Free Essay

Linux Research Assignment 1

In:

Submitted By mbobrowski77
Words 353
Pages 2
1. What is the meaning of the acronym LAMP, and how is it used for creating dynamic websites?
A: Lamp stands for “Linux, Apache, MySQL and PHP.” Together these software technologies can be used to form a fully-functional web server. Linux is the most popular operating system used in web servers. The most important of these four technologies is Apache, Apache is the software that serves webpages over the Internet via the HTTP protocol. Once Apache is installed, a standard Linux machine is transformed into a web server that can host live websites. Other components of LAMP include MySQL and PHP. MySQL is a popular open source database management system (DBMS) and PHP is a popular web scripting language. Together, these two products are used to create dynamic websites. Instead of only serving static HTML pages, a LAMP server can generate dynamic webpages that run PHP code and load data from a MySQL database. 2. For Internet websites which are located throughout the entire world, what is the estimated market share for dynamic websites which use LAMP as opposed to Microsoft IIS and the Microsoft Active Server Page scripting language?
A: As of today, LAMP (Apache) = 56.4% and Microsoft IIS = 12.9% and I cannot find the percentages for the Microsoft Active Server Page. 3. What is PHP?
A: PHP is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. 4. What is the JAVA Server Page and how may it be used for creating dynamic websites?
A: Java Server Pages (JSP) is a technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types. JSP is similar to PHP, but it uses the Java programming language. 5. For Internet websites which are located throughout the entire world, what is the estimated market share for dynamic websites which use JAVA as opposed to PHP or Microsoft ASP scripting languages or techniques?
A: As of September 27, 2015 – JAVA market share = 3.0%, Microsoft ASP = 16.5% and PHP = 81.4%.

Similar Documents

Free Essay

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses...

Words: 423 - Pages: 2

Free Essay

Qasws

...IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes You will learn general process for examining and recovering data from a hard disk. You will create a data recovery plan for future use. You will learn how to write a procedure for recovering a password from a computer system. Assignment Requirements You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords. Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance. Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment. Submission Requirements Format: Microsoft Word...

Words: 3649 - Pages: 15

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Free Essay

Greg Kroah-Hartman

...up being used by his parents for different volunteer tasks they were involved in at the time (Rf.1). He has resided in Portland, Oregon for more than ten years with his beautiful wife and two children, and currently works for Novell in the SUSE Labs division as a full time employee on the Linux Driver Project. He is considered to be an authority and “rock star” in his field, and is the co-author of "Linux Device Drivers, 3rd Edition" and sole author of the book entitled, "Linux Kernel in a Nutshell" (Rf.2). He used to be a contributing editor for Linux Journal, and began building the Linux kernel in 1996, and wrote the programs for the Linux kernel drivers in 1999. He is the current maintainer of the USB, PCI, driver core and sysfs subsystems in the kernel source tree, the staging subsystem, USB, driver core, debugfs, kref, kobject, and the sysfs kernel subsystems. Another one of his co-responsibilities is maintaining the Linux kernel for the -stable branch with his colleague, Chris Wright (Rf.3). He is also the maintainer of the linux-hotplug , and created and maintains the Linux Device Driver Kit. He also contributes articles to LWN.net, the news computing site, and in 2006, he released a CD image of material to introduce a programmer to working on Linux device driver development. References 1. Bhartya, Swapni, “A Quick Q `n’ A Session with Greg Kroah-Hartman, Linux (For You), http://www.linuxforu.com/interviews/a-quick-qna-session-with-greg-kroah-hartman. 2....

Words: 435 - Pages: 2

Free Essay

Linux

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 1010 - Pages: 5

Free Essay

Nt 1210

...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5 Analyze...

Words: 799 - Pages: 4

Free Essay

Linux Report

...Running Head: Research Assignment | Research Assignment | Linux Admin Class | | In 2006 Microsoft posted a high level summary of 235 patents that were allegedly violated by Free and Open Source Software (FOSS). These complaints included 42 violations from the Linux Kernel, 65 from the Linux GUI, 45 from the FOSS Open Source Suite, and 15 dealing with FOSS email programs (Microsoft's Smith and Gutierrez, 2007). Since this issue in 2006, FOSS has prospered beyond belief. Not only has FOSS survived, but it has grown enormously. Also in 2006, Microsoft signed a deal with Novell, agreeing that neither would sue the other (Upfold, 2006). Instead of fighting the FOSS business model Microsoft chose to instead join them with Novell's SuSE Linux model. Novell and Microsoft worked together in an attempt to collaborate with both open and closed source software. Their main competitor was Red Hat, who also was working on their own Linux system. Even more recently, Novell sold 882 patents to CPTN Holdings LLC in 2011. Upon the transaction, CPTN would dissolve itself. The patents were split up and purchased by Apple (25%), EMC (25%), Oracle (25%), and Novell's parent company Attachmate (25%). Another agreement of the deal allowed all companies involved to be free of any suits stemming from all 882 patents (Fosspatents blog, 2011). Microsoft was not negatively affected by the deal as they would essentially co-own the 25% share of patents Attachmate would recieve, as their...

Words: 448 - Pages: 2

Free Essay

Linux

...website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1),...

