Free Essay

Important Features of Linux

In:

Submitted By beaner462
Words 295
Pages 2
Important Features of Linux 1. Many free iterations. Many of them to choose from with all of their own benefits 2. Highly customizable. Many of these Linux distributions can be set up like other existing operating systems to set your own level of comfort if you should so desire 3. Many free applications. Many different applications to choose from that are open source so that means free applications that work like other existing applications so you can not have to worry about having a program that isn’t compatible with Linux. 4. Secure. The Ubuntu desktop version specifically has a built in firewall that will protect your files and comes with virus protection as well. There isn’t many viruses out there for Linux to start with compared to the other operating systems. 5. Scalability. Linux can run on a wider range of hardware and is very fast in the way it works with your current hardware. If it doesn’t already work with I/O devices, there is easily a way to download signed or unsigned drivers to get it to work most of the time. You could even use your old computer as a file server or backup server by installing Linux to run it that way. 6. I/O Compatibility. Linux also works with a range of devices from mp3 players to printers and the drivers are easily installed automatically not to mention compatible with certain Microsoft software products as well, all for free! 7. Open Source. As I have stated before all of the source code is freely available to code so anyone with any kind of programming skill is absolutely free to try out development or add their own flavor to the mix without having to pay licensing fees.

Similar Documents

Free Essay

Linux Security Basics

...IT302 7/9/2012 Research Linux Security Basics Linux, being one of the most secure operating systems in the world, has many features and services that enhance security to the maximum. Linux isn’t completely secure, like some people like to claim, but many distributions strive to make security a key feature. One of the greatest reasons Linux is more secure, is the simple fact of having a smaller user base than other operating systems; this means that Linux is a smaller target for most malicious intents. That doesn’t mean that distributions rely on this to secure their OS. There are many great and complex security features and services that come with Linux. One of the most complicated security features, I believe, is SELinux. Security Enhanced Linux is a security model developed by the NSA and provides a fine grained permissions system for files, users, groups, sockets, ports, and processes. SELinux was conceived because the current user level security system that Linux, and other operating systems, offer is insufficient for. To ensure a maximum security environment, SELinux uses the MAC security model. This means that an object only has the minimal set of permissions it requires to operate. SELinux uses sets of policies to handle permissions providing the system with a great level of security. These policies can be assigned as roles to users enabling specific rules and regulations for specific individuals. SELinux may be a powerful security feature, but it can also be a pain...

Words: 1200 - Pages: 5

Premium Essay

Windows vs. Linux

...Windows® vs. Linux It was inevitable that operating systems—and computer system in general—at least in the year 2012, are not anything like those envisioned by science fictionists, novelists, and screen writers of the early and mid 20th century. For the most part, they saw computers as a single entity one system controlling everything, like a giant brain reaching out and serving each end-user anonymously. And there were surely no “blue screens of death.” Computers today come in hundreds of flavors. Let’s say you want a tablet instead of a keyboard, no problem. Need to run a multi-million dollar company with an extensive database from home? No problem. Interfaces and operating systems and software applications and hardware upgrades and I/O devices provide each and every person on the planet a customized computer experience. We should thank capitalism for many of the technological advances that have come about over the past fifty years. After all, money has a tendency to flow to the products that make our lives the most enjoyable. Three of the most notable advances in computer history are servers (formerly known as mainframes), Microsoft Windows, and the Linux operating system. Each one in its own right could fill volumes. However, the objective of this paper is to simply highlight a few of the most prominent features each of these advances has to offer. We will start with the most notorious MS Windows®. Microsoft has been in the computer industry...

Words: 2777 - Pages: 12

Free Essay

Linux Paper

...Linux Features of Red Hat Red hat has many different features, I will cover a few of the main features in this section, and Red Hat contains more than 1,200 components covering a broad range of functionality. Red Hat Enterprise Linux provides CIOs and IT managers with the means to reduce costs while improving operational flexibility throughout their computing infrastructure. The following list provides a brief summary of the more important features: * Virtualization is provided in all Red Hat Enterprise Linux server products and is optionally available for desktop products. * Storage and extended server virtualization are provided with Red Hat Enterprise Linux Advanced Platform. * Red Hat Network supports virtualized guest operating systems * Virtual-manager, other management tools are available for single system or scripted virtualization management. * Integration with Red Hat Enterprise Virtualization is available for enterprise virtualization management. Networking & interoperability * Network storage enhancements include Autofs, FS-Cache, and iSCSI support * IPv6 support and conformance enhancements * Improved Microsoft® file/print and Active Directory integration, including support for Windows Security Features * SE Linux enhancements include Multi-Level Security and targeted policies for all services * SE troubleshooter GUI simplifies SE Linux management * Integrated directory and security capabilities * IPSEC enhancements...

