Premium Essay

Exploring Linux Operating Systems

In: Computers and Technology

Submitted By southpaw3o3
Words 1308
Pages 6
Exploring Linux Operating Systems

What is Linux? Linux is an Operating System for a computer; it is like other Operating Systems such as Windows and the OS X for MAC. Linux was created in 1991 and has been found on many different systems like Super Computers, cell phones, and even the New York stock exchange. What sets Linux apart from other Operating Systems is that Linux is made by several different companies. According to www.linux.com over 3,200 developers have from 200 companies have contributed to the kernel which is just a small piece of the distribution.
How is Linux used today? While other Operating Systems are very limited to personal computing devices, Linux is not limited it can be found on many different things. Linux had its start as a server Operating System but is also one of the only Operating System that can be found on more than just a personal computer. Some of the different things it can be found on taken from www.linux.com

“These are just the most recent examples of Linux-based devices available to consumers worldwide. This actual number of items that use Linux numbers in the thousands.” www.linux.com

File Editors Coming from a Windows Operating System pretty much my whole life, which means I only have experience with GUI editors such as Notepad from Windows. After working with Linux and its file editors this past week I found it much faster and easier than using the notepad system in Windows. There are two different kinds of editors graphical and non-graphical, however according to our text books VI is the most used editor among administrators.

VI: What separates VI from many other editors is that it is mode based. Mode based means you have to give certain commands in order for the editor to work properly. An example of that is when you hit I or insert it puts the editor into insert mode. When in insert modes you…...

Similar Documents

Premium Essay

Exploring Linux Operating Systems

...Exploring Linux Operating Systems Linux is a computer operating system that was created and released by Linux Torvalds in October 1991. Linux was designed and released as a free, open source piece of software. This means that the code that makes up the program is freely available for anyone to copy, study, and modify the code in any way. This design was chosen to encourage the public to voluntarily improve the design and add functionality to the base software. This open source design is anecdotally considered to be a good thing, but has some drawbacks due to splintering, and lack of version control. Due to some of the splintering there are dozens of versions of Linux, most with similar functionality, while there are others that are designed for specific user types and use cases. Each “version” is called a Distribution. There are dozens, if not hundreds of these “distro’s” floating about. One of the most popular distro’s for the entry level user is Canonical’s Ubuntu Linux. This is a Debian based system with a rather simple user interface, and comes standard with a GUI and a host of tools that would make the system useable, and sufficient for most average users. On the other side of the spectrum there are targeted distro’s like KALI whose audience is more on the professional side. This particular distro is pre-loaded with tools that only a professional or an enthusiast would find useful at all. With such a wide range of options, there should be something for......

Words: 1171 - Pages: 5

Free Essay

Exploring Linux Systems

...Running head: Linux Systems Exploring Linux Operating Systems Student College Exploring Linux Operating Systems Much like Windows OS and the OS X for the Mac, Linux is an operating system that was created by Linus Torvalds in 1991. Linux is traditionally a command line system as opposed to the GUI that many home computer users are more accustomed to. Linux uses a prompt where various commands and arguments are used to navigate the system and directories. One cannot point and click an icon in order to execute a program, in Linux the command line is like typing out the directions for your computer so it knows exactly where to look. Linux is being utilized in many different applications from business databases, cell phones, and even the New York stock exchange. Linux, however, is hardly considered a “personal computer” OS because of its limitations in personal computing. Although a Linux GUI desktop does exist, the command line interface is considered an advanced program and not for the faint of heart. Linux however holds many advantages in database software, server maintenance, code development and computer programming. The Linux “language” is close to coding language and the kernel is more secure than, say, the Windows Kernel. This advantage is encouraging to businesses and anyone else looking to keep or store sensitive data. Linux is a solid OS to use when handling such information when confidentiality is key. Like the other OS there are different means for file......

