX system calls, memory management, process management, and file systems.
This seminar presentation provides an overview of UNIX, including its history, structure, commands, file structure, applications, and advantages/disadvantages. Specifically, it discusses how UNIX was developed in the 1960s and is now widely used. It describes UNIX's multi-user and multitasking capabilities, hierarchical file structure, and shell interface. Finally, it notes applications of UNIX across industries and its advantages like access control and portability, as well as potential disadvantages like software incompatibility.
This document provides an overview of the CSC 539 Operating Systems Structure and Design course. It discusses influential early operating systems like Atlas, CTSS, MULTICS, OS/360, UNIX, Alto and Mach. It then focuses on case studies of the Linux and Windows XP operating systems, describing their histories, design principles, process management, memory management, virtual memory, file systems and more.
The document discusses the architecture of the Linux operating system. It contains five main components: the kernel, system libraries, hardware layer, system utilities, and shell. The kernel is the core of the operating system that facilitates interactions between hardware and software. It connects applications to system hardware. The system libraries help applications access the kernel's features through system calls. System utilities provide specialized functions to users. The hardware layer refers to physical machine components like RAM and CPU. The shell acts as an interface between the kernel and user, running kernel functions and taking user commands.
This document provides an overview of UNIX memory management. It discusses the history of UNIX and how it evolved from earlier systems like Multics. It describes swapping as an early technique for virtual memory management in UNIX and how demand paging was later introduced. Key concepts discussed include page tables, page replacement algorithms like two-handed clock, and the kernel memory allocator.
The document provides an overview of the Linux architecture including:
1) It discusses the history of Linux from its origins as a free UNIX-like operating system developed by Linus Torvalds to the over 18 million lines of code it contains today.
2) It describes the key components of the Linux system architecture including the hardware layer, kernel, shell, and utilities. The kernel acts as the core of the OS and interacts with hardware to perform low-level services.
3) It outlines several important kernel functions including file system management, process management and scheduling, memory management, and device drivers which allow communication with I/O devices through device files.
The document discusses the architecture and internals of Unix operating systems. It describes the high-level architecture with the hardware at the bottom providing basic services, the operating system kernel interacting directly with hardware and providing common services to user programs, and user programs being isolated from hardware. It also discusses topics like multiprocessing, multi-core processors, operating system services like process management and scheduling, and the file subsystem as a key part of the Unix kernel architecture.
Unix and shell programming | Unix File System | Unix File Permission | BlocksLOKESH KUMAR
This document provides an introduction to the Unix operating system, including its history, components, features, and file system organization. It discusses the kernel and shell components, types of shells like Bourn shell and C shell, and features such as multi-user capability, multitasking, security, and portability. It also describes the Unix file system structure, types of files, directories, and permission blocks.
This document provides an overview of UNIX and shell programming. It discusses the features of UNIX including its multi-user and multi-tasking capabilities. It then briefly outlines the history of UNIX and describes the command structure and usage. The document explains how to use man pages and other commands like man -k and apropos for getting help. It also discusses how to troubleshoot terminal issues and provides keyboard shortcuts.
This document presents information about the UNIX operating system from a group consisting of 5 members. It provides a brief history of UNIX, noting it was developed in the 1970s at Bell Labs and was intended as a programmer's workbench. The document outlines some key advantages of UNIX, including its portability, multi-tasking abilities, and security features. It also mentions some disadvantages such as its less user-friendly command line interface. In conclusion, it notes UNIX now runs on almost every type of computer.
1. The document provides an overview of the history and development of UNIX/Linux operating systems. It originated from projects in the 1960s and was further developed by Ken Thompson, Dennis Ritchie and others.
2. UNIX became popular due to its modular design, use of a hierarchical file system, treating all system resources as files, and ability to combine simple programs together.
3. The basic architecture of UNIX involves application programs interacting with the kernel via system calls to perform tasks like process and memory management.
The document discusses several topics related to Linux file systems, users and permissions, and basic system administration. It describes the default EXT3 and improved EXT4 file systems, as well as other options like XFS, Reiser4, GFS, and BTRFS. It also outlines how to add and manage users and groups, set environment variables, and configure permissions for files using commands like chmod, chown, and chgrp. Finally, it mentions monitoring system resources, updating the system and kernel, configuring Samba for file sharing, and implementing network and physical security measures.
The document provides an introduction to Unix presented by Ananthi Murugesan. It covers:
1. The history and origins of Unix from its development at Bell Labs in the 1960s-1970s.
2. An overview of what Unix is, including its portability, multi-user capabilities, and hierarchical file structure.
3. Details about the core components of Unix including the kernel, shell, and file management system.
This document discusses the Unix operating system architecture including the boot process, shutdown process, process management, memory management, and networking. It describes how the boot program loads the kernel which then initializes hardware, sets up RAM tables for processes, and creates the init process. Key process management topics covered include process hierarchy, creation, states, and signaling.
Volkswagen offers Apple CarPlay, Google Android Auto as standardRushLane
Belmont, Calif. —Volkswagen of America, Inc. announced the introduction of its all-new MIB II infotainment system, available later this year on most model year 2016 Volkswagen products. The all-new infotainment system not only creates the foundation for the next generation of Volkswagen’s Car-Net connected vehicle services platform, but also offers one of the most comprehensive suites of connected vehicle services and features available in the automotive industry today. The new technology will provide consumers access to information, right at their fingertips, available across nearly the entire Volkswagen range. The first 2016 models featuring the new infotainment system will start landing in dealer showrooms late July 2015.