Words: 769 - Pages: 4

Premium Essay

Windown vs Linux

...WINDOWS VS. LINUX This report is a critical comparison of the computer operating systems (OS), Windows and Linux. It is written for an average audience that uses a computer almost everyday and is now curious to know which operating system is better. The audience is assumed to have sufficient knowledge to understand the various aspects of an OS, but is not aware of the specific details of each OS. This report analyzes the different features of both operating systems in order to arrive at a conclusion on which OS is better for daily use. Both systems are evaluated on a wide range of criteria such as cost, installation process, software applications, hardware, user interface, security/stability, troubleshooting, and the implementation of the OS itself. These will help decide which of the two systems is better to use on a daily basis. Before I begin the comparison the reader needs to know that Windows is created, maintained, and updated by Microsoft. No one from outside can access the underlying code. However, Linux is created and updated by volunteers all over the world, which is why there are so many different variations of Linux like Red Hat, SuSE, MandrakeSoft and a few more. The important features of the operating systems are discussed below. COST The Windows operating system is significantly more expensive than the Linux operating system. In fact, the Linux OS can even be...

Words: 1216 - Pages: 5

Premium Essay

Operating System Analysis Paper

...Operating System Analysis Paper Team A: , POS/355 August 25, 2012 Demetrius Fluker University of Phoenix Operating System Analysis Paper When ruminating over which operating system for a home, business, or office computer or network of computers, it is vital to evaluate all areas of the different operating systems options. The key system options to compare and contrast when evaluating Microsoft Windows XP, Microsoft Windows Server 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same. These requirements are a PC with a 233 megahertz or higher (a 300 megahertz + processor speed is recommended), 64 megabytes (MB) of RAM or higher (128 MB is recommended), 1.5 gigabytes (GB) of available hard drive space, a video adapter and monitor that is Super VGA (800x600) or higher-resolution, CD/DVD-ROM drive, keyboard, and mouse/pointing device. The Windows XP Starter Edition has different system requirements. These are 233MHz processor or better, 256 MB of RAM, Super VGA (800x600) video adapter and monitor, CD/DVD-ROM drive, keyboard, mouse/pointing device, DirectX 9 graphics with 32 MB...

Words: 4101 - Pages: 17

Free Essay

Comparison Matrix

...University of Phoenix Material Unix® and Linux® Comparison Matrix Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column. UNIX® or Linux® operating system version: Fedora |Components |Your response | |Role of shell |Gives a command line with built in commands | |Three features and roles of each |Security-there is a firewall tool provided with a task bar that lets the user know of any | |feature |security issues. Shell- Is environment friendly for the user and has functions that run like | | |a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the| | |user continue their work. | |Comments on security |This is a main important feature for the OS | |Comments on administration |It is easy for ADMIN use and the tools are not as difficult | |Comments on networking |Networking is ok even though the security firewall is good ...

Words: 446 - Pages: 2

Premium Essay

Thsg

...Linux is one of popular version of UNIX operating System. It is open source as its source code is freely available. It is free to use. Linux was designed considering UNIX compatibility. It's functionality list is quite similar to that of UNIX. Components of Linux System Linux Operating System has primarily three components Kernel - Kernel is the core part of Linux. It is responsible for all major activities of this operating system. It is consists of various modules and it interacts directly with the underlying hardware. Kernel provides the required abstraction to hide low level hardware details to system or application programs. System Library - System libraries are special functions or programs using which application programs or system utilities accesses Kernel's features. These libraries implements most of the functionalities of the operating system and do not requires kernel module's code access rights. System Utility - System Utility programs are responsible to do specialized, individual level tasks. Linux Operating System Kernel Mode vs User Mode Kernel component code executes in a special privileged mode called kernel mode with full access to all resources of the computer. This code represents a single process, executes in single address space and do not require any context switch and hence is very efficient and fast. Kernel runs each processes and provides system services to processes, provides protected access to hardwares to processes. Support code...

Words: 531 - Pages: 3

Free Essay

Unix Pos420 Uop

...UNIX, Linux, and Windows Servers Security When comparing Linux/Unix versus Windows platforms for security it is important to take into account the security issues being addressed. The most common types of security breaches in today’s business world are based on social engineering attacks. These attacks are focused on bypassing security measures by tricking users into accomplishing the tasks required by the malicious code. These attacks can introduce numerous types of malicious code into the network ranging from spyware up to and including viruses. When comparing Windows versus Linux/Unix it is important to realize that more security features may be available depending on the exact operating system. This comparison is not to compare specific distributions of Linux/Unix against a specific version of Windows, instead it will compare the core elements that are prevalent in both operating systems regardless of the distribution or version chosen. The first security feature that is discussed is the structure of both operating systems. The difference between Linux/Unix and Windows based on structure is the way configuration for software is approached. Most malicious code in a Windows platform is embedded into the registry. The registry is a single location that stores every configuration setting for software installed on the machine. This allows a standard location for malicious code to target on a windows machine. Whereas Linux/Unix does not have a registry, instead it uses...