Words: 1397 - Pages: 6

Premium Essay

Operating System

...------------------------------------------------- BCN 2053 – OPERATING SYSTEMS – Assignment 1 ------------------------------------------------- Top of Form INSTRUCTIONS – Detail instructions is given below, please follow accordingly. This assignment carries a total of 10 marks. When we talk about operating systems, the most popular words are Windows and Linux. This assignment is all about exploring both types of operating systems. Each group require to: 1. Draw and explain in brief the evolution of both operating systems from the beginning up to today. Explanations may include : a. Year of release b. Version release c. Features 2. Compare between this two very popular Operating Systems, Windows VS Linux in terms of : a. Memory management 1. Focus on how both operating systems handle their memory management especially on virtual memory. To support your research, you may include relevant scenario of how memory being access. 2. Explain any limitation of maximum or minimum memory required by each operating systems especially on 64bit or 32bit architecture 3. Compare and recommend which operating systems utilize its memory more efficient in terms of: i. Normal usage (everyday usage by normal user) ii. Server usage (server environment) b. Process management 4. Focus on how both operating systems handle their process management when it comes to many processes request for CPU resources.......

Words: 486 - Pages: 2

Premium Essay

Nt1110 Module 1 Short Answer 1

...An operating system (OS) serves primarily as a translator between the user and the applications and hardware of the machine in use. In this case the PC, tablet or mobile phone. The OS allows the user to easily visualize commands that prompt the software to carry out an array of functions, limited only by the hardware capabilities and the knowledge of its user. During the beginning stages of personal computer (PC) usage, IBM finalized a deal in the early 1980's with the most common household PC OS developer name, Microsoft. It's MS-DOS, then a command line user interface served as the principal design for Microsoft's home PC users released post Apple's Mac OS just 1 year prior. This decision was made after an irreconcilable deal for the 1970's CP/M developed by Greg Kildall. As MS- DOS gained recognition, the onset of home PC user OSs emerged. This report will provide an introduction to the top OSs commonly used in households today such as Mac OS X, Linux, Windows and some of their variants. The functions of these OSs vary in performance across the span of it's developers, however, are relatively the same. These similarities begin with booting the device, providing a Graphical User Interface (GUI) that appeals and adds ease of utilization to the user, as well as the management of system resource, input/output (I/O) and data. All are necessary for a positive experience from even the most novice of users. The similarities of the OSs are what group their developers......

Words: 1305 - Pages: 6

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and......

Words: 3379 - Pages: 14

Premium Essay

Windows 7 Versus Windows Xp

...Windows 7 I’ve had the chance to work with most mainstream operating systems that today has to offer and after exploring all the options I feel most satisfied with what Windows 7 has to offer. Whether you’re new to Windows or just upgrading, the benefits of switching are endless, ranging from new features to performance improvements, even the basic appearance. Windows 7 has many advantages over other operating systems. There are different versions that range from business to casual. All have their perks and range to different prices. You can pin programs, and files to the task bar, similar to other operating systems, but hovering your mouse cursor over the file or program in your task bar allows you to get a preview of that program or file. Another feature introduced is Windows snap. It allows you to drag a file to either side of your screen and snap it into place, allowing file comparison, along with multitasking. On top of the many features making Windows 7 better than most operating systems, is the hardware and software compatibility. After a fresh install of Windows 7, you can run Windows update and get all the drivers needed to run the hardware inside your computer. You can also run older applications that didn’t have compatibility in Windows Vista, but did in Windows XP. Another great new feature of Windows 7 is the security gains after upgrading from vista. User account control in Windows Vista was a huge hassle, and Windows 7 builds on that to make it less......

Words: 592 - Pages: 3

Free Essay

How Successful Leaders Think

...looked to grow beyond its $1 million in annual sales, it could have chosen one of the 2 basic business models in the software industry. 1. classic proprietary-software model sold customers operating software but not the source code. These companies had wide profit margins because their customers, lacking access to the source code, were essentially locked into purchasing regular upgrades. 2. Free-software model: suppliers sold CD-ROMs with both the software and the source code.--> Prices were modest; and suppliers made money each time they assembled a new version from the many free updates by independent developers; but profit margins were narrow and revenue was uncertain. Bob Young didn’t like either of these models. (1st model: si compres el propi software I alguna cosa va malament, no pots fer res per arreglar-ho I 2nd: it might have offered reasonable returns in the short term but wasn’t likely to deliver sustained profitable growth). His response to Hat’s dilemma was to combine the free-software model’s low product price with the proprietary model’s profitable service component, in the process creating something new: a corporate market for the Linux operating system. Now, Red Hat’s service offering was quite different: if you ran into a bug that caused your systems to crash you’d call the manufacturer and then he’d send an engineer to fix his software. Young also made a crucial change to what had been the somewhat misleadingly dubbed free-software model:......

