Free Essay

Exploring Linux Systems

In: Computers and Technology

Submitted By Jerks21
Words 1397
Pages 6
Running head: Linux Systems

Exploring Linux Operating Systems
Student
College

Exploring Linux Operating Systems
Much like Windows OS and the OS X for the Mac, Linux is an operating system that was created by Linus Torvalds in 1991. Linux is traditionally a command line system as opposed to the GUI that many home computer users are more accustomed to. Linux uses a prompt where various commands and arguments are used to navigate the system and directories. One cannot point and click an icon in order to execute a program, in Linux the command line is like typing out the directions for your computer so it knows exactly where to look.
Linux is being utilized in many different applications from business databases, cell phones, and even the New York stock exchange. Linux, however, is hardly considered a “personal computer” OS because of its limitations in personal computing. Although a Linux GUI desktop does exist, the command line interface is considered an advanced program and not for the faint of heart. Linux however holds many advantages in database software, server maintenance, code development and computer programming. The Linux “language” is close to coding language and the kernel is more secure than, say, the Windows Kernel. This advantage is encouraging to businesses and anyone else looking to keep or store sensitive data. Linux is a solid OS to use when handling such information when confidentiality is key. Like the other OS there are different means for file editing. File editors in Linux run a bit differently from a standard text editor or e-mail. Take for instance, VI. VI is a common text editor that comes with most distributions as a part of the standard package. VI is a more powerful tool than a standard notepad as the different modes allow you to type in the capacity of, such as, a .bat file with little to no conversion, but as the raw filr. The VIM, or VI improved, is an enhanced version of the original VI editor. It is much like VI with many additional features to make it easier in editing program source code. EMAC is debatably the most powerful editor. While being able to do the same things that VI and VIM are capable of, it comes with many other features that the others cannot provide such as searching, replacing and detecting patterns in a text file, a media player, creating and sending e-mails , and a capacity to serve as a File Manager. Linux has many advantages over a GUI based system through the command line interface. One being that the command line can be used to initiate multiple tasks at once and even running lines semi-automatically by initiating in the order the commands were typed. The Kernel of mainstream Linux distributions are famously more secure than that of windows systems. A Linux foundation for servers, databases and the longevity that the OS can run without restarts or cool down periods is far longer than others while maintaining its efficiency.
Linux is however not without weaknesses. One big disadvantage is the learning curve. Linux requires a large degree of patience not dissimilar to learning a new language. Also to the common PC user it can be daunting in which distribution of Linux would be best suited for their uses. Then once the software is installed and the system boots up the user is presented with a black screen and a flashing placeholder. It is more common for users to use the GUI and therefore a conversion to the command line is more difficult and frustrating not being able to simply see the icons on a desktop. The Linux command line is a powerful tool to set up and automate simple tasks. Also with the tools provided it can be used to create new code. That can be powerful or dangerous depending on your experience. Windows and the OS X try to protect the user from corrupting their software where Linux is left open to be built upon further. This Open Source aspect allows the user to take full control of the OS and the command line is a better suited tool to take advantage of that control. By acting as ROOT one can even modify the source code of certain distributions of Linux to change how the software behaves. While it isn’t a beginner’s territory, it is just one aspect of how powerful the command line is and how valuable it can be to an experienced user. The directory services are used to organize files into a structure as prescribed by the user. The Directory is navigated by a series of commands and arguments to identify specifically files as well as identifying all resources on a network, making them visible and usable by users and applications. “Directory services are a standard feature of any medium to large corporate network.” (Alastair Cousins, 2003) The primary role of the directory service is to make it easier to navigate around a large scale network or as needed. Linux can set up many directory services at the same time through the command line. The permission as well can be managed to ensure the right people are looking at the right things while keeping the wrong people out. There are three things that most users quickly compare amongst the different OS. First there is the user interface. Mac and Windows use the GUI for easy accessibility to appeal to the mainstream computer user. Linux, although more known for its black screen, white text command line user interface, some distributions do use the GUI. For Linux there are multiple desktop environments, GNOME and KDE are the most common for GUI Linux users. The Linux GUI distributions are independently developed and therefore take on a likeness to UNIX based systems. They are primarily used to fit in rather than revolutionize the GUI. Another question that may be asked by those unfamiliar with Linux is device management. Like Windows, there are Linux distributions with plug and play capabilities (UDev), and a device and driver manager. While the GUI presents these features traditionally, in the command line you must ask for the list of devices by using the command “lsmod.” Then as the devices are added they can be removed by using the command “rmmod” and the name of the device. In networking Linux uses SaMBa which is similar to the Windows SMB protocol. Through certain software a Linux box can communicate with a windows box. (ie. Linux server communicating with Windows clients.) These protocols allow for the sharing of files, printers and remote desktop access. “The basic functions of the Samba suite are: sharing Linux drives with Windows machines, accessing SMB shares from Linux machines, sharing Linux printers with Windows machines and sharing Windows printers with Linux machines.” (Machtelt Garrels, n.d.) This is vital to an interconnected network that is taking advantage of the secure Linux Kernel while needing Windows for the Office Suite for example. Linux provides many services that the other OS offer and perhaps not as gracefully in certain respects, however Linux comes to the top for completing multiple tasks in true multi-tasking. A Linux also is much smaller and can be still run on older boxes that cannot run the newer Windows or Mac OS. “If you have an older computer (especially Pentium III or later) laying around, you can install Linux and in essence have a new computer. In many cases Linux will run faster and you can do all of the basics such as browse the Internet, email, play games, and create and edit documents, spreadsheets, and PowerPoint presentations” (Charles E. Craig, Jr., 2013) It is an affordable piece of software that often comes free for personal use. It can be trusted because the Kernel is a secure brick when compared to other OS Kernels. While it may take some practice and a road map to get use to navigating using the command line, the skill becomes invaluable for coding, programming or maintaining databases.