Tiga kalimat ringkasan dokumen tersebut adalah:
1. Dokumen tersebut menjelaskan pengertian protokol dan asal-usulnya dari bahasa Yunani. 2. Ia juga menjelaskan berbagai konteks penggunaan protokol dalam kehidupan individu, keluarga, masyarakat, dan hubungan antarnegara. 3. Dokumen tersebut menekankan pentingnya pengetahuan dan penerapan protokol untuk menjaga hubungan
Norman Besigye Kakuru is an Ugandan man who is currently studying for a Bachelor of Science in Information Technology at Ndejje University. He has experience working as an intern with the MUST Harvard Research collaboration on the IeDEA project, where he performed data collection, entry, analysis, and assisted with database and software installation. Besigye is proficient in English, Runyankole, and Rukiga speaking, writing, and reading. He lists his skills as Microsoft Word, Excel, statistical data analysis, communication, and information systems management.
Rajesh Builders has launched yet another Project in Mumbai. Raj Grandeur is located in Behind Hiranandani Hospital, Powai, Mumbai, Maharashtra, INDIA. Project has various modern amenities like Garden, Swimming Pool, Play Area, 24Hr Backup, Security, Intercom, Club House, Gymnasium, Indoor Games etc.
Sachin Chauhan is seeking a challenging position in a progressive organization where he can utilize his skills to develop the organization. He has over 3 years of experience as a software engineer working on projects in C, C++, Unix shell scripting, SQL, and RHEL Linux. He is looking to apply his technical skills and experience with databases, operating systems, and programming languages to benefit a computer science organization.
White Genocide In South Africa - Here Are The Names1guestupington
This document lists the names, ages, dates, and locations of over 70,000 white South Africans who have been murdered since the end of apartheid in 1994. It alleges that there is an ongoing genocide of the white Afrikaner minority in South Africa being carried out by the black majority government, but that the world has remained blind to this issue. The extensive list of names provides details of farmers, families, tourists and others who have been killed across South Africa over the past few decades.
This document discusses the potential for tidal power generation in Egypt. It describes two main types of tidal power technologies - barrages that use potential energy from tidal height changes, and marine turbines that convert the kinetic energy of tidal currents. The power output from turbines depends on factors like water density, turbine diameter, and tidal velocity. The document analyzes the tidal resource potential in the Red Sea, Mediterranean Sea, and Nile River, finding that the Nile has the highest maximum tidal velocities and power output potential of the three locations. It also discusses Egypt's existing Aswan Dam hydroelectric project and growing energy demands. The conclusion is that tidal power could provide a new opportunity to generate clean electricity for Egypt.
Zimbabwe faces numerous challenges including a struggling economy, lack of food and fuel, high infant mortality rates, and a collapsed health and education system. The Portland-Mutare Sister City Association was formed in 1990 and has since raised funds to support various projects in Mutare, Zimbabwe like building a clinic, supplying schools, and providing medical care. They hope to continue developing cultural and economic ties between the two cities through student exchanges, fundraising events, and volunteer efforts.
Видео доклада https://youtu.be/1QtPtvi72SI
Человеческий мозг устроен сложно. Если с ним что-то не так, то для диагностики используют магнитно-резонансный томограф.
Большие одностраничные приложения тоже устроены сложно. Чтобы их починить или обвесить новым функционалом, требуется вникнуть в их устройство. Для этого нередко приходится засучивать рукава и с головой погружаться в самую глубь проекта. И немалая часть проблем связана именно с бизнес логикой и потоками данных. Но что если у нас будет возможность проникнуть в структуру данных, способ увидеть связи между ними и отслеживать то, как они влияют друг на друга? Такой способ, чтобы не требовалось вскрытия черепной коробки - все как с МРТ.
В докладе речь пойдет о собственных разработках в этой области.
Prezentare realizată de Dan Bălănescu cu ocazia INFO DAY INTERREG EUROPE, București, Centrul de Conferințe al INS, 30.06.2015.
Programul INTERREG EUROPE, derulat în perioada 2014-2020, urmărește îmbunătățirea punerii în aplicare a politicilor și programelor de dezvoltare regională, în principal a programelor din cadrul obiectivului privind investițiile pentru creștere economică și a locurilor de muncă și, dacă este cazul, a programelor din cadrul obiectivului Cooperare Teritoriala Europeana prin promovarea schimbului de experiență și a învățării de noi politici, în rândul actorilor de interes regional.
Interreg Europe este activ în 30 de țări: cele 28 de state membre ale Uniunii Europene, Elveția și Norvegia.
Autoritatea de Management a programului este Consiliul Regional Nord-Pas de Calais (Franţa).
Autoritatea Națională, din partea României, este Ministerul Dezvoltării Regionale și Administrației Publice, prin Direcția Generală Programe Europene: http://bit.ly/1A3kd9Y, http://www.interreg4c.eu/interreg-europe.
