...UNIX operating system and its features UNIX is a certified brand of The Open Group that belongs to a family of computer operating systems. UNIX stands among some initial operating systems which has to be written in a high level programming language that is C. Further Bell labs circulated it in a way that anyone could customize it according to his own wishes. As a result in late 70’s, number of versions of this operating systems were running at several places [Vangie Beal(2015)]. File permissions features of UNIX The most important feature of UNIX Operating system is that it procures a safe and sound method for storing data and information. Each file stored in UNIX has some characteristics and attributes like “owner permissions” in which it specifies that what actions and tasks the owner of the information or file can execute or perform. The second permission is “group permissions” which allows the user who is a part of group can perform different functions on a particular file of the same group but for this one must have to be a part of the group. The third is “other permissions”. It is a permission which determines what type of actions and functions, rest of the users can perform on particular file [Tutorialspoint(2014)]. Security feature of UNIX The security of the systems can be increased by some specific settings which controls the access of different users. This feature includes read, write and execute access options. The read access option allows users to view and...
Words: 452 - Pages: 2
...Protection Scheme with Unix Adam Macon POS/355 8-10-13 Mr. Groves When considering a protection scheme that will protect up to 5,000 users the best choice would be Unix. Unix is an operating system developed in the 70’s in AT&T Bell Laboratories. The unique thing about Unix is that it is written in C, which gives it the ability to be portable and able to be integrated with other Unix machines. Program written on one Unix machine can be easily adapted to other Unix machines (C is particularly well-integrated with the operating system itself) (David 2013). We will discuss exactly what the protection scheme is with Unix and how 4900 users can be one file. Unix system has the ability to serve many users and these users can be organized in groups. A Unix file can distribute ownership to three different classes of users, which are user, group, and other. User is the directory owner, which is the person who created the file, group is the members of the group, and others are the users who aren’t members of the group and are not the file owner. There are three permissions for User, Group, and Others, which are Read, Write, and Execute. A user with Read permission can look at contents of that particular file, a user with Write permission can change contents in that file, and a user with Execute permission can use that particular file as a Unisex system command. Permissions only an be changed by the chmod command. To be able to achieve having 4,990 users on one file you can...
Words: 287 - Pages: 2
...There are several editors used in UNIX at present time, NEdit, Emacs, VI, and Pico to name a few. Editors are mainly used to replace the default editors in UNIX. Some people have found the default editor to be complicated and unfriendly to operate. I have chosen Emacs and Vi to discuss. Emacs was derived from a version of Multics which saw its inception August 15, 1979. The original creator was Richard Stallman, the software is a video-oriented text preparation and editing system it ran on Honeywell’s Multics system it was widely accepted at MIT and had a large user community. This acceptance led to the development of protocols for the ARPANET (Advanced Research Projects Agency Network) which is now known more commonly as the Internet. It was designed for the use of video-oriented software in a device independent fashion. ( Greenberg,1996) Emacs was later rewritten on a C platform by James Goslin in 1982. Which he then sold to Unipress and it was renamed Unipress Emacs. One of the major advantages of using Emacs would be the speed of the software. It has the ability to open large files edit them and save in the time it takes to load some programs in windows. The other editor I spoke of earlier would be Vi. The Vi editor was created in 1976 by Bill Joy at the University of California at Berkeley. Bill Joy later worked at Sun Microsystems as the Chief Scientist. Vi is not a GUI (graphic user interface) mode text editor, although it still remains popular. It holds the ability...
Words: 368 - Pages: 2
...(ACL) they are on which is a set of rules or guidelines which sets the permission level and access a user will have to network assets. UNIX systems are typically based on the file access control schema, which is designed to assign a User Identification number or User ID, which is unique to the individual user. The same goes for a group of users as well but instead of a single user the users are under the Group ID umbrella, which lists all individual users and designates their permissions within the group. A user can have a different set of access within their single user permission opposed to their group permissions. Files are typically secured within UNIX file permissions and through ACLs. Other types of files such as those with sticky bits, and files that are executable require additional special security measures to be implemented in order for users to access them. Traditional UNIX file permissions are classified by ownership using three classes of users: users, groups and others. The owner of the file can usually has the ability to assign or modify file permissions. The root account can also change a file's ownership. All of the permissions are carried out by command line input by the user who owns the file and they are in charge of giving the group access. Read, write, execute and deny. For example if a UNIX Administrator had 5,000 users and wanted 4,990 to access one file...
