... Introduction What is an Ext2 file system ? The Second Extended File System (EXT2) file system is a replacement of the Extended File System (EXT). The file system was created by Rémy Card in 1993. EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles. The file and space limitations are as follows: Block Size: 1KB 2KB 4KB 8KB File size: 16 GB 256 Gigabytes 2 Terabytes 2 Terabytes File system: 4 Terabytes 8 Terabytes 16 Terabytes 32 Terabytes The directory and file structure is not indexed, so searching within a directory with a large amount of files can be time consuming. EXT2 allows for a patch to be added which is an add-on (e2compr) to allow file compression. Compression is a method which compresses files on the file system to save space. Compression can also increase read speeds from the storage unit. Files and directories are stored within Inodes. The date ranges for timestamps can only go as high as January 18, 2038. Once this date is reached, the EXT2 file system will no longer store proper timestamps. Either other file systems must be used or a patch must be applied, if one exists. What is an Ext3 file system ? The EXT2 file system was extended by Stephen Tweedie in 1998 to...
Words: 5604 - Pages: 23
...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................
Words: 17681 - Pages: 71
...recursively change user, group and other permissions on files/directories * chown - options to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals to a process * ps - options to list all running processes on a Linux/Gnu system * top – Interactive Linux Tasks Status Display * grep - know how to use to find specific lines of info in output/files (you should have learned about this command in Intro to Unix/Linux Systems.) Shell expansion characters - be able to respond to questions regarding usage of '*' - asterisk, all files or all matching strings '?' - question mark, single character What are the components of a Linux distribution? * Kernel * Desktop Environment * System Libraries * System Tools * Developmental Tools * File Structure Popular Distributions: * Redhat, * CentOS * Fedora * Suse * Debian * Ubuntus What sort of hardware architecture can Linux be installed on? * Intel-x86 systems * Embedded systems From what sources can Linux be installed? * CD- ROM * Hard Disk * Floopy Disk * USB * Network Installation * ftp * http * nfs Who created the Linux Kernel? What does open source mean? Where is the kernel stored on a CentOS distro (/boot), What is its name (bzImage, vmlinuz). * Linus Torvalds – Creator in...
Words: 4587 - Pages: 19
...file systems. With Windows and Linux primarily being used on desktop computers, the amount of storage as well as the overall performance is better than Android file systems. Android still puts up a good fight considering it is mainly tablet and smartphone based. Let’s explore these filing systems for these three power houses in this computer based era. Windows file system has been around for a very long time and with age comes the ability to fine tune their file systems. There are 3 different file systems available for Windows. They are NTFS, FAT32, and FAT or FAT16. The NTFS is the preferred system due to its many benefits. The NTFS offers the user the ability to recover from some disk related errors automatically, improves support for larger hard disk, as well as has a better security because you can set permissions as well as encryptions to keep files safe. NTFS was introduced in Windows NT and at present is major file system for Windows. This is a default file system for disk partitions and the only file system that is fortified for disk partitions over 32GB. The file system is quite extensible and fortifies many file properties, including access control, encryption etc. Each file on NTFS is stored as file descriptor in Master File Table and file content. Master file table contains all information about the file: size, allocation, name etc. The first and the last sectors of the file system contain file system settings (boot record or superblock). This file system uses...
Words: 999 - Pages: 4
...Review Questions Chapter 6: Host Hardening 1. To know how to install an operating system with secure configuration options, you would use a... a. security baseline b. standard c. security template d. wizard 2. A systems administrator’s main role is to… a. manage a network b. implement security baseline on servers c. None of the above 3. In a Windows network, which of the following could be used to implement security measures on multiple computers through a domain? a. Policy Maker b. GPO c. Domain ACL 4. LINUX distributions are standardized which makes them easier to manage a. True b. False 5. Which of the following is true? a. A particular version of UNIX will offer multiple user interfaces. b. All UNIX user interfaces are command line interfaces c. Both of the above. d. Neither a. nor b. 6. UNIX command-line interfaces are called _____. a. versions b. distributions c. GUIs d. shells e. windows 7. Routers are sometimes hosts. a. True. b. False 8. Cisco’s operating system for its routers and most of its managed switches is... a. IOS b. UNIX c. LINUX d. Windows 9. To apply patches in Windows 2000 and later versions of Windows, you choose an option on the _______ menu. a...
Words: 445 - Pages: 2
...CRITICAL COMPARISON: WINDOWS VS. LINUX This report is a critical comparison of the computer operating systems (OS), Windows and Linux. It is written for an average audience that uses a computer almost everyday and is now curious to know which operating system is better. The audience is assumed to have sufficient knowledge to understand the various aspects of an OS, but is not aware of the specific details of each OS. This report analyzes the different features of both operating systems in order to arrive at a conclusion on which OS is better for daily use. Both systems are evaluated on a wide range of criteria such as cost, installation process, software applications, hardware, user interface, security/stability, troubleshooting, and the implementation of the OS itself. These will help decide which of the two systems is better to use on a daily basis. Before I begin the comparison the reader needs to know that Windows is created, maintained, and updated by Microsoft. No one from outside can access the underlying code. However, Linux is created and updated by volunteers all over the world, which is why there are so many different variations of Linux like Red Hat, SuSE, MandrakeSoft and a few more. The important features of the operating systems are discussed below. COST The Windows operating system is significantly more expensive than the Linux operating system. In fact, the...