This document provides an overview and summary of the Ubuntu operating system. It discusses Ubuntu's history beginning with the creation of Linux by Linus Torvalds in 1991. It then covers key aspects of Ubuntu including its design principles, process and memory management, security features, networking capabilities, and graphical user interface. The document also provides examples of basic commands and important directories in Ubuntu. It concludes with recommendations for securing the boot loader to help harden the Ubuntu system.
This document provides an overview of the Ubuntu operating system. It discusses Ubuntu's history as a Debian-based Linux distribution first released in 2004. It also covers Ubuntu's key features, components, and principles such as its use of the Linux kernel, GNOME desktop environment, and Ext4 file system. The document discusses Ubuntu's security, processes, memory management, networking, and compares its robustness to other operating systems. It provides examples of basic Ubuntu commands and how to password protect the GRUB boot loader for added security.
Linux Operating System. UOG MARGHAZAR CampusSYEDASADALI38
The document provides information about Linux operating system components such as the kernel, file systems, input/output devices, and process management. It discusses the kernel and kernel modules, describing kernel modules as code that can be dynamically loaded and unloaded. It describes the major Linux file systems like ext2, ext3, and ext4. It also discusses input/output devices in Linux, differentiating between block and character devices. Finally, it touches on process management in Linux and similarities to the Unix process model using fork() and exec() calls.
The document provides an introduction to the Linux operating system, including:
- A brief history of UNIX and Linux, describing their origins in the 1960s-1990s.
- An overview of Linux distributions, kernels, features, and structure, explaining concepts like monolithic vs. microkernel designs.
- Descriptions of key Linux components like modules, eBPF, and the roles of processes, user mode, kernel mode, and context switches.
- Discussions of ongoing developments like extended BPF which allow more dynamic programmability of the Linux kernel.
Linux began in 1991 as a personal project by Finnish student Linus Torvalds to create a free operating system kernel. The Linux kernel forms the core of the operating system, providing functions to run processes and access hardware resources. The Linux system consists of the kernel, system libraries that define standard functions for applications to interact with the kernel, and system utilities for maintaining operating system abstractions. The kernel uses both segmentation and paging for memory management, dividing a process's address space into segments with different protection modes and paging small regions of addresses to physical memory.
Linux and Java - Understanding and TroubleshootingJérôme Kehrli
Linux is an open-source operating system that powers many devices from supercomputers to smartphones. It uses a kernel developed by Linus Torvalds and combines with software from the GNU project to form a complete operating system. The Java Virtual Machine (JVM) allows Java programs to run on different platforms by executing Java bytecode. It uses just-in-time compilation to convert bytecode to native machine code. Both Linux and the JVM use memory management techniques like virtual memory and garbage collection to support multi-tasking of processes and applications.
The document discusses various topics related to open source software and the Linux operating system. It begins by defining open source software and listing some examples of open source programs. It then discusses the history and development of Linux, from its origins in 1991 to its current usage. The rest of the document covers Linux distributions, features, kernel functions, process management, input/output handling, memory management, and advantages of the Linux operating system.
Linux is a freely distributed, complete operating system designed for PCs that takes advantage of PC architecture to provide performance comparable to high-end UNIX workstations. It refers to the Linux kernel and combination of libraries and tools from the GNU project. There are over 300 Linux distributions available that are supported by major corporations for servers and desktops. Linux originally developed for Intel 80386 CPUs but now supports various architectures.
The document provides information on the history and features of the UNIX operating system. It discusses that UNIX was first created in 1969 at Bell Labs and made commercially available in 1977. It then describes several key features of UNIX including being multi-tasking, multi-user, having a hierarchical file system, shell interface, and being portable across different hardware. The document also discusses the UNIX kernel and system architecture, including the kernel interacting with hardware and managing tasks like memory, files, and processes. It provides information on different UNIX shells like the Bourne shell, C shell, and Korn shell.
The document provides an overview of operating systems and UNIX/Linux specifically. It discusses how operating systems manage resources and tasks. It then covers the history and development of UNIX, its multi-user and multi-tasking capabilities, and common flavors including Linux. The rest of the document details key aspects of UNIX including processes and process management, memory management, file management, and starting processes.
The document provides an overview of the UNIX operating system. It discusses the components of a computer system including hardware, operating system, utilities, and application programs. It then defines the operating system as a program that acts as an interface between the user and computer hardware. The document outlines the goals of an operating system and provides a brief history of the development of UNIX from Multics. It also describes some key concepts of UNIX including the kernel, shell, files, directories, and multi-user capabilities.
Linux is a widely used open source operating system kernel that can also refer to full operating system distributions. It is commonly used in embedded systems due to its portability, modularity, and ability to run on hardware with limited resources. Device drivers can be dynamically loaded and unloaded from the Linux kernel as modules, allowing new functionality to be added without rebooting the system. This makes Linux well-suited for embedded device development.
This document provides an overview of walking around the Linux kernel. It begins with a brief history of Linux starting with Richard Stallman founding GNU in 1984. It then discusses why an operating system is needed and what a kernel is. The document outlines the basic facilities a kernel provides including process management, memory management, and device management. It describes different kernel design approaches such as monolithic kernels, microkernels, and hybrid kernels. Finally, it provides some tips for hacking the Linux kernel such as installing development packages, configuring and compiling the kernel, checking hardware, and loading modules.