Words: 1812 - Pages: 8

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights......

Words: 38351 - Pages: 154

Free Essay

Programming Languauges

...Programming PT-104 | UNIT 1ASSIGNMENT | Research Popular Programming Languages | Associated with the Past Present and Future of Virtualization | | 9/30/2013 | Introduction to Programming 23 September 2013 Unit 1 Assignment 1 Exploring Programming Languages Platform virtualization vs. application virtualization Virtual machines (VMs), in their first incarnation, were created by IBM 60 years ago as a way to share large and expensive mainframe systems. And although the concept is still applied in current IBM systems, the popular concept of a VM has broadened and been applied to a number of areas outside of virtualization. Virtual machine origins The first operating system to support full virtualization for VMs was the Conversational Monitor System (CMS). CMS supported both full virtualization and paravirtualization. In the early 1970s, IBM introduced the VM family of systems, which ran multiple single-user operating systems on top of their VM Control Program—an early type-1 hypervisor. The area of virtualization that IBM popularized in the 1960s is known asplatform (or system) virtualization. In this form of virtualization, the underlying hardware platform is virtualized to share it with a number of different operating systems and users. Another application of the VM is to provide the property of machine independence. This form, called application (or process) virtualization, creates an abstracted environment (for an application), making it independent......

Words: 1974 - Pages: 8

Free Essay

Paper

...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work......

Words: 22047 - Pages: 89

Premium Essay

Leadership

...forthcoming from Harvard Business School Press in the fall of 2007. 62 Harvard Business Review 1179 Martin.indd 62 | June 2007 | successful leaders. To illustrate the concept, I’ll concentrate on an executive I talked with at length: Bob Young, the colorful cofounder and former CEO of Red Hat, the dominant distributor of Linux open-source software. The assumption underlying my examination of his and others’ integrative thinking is this: It isn’t just an ability you’re born with – it’s something you can hone. Opposable Thumb, Opposable Mind In the mid-1990s, Red Hat faced what seemed like two alternative paths to growth. At the time, the company sold packaged versions of Linux open-source software, mainly to computer geeks, periodically bundling together new versions that included the latest upgrades from countless independent developers. As Red Hat looked to grow beyond its $1 million in annual sales, it could have chosen one of the two basic business models in the software industry. One was the classic proprietary-software model, employed by big players such as Microsoft, Oracle, and SAP, which sold customers operating software but not the source code. These companies invested heavily in research and development, guarded their intellectual property jealously, charged high prices, and enjoyed wide profit margins because their customers, lacking access to the source code, were essentially locked into purchasing regular upgrades. The......

Words: 5153 - Pages: 21

Premium Essay

Computers and Languages

...computer is doing or need technology related advice. I have a friend like this. Admittedly, when he talks in “compuspeak”[1] I am a little bit clueless. Recently, this frequent ‘turning’ to my friend has got me a little dizzy. When concerning my studies and efficiency, computers and technology seem to occupy centre stage. I have therefore often wished that I was a bit more clued up, I guess this where Computers and Languages comes in! ( Yeah, you can do that on the computer too, and that, and that... As a Comparative Literature student, I considered myself more of the “creative” type, with an interest in literature/creative writing, art, film and the like. However I realise now that the computer can be used as a creative resource. In exploring possible career options, I came across many ‘creative’ roles which involved video editing, online researching, online reviewing, social networking, blogging and editing and maintaining websites. Whilst I know that this course won’t turn me into a complete “computer geek” It will help me develop the valuable skills I need to enter the ‘creative’ roles I am interested in. Spin your own web Today, creative writing, finds a space in blogging and e-magazines. Art comes in the form of Photoshop, photo editing & photo art. The post modern era defines the filmmaker as auteur and in the world of technology the e-teur’s are users with ‘channels’/videos on YouTube (the demand for videos on the web has also lead to new tag in HTML5). On......