Words: 630 - Pages: 3
...Carrier Objective: Obtaining a challenging career in the field of Information Technology as a Unix/Linux Systems Administrator to utilize the knowledge that I have gained through past years of experience in various industries such as Telecommunications, Banking, Medical, Insurrance and government establishments . Qualification Summary: 5 Years of Unix experience with overall 10+ years of experience in the field of Information technology. Master's Degree in Micro-Electronics & Diploma in Computer Sciences. Specialize in following: Unix Administration on Sun Solaris and Red Hat Linux environment. VERITAS Volume Manager and Cluster Server experience. Websphere Application Server experience Virtualization Technologies VMware ESXi 5 Large 24x7 mission-critical production environment experience. Unix Administration, maintainance providing support in an enterprise enviroment (Resolved, escalated and dispatched technical issues) Experience with EMC/Openfiler SAN,configured and Managed SAN storage for Vmware Vsphere enviroment . Communication skills in handling diversified activities like Customer Support, in various capacities from front-end field engineer to the present capacity working. Well versed with Incident resolution and Change Management process. Performing Datacenter administration ( HP/SUN Servers including C7000,M4000, M5000, T5220, T5240, V440, V480/V490, V880/V890, E4500, E6500) tasks such: Backups, restore, Tape Management, Installation, Upgradation & Decommission...
Words: 1089 - Pages: 5
...00.72314819 FM 10/24/00 9:55 AM Page i Sriranga Veeraraghavan Teach Yourself Shell Programming in 24 Hours A Division of Macmillan Computer Publishing 201 West 103rd St., Indianapolis, Indiana, 46290 USA 00.72314819 FM 10/24/00 9:55 AM Page ii Copyright 1999 by Sams Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-31481-9 Library of Congress Catalog Card Number: 98-89272 Printed in the United States of America First Printing: March 1999 01 00 99 4 3 2 1 EXECUTIVE EDITOR Jeff Koch ACQUISITIONS EDITOR Gretchen Ganser DEVELOPMENT EDITOR Hugh Vandivier TECHNICAL EDITOR Aron Hsiao MANAGING EDITOR Brice Gosnell PROJECT EDITOR Gretchen Uphoff COPY EDITORS Michael Dietsch Kelly Talbot Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams cannot attest to the accuracy...
Words: 112126 - Pages: 449
...Evolution of UNIX Evolution of UNIX Bill Stewart December 01, 2011 Marshall University CIS155: UNIX Operating System In the late 1960's computers worked entirely different than the ones that we do our work on every day. They did not talk to each other and programs written for use on one computer did not work on another. Today’s basic cell phone has more processing power and memory capabilities as computers from the 1960's. The few operating systems available at that time performed very limited tasks and were exclusive to the computer it was written on. In other words when one upgraded to a newer computer, the operating system and all data that you wanted transferred from the old computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and...
Words: 1891 - Pages: 8
...Evolution of UNIX Evolution of UNIX Bill Stewart December 01, 2011 Marshall University CIS155: UNIX Operating System In the late 1960's computers worked entirely different than the ones that we do our work on every day. They did not talk to each other and programs written for use on one computer did not work on another. Today’s basic cell phone has more processing power and memory capabilities as computers from the 1960's. The few operating systems available at that time performed very limited tasks and were exclusive to the computer it was written on. In other words when one upgraded to a newer computer, the operating system and all data that you wanted transferred from the old computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and...
Words: 1891 - Pages: 8
...The Development of UNIX that prompted the creation of the GNU Operating System and the Linux Kernel Kyle Smoot Composition 1 Ms. Christine Kirsch 11/11/2010 The Development of UNIX that prompted the creation of the GNU Operating System and the Linux Kernel Without the Massachusetts Institute of Technology (MIT), the field of Information Technology would have never seen the development of UNIX, the GNU Operating System, or the Linux Kernel. The Development of UNIX The late 1950’s saw the rapid improvement of electronics. With this, it became apparent that computers would soon be able to time-share by switching back and forth between multiple users quickly. Fernando Corbato at the Massachusetts Institute of Technology (MIT) Computation Center led a team that created one of the first multi-user operating systems called the Compatible Time-Sharing System (CTSS) which was highly influential to the development of UNIX. (Diaz, Christopher, © 2007 ) In the 1960’s, AT&T Bell Labs, General Electric, and MIT conducted a joint research effort to build a next generation multi-user operating system called the Multiplexed Information and Computing System (MULTICS). The Bell Labs staff involved with MULTICS, including Ken Thompson, Dennis Ritchie, Joe Ossanna, and M. D. McIlroy, saw great potential in a communal environment enabled by a multi-user computer system, and they started looking for a way to preserve capability. In 1969, Thompson wrote a game on MULTICS called Space...