The document discusses the history and advantages of Linux compared to other operating systems like Windows, DOS and UNIX. It explains how the GNU project was started to develop a free and open source UNIX-like operating system. It then describes how Linus Torvalds developed the initial Linux kernel in 1991 building on the work of the GNU project. It highlights some key advantages of Linux like high security, many available tools and the flexibility of the environment. It also provides a brief overview of some common Linux components like the kernel, shells, KDE/GNOME desktop environments and the directory structure.
This document provides an overview of Unix fundamentals, including computer hardware components, storage terminology, processing power terminology, what an operating system is, the difference between single-user and multi-user systems, multitasking and timesharing in Unix, components of Unix like the kernel and shell, the history and versions of Unix including Linux, how to log in and out of Unix, the Unix interface, Xwindows, common windows managers, the Unix bootup sequence, an overview of the Unix file system structure including inodes and data blocks, how permissions are checked, the process of reading and writing files, how the open system call works to retrieve an inode, and the structure and contents of directories.
The document summarizes the architecture of the Linux operating system. It discusses the main components of Linux including the kernel, process management, memory management, file systems, device drivers, network stack, and architecture-dependent code. The kernel is at the core and acts as a resource manager. It uses a monolithic design. Process and memory management are handled via data structures like task_struct and buddy allocation. Virtual memory is implemented using page tables. File systems organize files in a hierarchy with inodes. Device drivers interface with hardware. The network stack follows a layered model. Architecture code is separated by subdirectory.
Linux is well-suited for forensic investigations due to its free and open-source tools, flexible environment, and ability to access low-level interfaces. However, its tools are more complicated to use than commercial packages and typically lack technical support. Linux distributions use a directory tree with essential directories like /bin, /etc, /home, and /var. Important commands provide information on processes, network connections, and disk usage. The Linux boot process involves the BIOS, boot loader, kernel initialization, and starting of processes at designated run levels.
The document discusses the history and components of the Linux operating system. It began as a free alternative to expensive Unix systems and was started by Linus Torvalds in 1991. The core components include the kernel, system libraries, system utilities, shell, and user interface. It also covers key topics like processes, memory management, input/output, security, file systems, and merits and demerits of Linux.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
Navigating the world of forex trading can be challenging, especially for beginners. To help you make an informed decision, we have comprehensively compared the best forex brokers in India for 2024. This article, reviewed by Top Forex Brokers Review, will cover featured award winners, the best forex brokers, featured offers, the best copy trading platforms, the best forex brokers for beginners, the best MetaTrader brokers, and recently updated reviews. We will focus on FP Markets, Black Bull, EightCap, IC Markets, and Octa.
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This PowerPoint compilation offers a comprehensive overview of 20 leading innovation management frameworks and methodologies, selected for their broad applicability across various industries and organizational contexts. These frameworks are valuable resources for a wide range of users, including business professionals, educators, and consultants.
Each framework is presented with visually engaging diagrams and templates, ensuring the content is both informative and appealing. While this compilation is thorough, please note that the slides are intended as supplementary resources and may not be sufficient for standalone instructional purposes.
This compilation is ideal for anyone looking to enhance their understanding of innovation management and drive meaningful change within their organization. Whether you aim to improve product development processes, enhance customer experiences, or drive digital transformation, these frameworks offer valuable insights and tools to help you achieve your goals.
INCLUDED FRAMEWORKS/MODELS:
1. Stanford’s Design Thinking
2. IDEO’s Human-Centered Design
3. Strategyzer’s Business Model Innovation
4. Lean Startup Methodology
5. Agile Innovation Framework
6. Doblin’s Ten Types of Innovation
7. McKinsey’s Three Horizons of Growth
8. Customer Journey Map
9. Christensen’s Disruptive Innovation Theory
10. Blue Ocean Strategy
11. Strategyn’s Jobs-To-Be-Done (JTBD) Framework with Job Map
12. Design Sprint Framework
13. The Double Diamond
14. Lean Six Sigma DMAIC
15. TRIZ Problem-Solving Framework
16. Edward de Bono’s Six Thinking Hats
17. Stage-Gate Model
18. Toyota’s Six Steps of Kaizen
19. Microsoft’s Digital Transformation Framework
20. Design for Six Sigma (DFSS)
To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
How to Implement a Real Estate CRM SoftwareSalesTown
To implement a CRM for real estate, set clear goals, choose a CRM with key real estate features, and customize it to your needs. Migrate your data, train your team, and use automation to save time. Monitor performance, ensure data security, and use the CRM to enhance marketing. Regularly check its effectiveness to improve your business.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
1. UBUNTU
A Project Presented to the Faculty of the
College of Information Technology and Computer Science
University of the Cordilleras
In Partial Fulfillment
of the Requirements for the Degree
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
By
JACQUILINE TABELIN COLLINS
JONAH MAE BELENO REPUBLICA
July 29, 2015
History: As mentioned previously, Ubuntu is one of a number of
Linux distributions. The source code that makes up the Ubuntu
2. Linux distribution originates from another, much older Linux
distribution known as Debian (so called because it was started
by two people named Debra and Ian). Debian is still a widely
respected operating system but came under criticism for
infrequent updates and less than user friendly installation and
maintenance (though these areas have shown improvement
recently).
A South African internet mogul (who made his fortune selling his
company to VeriSign for around $500 million) decided it was time
for a more user friendly Linux. He took the Debian distribution
and worked to make it a more human friendly distribution which
he called Ubuntu. He subsequently formed a company called
Canonical Ltd to promote and provide support for Ubuntu Linux.