References
Cousins, Alastair (2003, October 3) Directory services for Linux. Retrieved from http://www.pcworld.idg.com.au/article/39696/directory_services_linux/

Craig, Charles E., Jr. (2013, May 10) Advantages and Disadvantages of Linux. Retrieved from

http://www.renewablepcs.com/about-linux/advantages-of-using-linux

Garrels, Machtelt (n.d.) Introduction to Linux. Retrieved from http://linux.about.com/od/itl_guide/a/gdeitl74t00.htm

Similar Documents

Premium Essay

Exploring Linux Operating Systems

...Exploring Linux Operating Systems Linux is a computer operating system that was created and released by Linux Torvalds in October 1991. Linux was designed and released as a free, open source piece of software. This means that the code that makes up the program is freely available for anyone to copy, study, and modify the code in any way. This design was chosen to encourage the public to voluntarily improve the design and add functionality to the base software. This open source design is anecdotally considered to be a good thing, but has some drawbacks due to splintering, and lack of version control. Due to some of the splintering there are dozens of versions of Linux, most with similar functionality, while there are others that are designed for specific user types and use cases. Each “version” is called a Distribution. There are dozens, if not hundreds of these “distro’s” floating about. One of the most popular distro’s for the entry level user is Canonical’s Ubuntu Linux. This is a Debian based system with a rather simple user interface, and comes standard with a GUI and a host of tools that would make the system useable, and sufficient for most average users. On the other side of the spectrum there are targeted distro’s like KALI whose audience is more on the professional side. This particular distro is pre-loaded with tools that only a professional or an enthusiast would find useful at all. With such a wide range of options, there should be something for everyone...