Words: 1216 - Pages: 5
...is a proprietary brand typically run in large organizational infrastructure. However, many of the UNIX variants are open source that allow users to customize their distribution as they see fit and making copies to install in an unlimited number of machines. UNIX offers a highly stable operating system (OS) that is ideal for full multitasking capabilities while protecting memory to prevent interference with other users. The stability provides greater uptime for increased productivity and less downtime for crash recovery and troubleshooting (Montpelier Open Source, n.d.). UNIX has been the baseline for Internet services and growth where machines on network can operate as clients and servers. Linux is a variant of UNIX and has established itself in the desktop, workstation, and increasingly in the server environments. A key benefit for Linux is the scope of freedom of distributions (distros) that provide many applications, freeware, and add-ons (Stanford University, 2004). Linux is extremely portability to a wide range of new and old machines. The majority of Linux variants are available free or at an economical price compared to Microsoft Windows. Linux is a very secure operating system and although it still can be prone to attacks, it inherently is more secure than Windows. Another huge benefit is the reliability of UNIX and Linux versions that can often run for months without the need to reboot. UNIX and Linux Disadvantages The learning curve for Command Line Interface (CLI)...
Words: 1984 - Pages: 8
...Windows VS Linux. Ronald Prasad When it comes to computers, majority of the users tend to prefer windows based systems rather than Linux. While Linux has its own qualities like been open source licensed, Windows on the other hand is more user friendly and also has great Hardware supporting compatibilities. Linux is an open source licensed operating system, which basically means that it’s free for everyone to download, free of cost, and modify it without any need of a licenses. Since it’s totally free there is no guarantee of its reliability or customer support to help deal with technically problems. Whereas compared to Windows, which costs about $99-$199 for Windows 8 version, although it does not come cheap, but it provides a guarantee of its reliability and customer support. Windows operating systems are much more user friendly, especially the Windows 8 version, which has excellent user interface, which allows users to navigate, explorer, trouble shoot with very little difficulty. Whereas Linux has a very complex look and puts more emphasis on usage commands in Terminal Window usage instead if using the interface, e.g. To install updates on Linux, sudo apt-get upgrade command must be type in the Terminal Window whereas is Windows getting updates is easily done with just few mouse clicks in the Control Panel. Windows supports most motherboards, mice, hard drives, keyboards, network cards, DVD drives, flash drives and monitors. Since these hardware’s mostly comes with only...
Words: 329 - Pages: 2
...|Application Testing Checklist | |Tested By |Mark Tester |Date |8/11/12 | |Application Name |2008 SQL Management Studio | |Procedure |Expected Result Achieved |Pass/Fail |Actual Results/Comments | | | |(P/F) | | |Application Functionality | |Performs primary functionality and |Yes |P |Updating and maintaining databases with access | |maintains stability | | |to run commands as needed. | |Windows Fundamentals | |Installs under a user account |No |P |Does not install under student user account | |Installs under a power user account|Yes |P |Installs correctly | ...
Words: 17249 - Pages: 69
...paper was to analyze three anti-forensic techniques for potential methods of mitigating their impact on a forensic investigation. Existing research in digital forensics and anti-forensics was used to determine how altered metadata, encryption, and deletion impact the three most prominent operating systems. The common file systems for these operating systems were analyzed to determine if file system analysis could be used to mitigate the impact of the associated anti-forensic technique. The countermeasures identified in this research can be used by investigators to reduce the impact of anti-forensic techniques on an investigation. Also, the results could be used as a basis for additional research. File system analysis can be used to detect and mitigate the impact of the three methods of anti-forensics researched under the right circumstances. Some areas of anti-forensics and file systems have been relatively well-researched. However continued research is necessary to keep pace with changes in file systems as well as anti-forensic techniques. Keywords: Cybersecurity, Albert Orbinati, Windows, Linux, Macintosh, file table. MITIGATING THE IMPACT OF ANTI-FORENSIC TECHNIQUES THROUGH FILE SYSTEM ANALYSIS by Gabriel A. Flynn A Capstone Project Submitted to the Faculty of Utica College August 2012 in Partial Fulfillment of the Requirements for the Degree of Master of Science Cybersecurity – Intelligence & Forensics © Copyright 2012 by Gabriel Flynn All Rights Reserved ii ...