In addition Shuttleworth has formed and funded (to the tune of
$10 million) a foundation to guarantee the future of Ubuntu.
The rest, as they say, is history. Ubuntu has since gone from
strength to strength. Dell and other hardware vendors now ship
computers pre-loaded with Ubuntu Linux and Ubuntu usually tops
the chart atDistroWatch.com (a web site which tracks the
popularity of the various Linux distributions).
If you are new to Linux, or already use Linux and want to try a
different Linux distro it is unlikely you will find a better
option than Ubuntu Linux.
Transcript of "Ubuntu OS Presentation"
1. 1. Presentation on the Ubuntu Operating System Colorado
Technical University CS 340 – Operating Systems October
2010 Loren Karl Schwappach
2. 2. Overview Introduction Security History Hacking
Design Principles Networking Process Management
Robustness Memory Management Interface Process
Communication Basic Commands Deadlock Handling System
Hardening File System Summary
3. 3. IntroductionUbuntu 10.10• Secure, Super-fast, and great-
looking• Open source, free, & widely distributed• Suitable
for server and desktop use.• Includes > 1000 pieces of
software• Ubuntu One Personal Cloud• Linux kernel version
2.6 w/ Gnome 2.16Support for:• Intel x86 (IBM-compatible
PC)• AMD64 (Hammer)• PowerPC (iBook, Powerbook, G4,
G5)http://www.ubuntu.com/desktop/features
3. 4. 4. History• 1991, Linus Torvalds (a Finnish student) writes
a opensource small, self-contained kernel (Linux) for the
80386processor.• Version 0.01 - no network support, basic
VMsubsystem, support for Minix fs and limited device-
driversupport. [1]• 1994, Version 1.0 - networking (TCP/IP
protocols, newfile system, SCSI, floppy disks, CD-ROM
devices, soundcards, mice, keyboards, floating point
emulation, UNIX-style IPC and extended VM subsystem. [1]•
1996, Version 2.0 - PCI support, 80386 CPU virtual8086 mode
, memory management improvements, ISDN,internal kernel
threading, automatic module loading andmultiprocessor
support. [1]• 1999, Version 2.2 - firewalling, routing and
trafficmanagement, improved symmetric multiprocessor
(SMP)performance and (Acorn, Apple, and NT) disk support.
[1]http://en.wikipedia.org/wiki/Linux_kernel
5. 5. HistoryUbuntu - Debian GNU/Linux distribution.•
Originally released under name “no-name-yet.com.”• Ubuntu -
African word that means “humaneness.”• 2004, 1st publicly
released version
4.10http://en.wikipedia.org/wiki/List_of_Ubuntu_releasesVar
iants include :• Edubuntu (designed for school
environments)• Kubuntu (Uses KDE GUI environment)•
Mythbuntu (Home Theater TVs)• Ubuntu Studio (Professional
AV editing software)• Xubuntu (uses XFCE desktop
environment)• 2010, Latest version 10.10 Maverick Meerkat:•
Linux Kernel version 2.6.35Software:• OpenOffice, Firefox,
Empathy IM, Transmission (BTclient), Gimp, games, and
more.• Desktop version supports Intel x86 and AMD64
.http://www.ubuntu.com/desktop/why-use-ubuntu
6. 6. HistoryLinux kernel size as an indicator of complexity
7. 7. Design PrinciplesUbuntu’s Linux kernel (2.6):Multiuser,
multitasking system w/ complete set of UNIX-compatible
tools.Linux supports the Portable Operating System
Interface[for Unix] (POSIX) threading extensions (Pthreads
and asubset of the POSIX extensions for real time
processcontrol. [1]The Linux system three bodies of
code:Kernel – Maintains OS abstractions, virtual memory
andprocess management. [1]System Libraries – Standard set
of functions forapplications to interact with the kernel.
[1]System utilities – Programs that perform
individual,specialized management tasks. [1]
8. 8. Design PrinciplesKernel• Ability to load/unload sections
of code on demand.Three components to the module support :•
Module management (allows loading modules in mem)• Driver
registration (allows modules to tell kernel when newdrivers
are available)• Conflict-resolution.Driver Registration
tables include the following:• Device Drivers – Character
4. devices (printers, terminals,mice), block devices (disk
drives), and network interfacedevices. [1]• File Systems –
Anything that implements Linux’s virtual-file-system call
routines. [1]• Network protocols – IPX, firewall packet
filtering rules, etc.[1]• Binary format – specifies way for
recognizing/loading anexecutable file. [1]
9. 9. Process ManagementLinux process properties generally
fall into three groups:Process Identity consists of:Process
IDCredentials (associated UID/GIDs)Personality (modifies
semantics of sys calls (unique to Linux)).Process
environment (inherited from parent) is composed of:Argument
vector (lists command line arguments)Environment vector
(list of NAME=VALUE pairs).Process context (state of
program in time) includes:Scheduling context – Information
to suspend and restart theprocess. Includes: process
registers, floating point registers,scheduling priority,
and process’s kernel stack)Accounting – Information about
resource usageFile table – array of pointers to kernel file
structuresSignal-handler table – Asynchronous handling of
external events.Virtual memory context – describes content
of address space
10. 10. Process ManagementLinux kernel 2.6 Scheduling:• 2
Algorithms Used: Time Scheduling and Real Time• Uses FIFO &
round robin real time scheduling• Real Time Priorities are
from 1-100
11. 11. Memory ManagementLinux avoids segmentation and
separates physicalmemory into three zones:ZONE_DMA (lower
16MB of physical memory),ZONE_NORMAL (normally used 16-896
MB),ZONE_HIGHMEM (Not mapped into kernel addressspace >
896MB). [1]Page tables keep track of the physical pages of
memorythat are used by a process, and they map the
virtualpages to the physical pages.Linux kernel 2.6 uses
reverse page mapping
12. 12. Memory ManagementVirtual memory manager:•
Responsible for maintaining the address spacevisible to
each process.• Creates pages of virtual memory on demand
andmanages loading of pages to/from disk.• Views a process
address space as independentseparate regions and as
independent separate pages.• Reserves its own internal use,
architecturedependant region of virtual address space for
everyprocess.Paging system divided into two sections:•
Policy algorithm (decides which pages to write todisk and
when to write them)• Paging mechanism (carries out
transfers and pagesdata back into physical memory when
needed).