Words: 1171 - Pages: 5

Premium Essay

Exploring Linux Operating Systems

...Exploring Linux Operating Systems What is Linux? Linux is an Operating System for a computer; it is like other Operating Systems such as Windows and the OS X for MAC. Linux was created in 1991 and has been found on many different systems like Super Computers, cell phones, and even the New York stock exchange. What sets Linux apart from other Operating Systems is that Linux is made by several different companies. According to www.linux.com over 3,200 developers have from 200 companies have contributed to the kernel which is just a small piece of the distribution. How is Linux used today? While other Operating Systems are very limited to personal computing devices, Linux is not limited it can be found on many different things. Linux had its start as a server Operating System but is also one of the only Operating System that can be found on more than just a personal computer. Some of the different things it can be found on taken from www.linux.com “These are just the most recent examples of Linux-based devices available to consumers worldwide. This actual number of items that use Linux numbers in the thousands.” www.linux.com File Editors Coming from a Windows Operating System pretty much my whole life, which means I only have experience with GUI editors such as Notepad from Windows. After working with Linux and its file editors this past week I found it much faster and easier than using the notepad system in Windows. There are two different kinds of editors...

Words: 1308 - Pages: 6

Premium Essay

Nt1110 Module 1 Short Answer 1

...An operating system (OS) serves primarily as a translator between the user and the applications and hardware of the machine in use. In this case the PC, tablet or mobile phone. The OS allows the user to easily visualize commands that prompt the software to carry out an array of functions, limited only by the hardware capabilities and the knowledge of its user. During the beginning stages of personal computer (PC) usage, IBM finalized a deal in the early 1980's with the most common household PC OS developer name, Microsoft. It's MS-DOS, then a command line user interface served as the principal design for Microsoft's home PC users released post Apple's Mac OS just 1 year prior. This decision was made after an irreconcilable deal for the 1970's CP/M developed by Greg Kildall. As MS- DOS gained recognition, the onset of home PC user OSs emerged. This report will provide an introduction to the top OSs commonly used in households today such as Mac OS X, Linux, Windows and some of their variants. The functions of these OSs vary in performance across the span of it's developers, however, are relatively the same. These similarities begin with booting the device, providing a Graphical User Interface (GUI) that appeals and adds ease of utilization to the user, as well as the management of system resource, input/output (I/O) and data. All are necessary for a positive experience from even the most novice of users. The similarities of the OSs are what group their developers together...

Words: 1305 - Pages: 6

Premium Essay

Operating System

...------------------------------------------------- BCN 2053 – OPERATING SYSTEMS – Assignment 1 ------------------------------------------------- Top of Form INSTRUCTIONS – Detail instructions is given below, please follow accordingly. This assignment carries a total of 10 marks. When we talk about operating systems, the most popular words are Windows and Linux. This assignment is all about exploring both types of operating systems. Each group require to: 1. Draw and explain in brief the evolution of both operating systems from the beginning up to today. Explanations may include : a. Year of release b. Version release c. Features 2. Compare between this two very popular Operating Systems, Windows VS Linux in terms of : a. Memory management 1. Focus on how both operating systems handle their memory management especially on virtual memory. To support your research, you may include relevant scenario of how memory being access. 2. Explain any limitation of maximum or minimum memory required by each operating systems especially on 64bit or 32bit architecture 3. Compare and recommend which operating systems utilize its memory more efficient in terms of: i. Normal usage (everyday usage by normal user) ii. Server usage (server environment) b. Process management 4. Focus on how both operating systems handle their process management when it comes to many processes request for CPU resources. You...

Words: 486 - Pages: 2

Premium Essay

Lab #4 – Assessment Worksheet

...________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking: reconnaissance (using Zenmap GUI for Nmap), scanning (using OpenVAS), enumeration (exploring the vulnerabilities identified by OpenVAS), compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses Zenmap? Reconnaissance 4. What step in the hacking attack process identifies known vulnerabilities? Enumeration 5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system. What was the name of the vulnerable service? I believe that this is the telnet service. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved....