Words: 11835 - Pages: 48
...TERMPAPER OF CSE316 Subject:-OPERATING SYSTEM Submitted To:- Faculty member : Amritpal Singh Submitted by:- Name of student : Omkar Kumar Section : K1108 Roll no : B26 Registration number : 11114390 INTRODUCTION FILE SYSTEM Ans. A file system (or filesystem) is a method to organize a data expected to return after a program terminates by providing procedure to store, retrieve and update data, as well as manage the available space on the device(s) which contain it. A file system organize data in an efficient manner and is tuned to the specific characteristics of the device. File systems can be used on many different kinds of storage devices. Each storage device uses a different kind of media. The most common storage device in use today is a hard drive whose media is a disc that has been coated with a magnetic film. The film has ones and zeros 'written' on it sending electrical pulses to a magnetic "read-write" head. Other media that are used are magnetic tape, optical disc, and flash memory. In some cases, the computer's main memory (RAM) is used to create a temporary file system for short term use. Some file system are used on local data storage devices; others provide file access via a network protocol (e.g. NFS,SMB, or 9P clients).Some file systems are “virtual”, in the “files” supplied are computed on request...
Words: 5740 - Pages: 23
...Carrier Objective: Obtaining a challenging career in the field of Information Technology as a Unix/Linux Systems Administrator to utilize the knowledge that I have gained through past years of experience in various industries such as Telecommunications, Banking, Medical, Insurrance and government establishments . Qualification Summary: 5 Years of Unix experience with overall 10+ years of experience in the field of Information technology. Master's Degree in Micro-Electronics & Diploma in Computer Sciences. Specialize in following: Unix Administration on Sun Solaris and Red Hat Linux environment. VERITAS Volume Manager and Cluster Server experience. Websphere Application Server experience Virtualization Technologies VMware ESXi 5 Large 24x7 mission-critical production environment experience. Unix Administration, maintainance providing support in an enterprise enviroment (Resolved, escalated and dispatched technical issues) Experience with EMC/Openfiler SAN,configured and Managed SAN storage for Vmware Vsphere enviroment . Communication skills in handling diversified activities like Customer Support, in various capacities from front-end field engineer to the present capacity working. Well versed with Incident resolution and Change Management process. Performing Datacenter administration ( HP/SUN Servers including C7000,M4000, M5000, T5220, T5240, V440, V480/V490, V880/V890, E4500, E6500) tasks such: Backups, restore, Tape Management, Installation, Upgradation & Decommission...
Words: 1089 - Pages: 5
...Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...
Words: 17866 - Pages: 72
...IS/PM 535 Assignment #1 Analysis of IT Cost Structure This assignment requires you to apply your knowledge about responsibility centers, cost drivers, and cost structure (classification and behavior) in the context of four types of services provided by an information technology organization: 1. IT help desk service 2. E-Mail Service 3. Enterprise systems (e.g., financial, HR, DePaul’s student registration systems ) 4. Website development service. Follow these steps in your analysis: 1. Define the scope and the financial objective of each service. 2. Organize each IT service as a cost or profit center. You may provide some assumptions about the service in your explanation. 3. Identify typical cost drivers for each service. Choose one or two appropriate cost drivers. Remember: cost drivers cause variable costs to change. Among many potential cost drivers, which ones are most appropriate? 4. Identify 4 or more cost items for each service (cost object). Typical costs items are labor, material (equipment, etc.), overhead (electricity, etc.). You can use exercise #1 in worksheet #1 as a reference, although that example is more specific on focus group sessions. Be specific. 5. Identify the cost structure for resources required to deliver each identified service (Direct/Indirect and Fixed/Variable). 6. Provide a brief comment to explain any unique perspectives. Requirements **Present your analysis in the following order: Name of service (cost object) Definition:...
Words: 542 - Pages: 3
...Implementation of Packaged Software for Complaint Registration System Submitted by Arun Kabra Roll No: 11BM60046 Vinod Gupta School of Management IIT Kharagpur Problem statement: The main focus of any business is its customers. Any business issue raised by the customer needs to be addressed and resolved with the top most priority. The customer should be able to raise issues comfortably on the site. With this focus at hand the CEO of an online DVD rental organization wants to implement a complaint management system which can be used by both existing customers and new customers who would register on site before raising a ticket. These complaints needs to be created for different departments or business units and would be resolved by dedicated staff from each department. The staff should be able to create, update, track and close an issue based on privilege level granted. All the registered customers should be able to see announcements and messages regarding changes after they login to helpdesk. Along with these provide FAQ to generally asked question by customers so that they can refer to common issues and their resolution before raising a ticket. Evaluation of Software options: Following 3 software were considered for the above mentioned business problem 1) Exo PHP Desk 2) osTicket 3) Trellis Desk Features | ExoPHP Desk | osTicket | Tresllis desk | Web Hosting | | | | DB | MySQL | MySQL | Propriety | SSL security configuration | |...
Words: 570 - Pages: 3