13. 13. Memory ManagementMMU (Memory Management Unit) –
allows softwareto reference physical memory by aliased
5. addresses(using pages and page tables)Zoned Buddy Allocator
– responsible for pageallocations. Manages list of physical
contiguous pagesand maps them to MMU page tables &
managesmemory zones.Slab Allocator – Allows flexible memory
sizes (Thanstandard 4kb page) by creating cache
objects.Kernel Threads – Recovery and management ofmemory
(kscand, kswaped, kupdated, bdflush)
14. 14. Memory Management High Level Overview of VM System
VM Page State Machine
15. 15. Process CommunicationSignals - Sent by other
processes or the kernel to a specific process to indicate
variousconditions.Pipes - Unnamed pipes set up by the shell
normally with the "|" character to routeoutput from one
program to the input of another.FIFOS - Named pipes
operating on the basis of first data in, first data
out.Message queues - Message queues are a mechanism set up
to allow one or moreprocesses to write messages that can be
read by one or more other processes.Semaphores - Counters
that are used to control access to shared resources.
Thesecounters are used as a locking mechanism to prevent
more than one process fromusing the resource at a
time.Shared memory - The mapping of a memory area to be
shared by multiple processes.
16. 16. Deadlock HandlingDeadlock - a condition where one
or more executing threads and one or more resources,such
that each thread is waiting for one of the resources, but
all the resources are alreadyheld. [1]In essence the
threads are all waiting for each other, but they will never
make anyprogress toward releasing the resources that they
already hold.Unlike some Operating Systems:“There is no
deadlock detection for applications or threads by the Linux
kernel”.Linux requires the use of semaphores (sleeping
locks), spin locks (a lock that can be heldby at most one
thread of execution), and the Big Kernel Lock (BKL) to
attempt deadlockprevention.
17. 17. Deadlock HandlingLinux kernel version 2.6 used by
Ubuntu 10.10 introduces:A new type of lock called a seq
lock (sequence lock).• Works by maintaining a sequence
counter..• Whenever the in question data is written to, a
lock is obtained and a sequencenumber is incremented.•
Prior to and after reading the data, the sequence number is
read. If the values arethe same, then a write did not begin
in the middle of the read.
18. 18. File SystemLinux 2.6 retains UNIX’s standard file-
system module.• Allows Linux files to be anything capable
of handling the input or output of astream of data.• Device
drivers, interprocess communication channels and network
6. connectionsall look like files on Linux.• The Linux kernel
hides the implementation details of any single file type
behind alayer of software called the virtual file system
(VFS). [1]The VFS defines four major types of objects:•
inode object – represents an individual file.• file object
– represents an open file.• superblock object – represents
the entire file system.• dentry object – represents an
individual directory entry.
19. 19. File SystemXFS was a file system:Developed by
Silicon Graphics and designed to handle files as large as a
million terabytes,in 32 bit Linux systems it can handle
files up to 16 terabytes.Ext4 is currently the default
choice of Ubuntu 10.10 and performs much better than
ext2,ext3, and XFS. A new file system btrfs is also
supported in Ubuntu version 10.10 but is notyet stable
[9]Ext4 (forth extended file system) - journaling (keeps
track of changes in a journal beforechanging in main file)
Linux file system that became stable in 2008.Ext4 :•
Supports volumes up to 1 Exabyte (1018) and files with
sizes up to 16 terabytes(16x1012). Uses extents (range of
contiguous physical blocks) to replace the traditionalblock
mapping used by ext2/3, performs pre-allocation of on-disk
space, delayedallocation (using an allocate-on-flush
technique), breaks the ext3 32,000 subdirectorylimit (now
64,000), performs journal check-summing (improved
reliability), faster filesystem checking, multi-block
allocation, and improved timestamps.