Words: 1996 - Pages: 8

Free Essay

Unix vs. Windows Server

...Unix / Linux vs. Microsoft Windows Server Student Name Goes Here Class Number Goes Here Due Date Goes Here Professor Name Goes Here Unix / Linux vs. Microsoft Windows Server Introduction Pace Glass Company is a global cutting, polishing and bending company with operating facilities in two U.S. cities. Pace Glass Company's major clientele include RV manufacturers, specialty car manufacturers, automotive parts manufacturers, aircraft manufacturers, appliance manufacturers and most prestigiously N.A.S.A. With manufacturing plants in Southwest Michigan and Northwest Ohio, Pace Glass Company's online business plays a vital role in continued growth and as such there is heavy consideration underway as to which type of computer operating base the company upgrades will be implemented against. Pace Glass executives and partners recognize that security and reliability are key to the continued growth in their online presence which plays a substantial role in system determination. Purpose The purpose of this study is to discuss the differences between Unix, Linux and Microsoft Windows and server environments. This study will discuss facts that cover security, administrative, networking, performance, programmability as well as provide a briefing in conclusion. Security Approach A fundamental difference between the Unix approach to system security and the Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design...

Words: 2110 - Pages: 9

Free Essay

Linux and Windows Server Critique

...Linux and Windows Server Critique Team C POS 420 June 25, 2012 Yevgeniy Tovshteyn Linux vs. Windows Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming. Kudler Fine Foods Current Systems: 3 locations: La Jolla, Del Mar, and Encinitas La Jolla Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem Del Mar Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem Encinitas Novell 4.11 Server for POS 4 POS...

Words: 1833 - Pages: 8

Free Essay

Linux Security Technologies

...Linux Security Technologies   SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more secure way to better protect our nation’s computer systems. In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting. To better understand what improvements Mandatory Access Control (MAC) can provide for security, one needs to know about the standard Linux security provision called Discretionary...

Words: 1124 - Pages: 5

Premium Essay

Windows Mac Linux Security

...replaced their “Why you’ll love a Mac” website containing “It doesn’t get PC viruses” to “It’s built to be safe” (Mlot, 2012). Since malware really only exploits existing bugs or holes in an operating system, it is up to Apple to fix those holes, and they do a pretty good job of it. But in any case, it’s better to be safe than sorry. Some pretty good Mac antivirus include MacKeeper, Kaspersky, and Trend Micro (Sutherland, 2014). Preventative Maintenance With the threats to OS X made real, there are some simple tricks to keep a Mac up and running. The first of which is the ever-important data backup. Time Machine, is Apple’s all-in-one backup program similar to the Acronis True Image available on Windows. This lets you back up just your files, or even take a “snapshot” of your computer exactly how it is in a large image file, and store it on an external drive. As with any system though, updates are important. These will keep a system as patched as possible and able to withstand a lot of attacks. The Mac...

Words: 2141 - Pages: 9

Free Essay

It302 4.1 Research Assignment

...Linux Security Technologies There are many ways to have internet access these days. Coffee shops, libraries, airports and even public buses have free wireless access. With all these free accesses to the World Wide Web, there is also many potential ways for hackers to potentially get your personal information and use it for their gain. There are many ways to combat this situation by using several security measures with Linux programming, which the majority of the software is free. Some of those security technologies are SELinux, TCP Wrappers, IPtables and Chroot Jail to name a few. SELinux is a security enhancement to Linux which allows users and administrators more control over access control. Access can be constrained on such variables as which users and applications can access which resources. Was developed by the NSA in December of 2000. These resources may take the form of files. Standard Linux access controls, such as file modes (-rwxr-xr-x) are modifiable by the user and the applications which the user runs. Conversely, SELinux access controls are determined by a policy loaded on the system which may not be changed by careless users or misbehaving applications. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such...

Words: 1350 - Pages: 6

Premium Essay

Computer System

...of PCs by PDAs and I Pad in business application is depending on the nature of the business and also the needs of the company. Before decided to change our PCs to PDA few question should be ask. Example, it is necessary to change PCs to PDA? What will be the impacts on the change? How much cost will be involved on the changes? Does it improve the customer service levels? Now days we are moving toward smart gadgets and information appliances. This will of course give impact on the nature of business applications. However, the management must decide the type of technology that will best meet the needs of the given employees groups because it will be useless if we change the application but there is no progressing in the company. The most important thing to do is to think about is what will benefits the company by changing the new hardware into the business. The management needs to plan for the future and not just focus on the current needs. Business owner need to think the needs for new...

Words: 1882 - Pages: 8

Free Essay

File Management

...are people that are still clueless on the operating system. It is different, exciting when a new and advance system comes out. But some of us are so confused when it comes to the basics of new technology.       Operating systems are programs which manages the computer’s hardware. The systems provide a basic for the applications programs between the computer user and its hardware. When looking, there are so many different types of operating systems that are available. The four main operating systems that are used are Windows, Mac, UNIX, and Linux.       For every computer there are many different items that make the system a whole. When it comes to the different operating systems there are different features available, even though when you think of computers a person might think security will all be the same but there are difference between each one. As you read more you will understand the security and the difference between a MAC, UNIX/LINUX and Windows systems and how each one works.       Access control goal is to protect a resource from unauthorized access while facilitating seamless and legitimate use of such resources. Presently, each day users hold the need to access to those resources through a broad line of devices, such as PCs, laptops, PDA, smartphones and kiosks. Most organizations need to provide protection for their files and allow the correct people to access. The fundamental goal of an Access management system is to maintain confidentiality of user information...

Words: 2672 - Pages: 11