Words: 285 - Pages: 2

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Free Essay

Research Assignment 3 Intro to Programming Logic and Design

...Research Assignment 3: Exploring Reverse Engineering • What is reverse engineering? Reverse engineering is the general process of analyzing a technology specifically to ascertain how it was designed or how it operates. This kind of inquiry engages individuals in a constructive learning process about the operation of systems and products. Reverse engineering as a method is not confined to any particular purpose, but is often an important part of the scientific method and technological development. The process of taking something apart and revealing the way in which it works is often an effective way to learn how to build a technology or make improvements to it. When reverse engineering software, researchers are able to examine the strength of systems and identify their weaknesses in terms of performance, security, and interoperability. The reverse engineering process allows researchers to understand both how a program works and also what aspects of the program contribute to its not working. • What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Reverse engineering in software is reversing a program's machine code back into it's original source code. The advantages to using this technique is that one can repair certain bugs, see how a program operates, and improve the operation              of the program. The disadvantage is that certain other bugs may be introduced              during this process. ...

Words: 301 - Pages: 2

Free Essay

Ubuntu Touch Cost Benefit Analysis

...possible. According to the CNET, the Firefox OS is offered for $25 with a compatible smartphone. That is a huge difference in price when it is compared to the Ubuntu Touch, which is priced at $170 with a compatible smartphone. When factoring in the 170 Eduboost members, the total cost of Firefox OS phones would be $4,250 for the Eduboost; whereas, the total cost for Ubuntu Touch would be $11,900. Now while Firefox OS is offering their device for an extremely low price point for a smartphone, the people we are catering to would be able to increase the functionality and gain features and support in regards on promoting literacy. With the Ubuntu Touch OS compatible phones, we would be able to focus our time on more crucial matters, such as exploring and implementing education material to more young minds. By utilizing...

Words: 1079 - Pages: 5

Premium Essay

Unit 1 Research Assignment 1

...Database Concepts Unit 1 Research Assignment 1 Exploring Programming Languages SQL, in a simplest form, is a data sublanguage purposely invented to provide an interface to a relational database such as Oracle Database, and all SQL statements are instructions to the database. SQL provide benefits for all types of users, including application programmers, database administrators, managers, and end users. Some of its features include processing sets of data as groups rather than as individual units, as well as provide automatic navigation to the data. Since SQL was first created there have been three major changes to the program and eleven minor changes. The latest major change addressed the requirement for objects and "object identifiers" in SQL and also specifies supporting features such as encapsulation, subtypes, inheritance, and polymorphism. Microsoft SQL Express is a free edition of SQL Server that is ideal for learning, developing, powering desktop, web & small server applications, and for redistribution by ISVs. It includes the full version of SQL Server 2014 Management Studio and provides LocalDB; a lightweight version of Express that has all its programmability features, yet runs in user mode and has a fast, zero-configuration installation and short list of pre-requisites. Use this if you need a simple way to create and work with databases from code. Microsoft SQL Express even has the options of adding tools or advanced services to the express package. Like...

Words: 375 - Pages: 2

Premium Essay

En1320 Project Part 1

...Exploring and Researching Your Chosen Profession By Robert Maddox EN1320 In this new age of the second industrial revolution, a time where skills in technology are essential to succeed in a competitive work force, cybersecurity is at an utmost priority for many companies and individuals alike. It's here where I feel I can make a truly important impact upon society, all while working with a sense of purpose and success. One can't watch television without the constant reminder of identity theft or devastating hacks by secretive individuals hidden behind false IP addresses and the like. Whether it's a commercial for credit scores and security or shows like Mr. Robot, cybersecurity is on everyone's mind, subconsciously or otherwise. And these issues are only going to increase as technology advances and the internet becomes more readily accessible to terrorists. As a veteran, my duty to protect American citizens did not simply stop when my contract ended with Uncle Sam. Ideally, I would accomplish this through the Federal Bureau of Investigations. There are many criteria to complete in order to accomplish this, and I am in no way close to this, yet one must start somewhere and this degree will be my first step. I have always been interested in computer technology, even if it merely stemmed from my long term relationship with video games. Rebuilding computers and achieving better performance came second nature to me and computers just make sense...