20. 20. File System
21. 21. SecurityThe Linux security module is closely tied
to UNIX security mechanisms.Security concerns can be
classified into two groups:Authentication (Ensuring that
only authorized individuals have access to files that
theyare authorized.)Access control (mechanism for
validating whether a user has the right to access
aparticular object and preventing unauthorized access as
necessary). [1]Historically Linux suffered from the same
security vulnerabilities (such as eight characterpasswords)
as UNIX. However, a newer security mechanism known as the
Pluggableauthentication Module (PAM) system based on shared
libraries is now available to Linuxusers. [1]
22. 22. SecurityEvery object in a UNIX system under user
and group access control has a single UID andGID associated
with it. User processes have a single UID but may have more
than oneGID.Linux performs access control by assigning
objects a protection mask that specifies whichaccess modes
(read, write, or execute) can be granted to the user. The
only exception isthe root UID which is granted automatic
7. access to any object in the system.Linux allows use of the
setuid command to run programs with different user
privledges(for example lpr has access to the print queue
even if the user does not).This can be useful but can also
pose security concerns for the operating system.
23. 23. HackingBrute-force (password guessing) attacks are
the most common form of attack on anyoperating system. In
Linux, the most common types of services that can be brute-
forceattacked are: [4]• Telnet• File Transfer Protocol
(FTP)• The “r” commands (rlogin, rsh, and so on)• Secure
Shell (ssh)• SNMP community names• Post Office Protocol
(POP) and Internet Message Access Protocol (IMAP)•
Hypertext Transport Protocol (HTTP/HTTPS)• Concurrent
Version System (CVS) and Subversion (SVN)
24. HackingHydra is one of the most popular and versatile
brute force utilities available. However pop.c and SNMP
brute are also popular and can be downloaded at the
following locations: [4]THC – Hydra
http://freeworld.thc.org/thc-hydra/pop.c
http://packetstormsecurity.org/groups/ADM/ADM-
pop.cSNMPbrute
http://packetstormsecurity.org/Crackers/snmpbrute-fixedup.c
25. Hacking According to Hacking Exposed 6: Network Secrets
& Solutions [4] there are some free ware tools that can
help prevent brute force attacks. For brevity I will not
list the download locations (use Google search). These
tools listed in the book follow: crack lib Password
composition tool password a replacement for the password
command. Secure Remote Password a new mechanism for
performing secure password based authentication and key
exchange over any type of network. Open SSH A
telnet/ftp/rsh/login communication replacement with
encryption and RSA authentication. pam_passwdqc PAM module
for password strength checking.pam_lockout PAM module for
account lockout.
26. NetworkingLinux supports the entire standard internet
protocolsused for most UNIX to UNIX communications as well
asmany of the protocols native to non-UNIX
operatingsystems.Internally, networking in the Linux kernel
isimplemented in three layers of software: The
socketinterface, protocol drivers, and network-device
drivers.The most important set of protocols in Linux is
theTCP/IP protocol suite containing (IP, UDP, TCP, and
ICMP)protocols.Linux also performs firewall management of
IP traffic.
27. Networking
8. 24. 28. RobustnessA comparison of operating system
robustness wascompleted for the 19th International
Symposium onSoftware Reliability Engineering by Shanghai
Jiao TongUniversity [8].They observe that Windows XP
achieves betterrobustness performance than Ubuntu in
theirexperiment.Ubuntu had higher restart and abort rates
thanWindows OSs in general robustness test.In particular,
the robustness of Ubuntu rose drasticallyfrom 85.70% to
97.24% in CINT (surpassing WindowsVista in this generic
compute intensive operationalprofile) and 97.37% in CFP.”
[8]
25. 29. Robustness
26. 30. InterfaceUbuntu 10.10 uses the GNU Network Object
ModelEnvironment (GNOME) graphical user interface. It
hasthe look and appeal of Windows Vista without many ofthe
problems.It also uses a command line interface.
27. 31. Basic Commands Some Important Directories Found in
UbuntuDirectory Description/bin Frequently used system
binaries/dev Special drivers for I/O devices/etc
Miscellaneous system administration parameters/lib
Frequently used libraries/tmp Temporary files once stored
here/usr Contains all user files in this part of the
tree/usr/include System-provided header files/usr/man On-
line manuals/usr/spool Spooling directories for printers,
e-mail, and other daemons
28. 32. Basic Commands Some Popular Utility Programs Found
in UbuntuCommand Descriptionawk A pattern matching
languagebasename Strip off prefixes or suffixes from a file
namecat Link file(s) and write them to standard outputcc
Compile a C programchmod Change protection mode for
file(s)comm. Print lines common to two sorted filescp Make
a copy of a filecut Make each column in a document into a
separate filedate Print the date and timediff Print all the
differences between two filesecho Print the arguments (used
mostly in shell scripts)find Find all the files meeting a
given conditiongrep Search file(s) for lines containing a
given patternhead Print the first few lines of file(s)kill
Send a signal to a processlp Print a file on a printerls
List files and directoriesmake Recompile those parts of a
large program that have changedmkdir Make a directorymv
Rename a file or move file(s)paste Combine multiple files
as columns in a single filepwd Print the working
directoryrm Remove file(s)rmdir Remove one or more
directorysed A stream (i.e., noninteractive) editorsty Set
terminal options such as the characters for line
editingsort Sort a file consisting of ASCII linestail Print
the last few lines of a filetr Translate character
9. codesuniq Delete consecutive identical lines in a filewc
Count characters, words, and lines in a file
29. 33. System HardeningMost Linux systems use two boot
loaders, the Linux Loader (LILO) or Grand Unified
BootLoader (GRUB). Ubuntu uses GRUB. The boot loader
controls your boot image anddetermines what kernel is
booted when the system is started or rebooted. [3] Both
boot loaders are insecure if a hacker has physical system
access andTurnbull recommends that users only keep the
current and previous versions of thekernel. Both boot
loaders can easily be secured with passwords. To accomplish
thisUbuntu’s GRUB do the following: *3+superman# grubgrub>
md5cryptPassword: ********Encrypted:
$1$2FXKzQ0$I6k7iy22wB27CrkzdVPe70grub> quitNow copy the
encrypted output and add the password to your grub.conf
configurationfile. You can also add the --md5 option prior
to the password in grub.conf to ensureinteraction with GRUB
can only occur when you type p and enter the required
password.