Words: 1560 - Pages: 7

Free Essay

Asssignment 1;1

...Assignment 1.1 Below is a free essay on "Itt Tech It250 Unit 1" from Anti Essays, your source for free research papers, essays, and term paper examples. 1. What did Richard Stallman mean when he stated that GNU was a free operating system? What Richard Stallman meant by stating that GNU was a free operating system is that it was a free software that users had the freedom to distribute and change the product. 2. Describe the relationship between Linux and the GNU Project. The way that Linux and the GNU Project are related by them both being free software based. Also the GNU operating system today uses complete Linux binary compatibility. 3. List and describe in detail four advantages of Linux. The four advantages of Linux include: a) Affordability, Linux has open source software,meaning that there are no license fees. b) Portability, Linux is a generic operating system that can run on different types of operating systems from different companies. c) Security because it is logical based and everything is file based. d) Multiple users, it can run multiple tasks with many different users at the same time. 4. List three examples of different hardware platforms onto which Linux has been ported. Some examples of different hardware platforms that Linux was ported are Compaq's Alpha-based machines, MIPS-based machines, and Motorola's 68K- based machines. 5. What are the minimum system requirements for Fedora 15 with the GUI installed? The minimum system requirements...

Words: 364 - Pages: 2

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Operating System

...------------------------------------------------- BCN 2053 – OPERATING SYSTEMS – Assignment 1 ------------------------------------------------- Top of Form INSTRUCTIONS – Detail instructions is given below, please follow accordingly. This assignment carries a total of 10 marks. When we talk about operating systems, the most popular words are Windows and Linux. This assignment is all about exploring both types of operating systems. Each group require to: 1. Draw and explain in brief the evolution of both operating systems from the beginning up to today. Explanations may include : a. Year of release b. Version release c. Features 2. Compare between this two very popular Operating Systems, Windows VS Linux in terms of : a. Memory management 1. Focus on how both operating systems handle their memory management especially on virtual memory. To support your research, you may include relevant scenario of how memory being access. 2. Explain any limitation of maximum or minimum memory required by each operating systems especially on 64bit or 32bit architecture 3. Compare and recommend which operating systems utilize its memory more efficient in terms of: i. Normal usage (everyday usage by normal user) ii. Server usage (server environment) b. Process management 4. Focus on how both operating systems handle their process management when it comes to many processes request for CPU resources. You...

Words: 486 - Pages: 2

Free Essay

It302 Research Assignment 1

...Research Assignment 1 IT 302 Linux System Administration January 21, 2013 The purpose of this paper is to secure UNIX/Linux operating systems from unscrupulous people. It shall be focused on SELinux, chroot jail, and iptables. Each of the three focus areas will be detailed, with specific interest in the following. What organization is behind it and reason entity is involved. How each technology changes the operating system to enforce security, and if the security measure can be easily bypassed. And finally, describe the types of threats each of the technologies is designed to eliminate. Since no two UNIX-based operating system builds are exactly alike, it is important to note that each build may have its own inherent security flaws. SELinux was developed by The United States National Security Agency (NSA). The first version was made available to the open source development community under the GNU GPL on December 22, 2000. The software merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Network Associates, Red Hat, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. The reason NSA is involved in this project is because this organization is responsible for carrying out the research and advanced development of technologies...

Words: 900 - Pages: 4

Premium Essay

Nt 1210

...technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Doc Remove Delibitablement

...Modules | credits | Hours | Functional Analysis | 3,5 | 48 | Algebra for Engineers | 2,5 | 32 | Probability 1 | 3,5 | 48 | Statistical Decision (courses +Tuto) | 3,5 | 48 | Microprocessor System | 3 | 40 | Signal Transmission | 2,5 | 32 | Data Transmission | 2,5 | 32 | Workshop on Linux | 3 | 40 | Databases | 3 | 40 | TOEIC 1 | 2,5 | 32 | Advanced Maintenance | 2,5 | 32 | Numerical Analysis | 2,5 | 32 | Operations Research | 2,5 | 32 | Servo (Tuto) | 2,5 | 32 | Servo (Courses) | 2,5 | 32 | Algorithm (Data Structure) | 2,5 | 32 | Algorithm oriented object (Tuto, C++ Language) | 3 | 40 | Operating System (Theories and Fundamental) | 2,5 | 32 | WAN (courses + Tuto) | 4,5 | 60 | Method of Analysis 1 | 3 | 40 | Programming Workshop C | 2,5 | 32 | Software Engineering workshop (Access, VB) | 3 | 40 | Management Workshop for Science Engineer | 2 | 24 | Entrepreneurship | 1,5 | 20 |   |   |   | TOTAL | 63,5 | 832 | ------------------------------------------------- OBJECT ORIENTED ALGORITHM ------------------------------------------------- (Hands-On in Language C + +) CHAPTER I: GENERAL ON CLASS I. Notion of class • Generality of P.O.O • Incompatibility C / C + + II. Property of the member functions • Defaults • Member functions in-line • Transmission of object as argument III. Object assignment IV. Object Constructors and Destructors V. Object initialization VI. The copy constructor VII. Tables to Objects ...

Words: 2262 - Pages: 10

Free Essay

Linux System Administration

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. The three basic elements of the VServer are: The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses, to change the ownership of a file...

Words: 291 - Pages: 2