Words: 1074 - Pages: 5

Free Essay

How Successful Leaders Think

...HOW SUCCESSFUL LEADERS THINK Leaders have the predisposition and the capacity to hold in their heads 2 opposing ideas at once. They’re able to creatively resolve the tension between those 2 ideas by generating a new one that contains elements of the others but its superior to both. This process of consideration and synthesis can be termed integrative thinking. It is this discipline that is a defining characteristic of most exceptional businesses and the people who run them. Not every good leader exhibits this capability, nor is it the sole source of success for those who do. But integrative thinking tremendously improves people’s odds (possibilitats). Many great integrative thinkers aren’t event aware of their particular capability and thus don’t consciously exercise it. Opposable Thumb, opposable mind Red Hat faced what seemed like 2 alternative paths to growth. AS Red Hat looked to grow beyond its $1 million in annual sales, it could have chosen one of the 2 basic business models in the software industry. 1. classic proprietary-software model sold customers operating software but not the source code. These companies had wide profit margins because their customers, lacking access to the source code, were essentially locked into purchasing regular upgrades. 2. Free-software model: suppliers sold CD-ROMs with both the software and the source code.--> Prices were modest; and suppliers made money each time they assembled a new version from the many free updates...

Words: 1812 - Pages: 8

Premium Essay

Windows 7 Versus Windows Xp

...Windows 7 I’ve had the chance to work with most mainstream operating systems that today has to offer and after exploring all the options I feel most satisfied with what Windows 7 has to offer. Whether you’re new to Windows or just upgrading, the benefits of switching are endless, ranging from new features to performance improvements, even the basic appearance. Windows 7 has many advantages over other operating systems. There are different versions that range from business to casual. All have their perks and range to different prices. You can pin programs, and files to the task bar, similar to other operating systems, but hovering your mouse cursor over the file or program in your task bar allows you to get a preview of that program or file. Another feature introduced is Windows snap. It allows you to drag a file to either side of your screen and snap it into place, allowing file comparison, along with multitasking. On top of the many features making Windows 7 better than most operating systems, is the hardware and software compatibility. After a fresh install of Windows 7, you can run Windows update and get all the drivers needed to run the hardware inside your computer. You can also run older applications that didn’t have compatibility in Windows Vista, but did in Windows XP. Another great new feature of Windows 7 is the security gains after upgrading from vista. User account control in Windows Vista was a huge hassle, and Windows 7 builds on that to make it less annoying...

Words: 592 - Pages: 3

Free Essay

Paper

...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under...

Words: 22047 - Pages: 89

Free Essay

Programming Languauges

...Programming PT-104 | UNIT 1ASSIGNMENT | Research Popular Programming Languages | Associated with the Past Present and Future of Virtualization | | 9/30/2013 | Introduction to Programming 23 September 2013 Unit 1 Assignment 1 Exploring Programming Languages Platform virtualization vs. application virtualization Virtual machines (VMs), in their first incarnation, were created by IBM 60 years ago as a way to share large and expensive mainframe systems. And although the concept is still applied in current IBM systems, the popular concept of a VM has broadened and been applied to a number of areas outside of virtualization. Virtual machine origins The first operating system to support full virtualization for VMs was the Conversational Monitor System (CMS). CMS supported both full virtualization and paravirtualization. In the early 1970s, IBM introduced the VM family of systems, which ran multiple single-user operating systems on top of their VM Control Program—an early type-1 hypervisor. The area of virtualization that IBM popularized in the 1960s is known asplatform (or system) virtualization. In this form of virtualization, the underlying hardware platform is virtualized to share it with a number of different operating systems and users. Another application of the VM is to provide the property of machine independence. This form, called application (or process) virtualization, creates an abstracted environment (for an application), making it independent of its physical...

Words: 1974 - Pages: 8