30. 34. System HardeningMost Linux systems use two boot
loaders, the Linux Loader (LILO) or Grand Unified
BootLoader (GRUB). Ubuntu uses GRUB. The boot loader
controls your boot image anddetermines what kernel is
booted when the system is started or rebooted. [3] Both
boot loaders are insecure if a hacker has physical system
access andTurnbull recommends that users only keep the
current and previous versions of thekernel. Both boot
loaders can easily be secured with passwords. To accomplish
thisUbuntu’s GRUB do the following: *3+superman# grubgrub>
md5cryptPassword: ********Encrypted:
$1$2FXKzQ0$I6k7iy22wB27CrkzdVPe70grub> quitNow copy the
encrypted output and add the password to your grub.conf
configurationfile. You can also add the --md5 option prior
to the password in grub.conf to ensureinteraction with GRUB
can only occur when you type p and enter the required
password.
31. 35. System HardeningThere are also several services
that may start at boot, of which many can pose as
securityrisks. Turnbull [3] recommends disabling the
following:anacron, apmd, atd, autofs, cups, gpm, irda
(unless used), isdn (unless used), kudzu, lpd,netfs, nfs,
nfslock, pcmcia, portmap, rawdevices, rhnsd, snmpd,
snmtptrap,winbind, xfs,ypbind.Delete the following user
accounts: adm, desktop, ftp, games, gdm, gnats, gopher,
identd, irc, list (if not usingmailman), lp & lpd (if no
printing) mailnull (if no Sendmail), news, nfsnobody,
nscd,operator, postgres (if no Postgres), proxy, rpc,
10. rpcuser, sync, telnetd, uucp, www-data (ifnot Web
server).Delete the following group accounts: lp, news,
uucp, proxy, postgres, www-data, backup, operator, list,
irc, src, gnats,staff, games, users, telnetd, gdm, telnetd,
gopher, ftp, nscd, rpc, rpcuser, nfsnobody, xfs,desktop
32. 36. SummaryThis briefing looked into the history and
features of the Ubuntu Operating system as wellas exploring
the mechanics that make the Ubuntu operating system
unique.This briefing further dug deep into:Design
principles (specifically the Kernel, System libraries, and
System utilities)Process management (process context
includes: scheduling context, accounting, filetable,
signal-handler table, and virtual memory context)Memory
management (physical memory zones, allocation of memory
using pages, andmemory mapped to the address space)Process
communication (signaling, use of semaphores, piping, and
shared-memory)Deadlock handling (no detection for
applications or threads by the Linux kernel, useslocks for
prevention)File system (VFS, inodes, file objects,
superblocks, dentry objects, extfs, and ext4)Security
(authentication and access control)Networking (socket
interface, protocol drivers, and network-device
drivers)Program interface (Gnome GUI, and applications)And
more.. (Hardening, Robustness, Common Commands, etc..)
33. 37. Questions?
34. 38. References1. Silberschatz A., Galvin P., Gagne G.
(2009). Operating System Concepts (pp. 801-843). 8th
edition. Hoboken, NJ. John Wiley & Sons.2. Michael S.,
(2001). The Linux Codebook: Tips and Techniques for
Everyday Use. San Francisco. No Starch Press, Inc.3.
Turnbull J., (2005). Hardening Linux. New York, NY.
Springer-Verlag New York, Inc.4. McClure S., Scambray J.,
Kurtz G., (2009). Hacking Exposed 6: Network Security
Secrets & Solutions (pp. 223-315). New York, NY. McGraw
Hill.5. Saur K., Grizzard J., Locating x86 Paging
Structures In Memory Images. “Digital Investigation” Volume
7 (2010): pages 29-30. SciDirect Database. Accessed 7 Dec
2010.6. Lien Y., 4: Operating Systems. Academic Press
(2005): pages 355-366. SciDirect Database. Accessed 8 Dec
2010.7. Narayan S., Shang P., Fan N., Performance
Evaluation of IPv4 and IPv6 on Windows Vista and Linux
Ubuntu. (2009) International Conference on Networks
Security, Wireless Communications and Trusted Computing.
IEEE Database. Accessed 9 Dec 2010.8. Ju X., Zou H.,
Operating System Robustness Forcast and Selection. 19th
International Symposium on Software Reliability
Engineering. IEEE Database (2008). Accessed 10 Dec 2010.9.
11. Tozzi C., 2010, Ubuntu 10.10’s New File System. The Var Guy
Retrieved 10 Dec 2010 from the website:
http://www.thevarguy.com/2010/08/02/ubuntu-10-10s-new-file-
system-btrfs/