Words: 1726 - Pages: 7

Free Essay

Ubuntu Touch Cost Benefit Analysis

...able to increase the functionality and gain features and support in regards on promoting literacy. With the Ubuntu Touch OS compatible phones, we would be able to focus our time on more crucial matters, such as exploring and implementing education material to more young minds. By utilizing better educational materials and resources, we will increase productivity and save more time when our Eduboost members begin promoting literacy. Increased productivity will ensure that we save more time and produce high quality education courses and retention rates, which will provide the citizens of Melandria with a tremendous source of empowerment, knowledge and transferable skills. The Ubuntu Touch’s specifications and system requirements were formed with remarkable ability considering the price as well as comparing Firefox OS’s cheap build. Without getting too technical too soon, I would like to mention that the Ubuntu Touch has an Intel Atom processing chip, at the minimum 1 GB or more internal memory and is capable of holding 32 GB of flash storage. That amount of storage allows for a decent processing speed, a responsive phone experience, and enough storage to hold educational material; which is exactly what our 170 members will need during their missions. One thing that Linux offers that is an underrated feature is constant OS support and updates. The Ubuntu Touch development team has recently patched an update that has significantly improved the battery life of the phone up to 50......

Words: 1079 - Pages: 5

Free Essay

Vivek

...Fundamentals of Computers & Information Technology Introduction to Operating Systems (Dos, Windows, Linux) PC Packages Elective - 1 Foxpro MS-Access 4 4 1 3 T P Theory Paper 80 80 Internal Evaluation 20 20 Practical Exams Total Marks 100 100 4 4 1 3 3 80 80 20 20 25 25 125 125 Semester Total 450 (*L-Lecture, T-Tutorial, P-Practical) SEMESTER –II Subject Code Subject Name Scheme L 2PGDCA1 2PGDCA2 2PGDCA3 2PGDCA4(A) 2PGDCA4(B) 2PGDCA5 System Analysis and Design Programming with Visual Basic.NET Internet & E-Commerce Elective - 2 OOPs & Programming with C++ Financial Accounting with Tally Project Work 4 4 4 4 T 1 P 3 3 3 Theory Paper 80 80 80 80 Internal Evaluation 20 20 20 20 Practical Exams Total Marks 100 125 100 125 25 1 25 4 100 Semester Total 550 General Instructions: 1. For passing the subject examination minimum 40% marks must be separately scored in Theory Paper, Practical Exams and Internal Evaluation in the subject. 2. For passing the semester, minimum aggregate marks must be 45% in the semester. Course : PGDCA Sub Code : 1PGDCA1 Semester: I Subject Name : Fundamentals of Computers & Information Technology Workshops Total Hours Field Visits Practical’s UNIT–I Brief History of Development of Computers, Computer System Concepts, Computer System Characteristics, Capabilities And Limitations, Types of Computers, Basic Components of A Computer System - Control Unit, ALU, Input/output Functions and......

Words: 4021 - Pages: 17

Free Essay

Hacking Tips

...several ways to get logged on as the superuser in the root account of some Internet host computers. But the instructions will leave a thing or two to the imagination. My theory is that if you are willing to wade through all this, you probably aren’t one of those cheap thrills hacker wannabes who would use this knowledge to do something destructive that would land you in jail. ***************************** Technical tip: If you wish to become a *serious* hacker, you’ll need Linux (a freeware variety of Unix) on your PC. One reason is that then you can crack into root legally all you want -- on your own computer. It sure beats struggling around on someone else’s computer only to discover that what you thought was root was a cleverly set trap and the sysadmin and FBI laugh at you all the way to jail. Linux can be installed on a PC with as little as a 386 CPU, only 2 Mb RAM and as little as 20 MB of hard disk. You will need to reformat your hard disk. While some people have successfully installed Linux without trashing their DOS/Windows stuff, don’t count on getting away with it. Backup, backup, backup! ***************************** ***************************** You can go to jail warning: Crack into root on someone else’s computer and the slammer becomes a definite possibility. Think about this: when you see a news story about some hacker getting busted, how often do you recognize the name? How often is the latest bust being done to someone famous, like Dark......

Words: 13749 - Pages: 55