Words: 1468 - Pages: 6
...Introduction to UNIX and Linux UNIX was developed at Bell Laboratories by Ken Thompson and Dennis Ritchie in 1969 and it was created on a minicomputer called the PDP-7. (Muse) Computer aided design, manufacturing control systems, laboratory simulations, even the Internet its self, all began life with and because of UNIX systems. (unix.org) The reason for building UNIX was to create a simple interactive operating system, called “Multics” (Multiplexed Information and Computing System). (Kioskea.net) UNIX went through growing pains through the years, but in 1991, Linus Torvalds, commenced Linux development and the distro Solaris 1.0 debuts. (unix.org) Torvalds writes “Sadly, a kernel” (which is what Linux is and has always been) “by itself gets you nowhere. To get a working system you need a shell, compliers, a library, etc.” (Moody, pg 44) “Linus Torvalds had a kernel but no programs of his own, Richard Stallman and GNU had programs but no working kernel.” (linux.org) GNU is a recursive acronym that means GNU is Not Unix. UNIX/Linux can literally be used anywhere. While completing my AAS, my final project was to build a Samba server, which I needed a Linux distro to make happen, and I went with Ubuntu. Samba is the standard Windows interoperability suite of programs for Linux and UNIX. (Samba.org) Basically, Samba makes file transfer between a Linux/Unix server, and a Windows server, seamless. To Windows, Samba looks just like another Windows server so it allowes easy file...
Words: 515 - Pages: 3
...Running head: UNIX PERMISSIONS CONTROL UNIX Permissions Control UNIX provides file permissions on several levels. By user ID group membership or association. Administrators can add delete or change file permissions. These permissions and other control information are stored in the inode. One example is FreeBSD which identifies access mode, owner, and group-access identifiers, file creation and update history. Size of file is also identified along with block pointer and block size identifying number of blocks used for file. File characteristics with user settable flags and kernel are identified too. Generation number and file system block size are also identified. UNIX utilizes a file access control scheme developed in earlier versions. Users are identified by typical user identification through number assignment. Users are also assigned to a primary group and maybe other groups too. This is done through the use of a group ID. Upon file creation these relationships are established. The owner ID and group ID are contained with 12 protection bits in the inode. Nine of the 12 bits establish read, write and execute permissions. At the directory level this grants read, renaming, and delete capabilities. Utilizing the execute bit the right to search the directory is accomplished. The remaining three bits are utilized to set user ID (SETUID) and group ID’s (SETGID) (Stallings, 2012, 558). When users with execute privileges access a...
Words: 510 - Pages: 3
...ABSTRACT Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted. Programmers originally built the Unix operating system for other programmers to use. It is an extensible operating system, meaning it allows programmers to extend and change it to do anything they need it to. Essentially, it is built to multitask. It allows multiple users to use the same app or multiple users access to the same file. Although the computer cannot process all the requests at once, it does prioritize the requests to keep things orderly. If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The...
Words: 687 - Pages: 3
...* * * Benefits and Disadvantages of UNIX® or Linux® Versus Microsoft® Windows Server® Virtual Company: Riordan Kenneth Fleming, Eddy Garcia, H. RaShonda Harris, Lupita Sebastian and John Ward University of Phoenix – POS 420 Introduction to UNIX September 19, 2012 Introduction History Riordan Manufacturing is a global plastics manufacturer who employs over 500 people with projected annual earnings of $46 million. Riordan's major clientele include automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences...
Words: 2022 - Pages: 9
...Unix/Windows Systems Review for Riordan Manufacturing Micah Gerber POS/420 December 21, 2012 Charles Mathieu Abstract Riordan Manufacturing is the leader in the plastic injection molding industry with facilities in both the United States and China. As a large global operation, having adequate systems in place to support the organization network and databases is of upmost importance. A critique which addresses the benefits and disadvantages of using UNIX or Linux versus Microsoft Windows Server within Riordan Manufacturing will be completed by Team A. Areas to be addressed within the critique will cover security, administration, networking, performance, programmability, and reliability as it relates to UNIX or Linux and Microsoft Windows Server. Riordan Manufacturing currently has a combination of Unix and Windows servers which support the organization, however, the team will recommend that the organization standardize it’s systems to support one platform across the agency. Through this recommendation Riordan’s Manufacturing infrastructure will have one platform Security Review The histories of both Windows and UNIX security development have taken diametric paths. The Windows operating system (OS) is monolithic by design, which means that most of the features are integrated into a single unit and is located into the core of the OS. UNIX, on the other hand is based on the core of the operating systems residing in a distributed manner where...
Words: 1893 - Pages: 8
...Unix / Linux vs. Microsoft Windows Server Student Name Goes Here Class Number Goes Here Due Date Goes Here Professor Name Goes Here Unix / Linux vs. Microsoft Windows Server Introduction Pace Glass Company is a global cutting, polishing and bending company with operating facilities in two U.S. cities. Pace Glass Company's major clientele include RV manufacturers, specialty car manufacturers, automotive parts manufacturers, aircraft manufacturers, appliance manufacturers and most prestigiously N.A.S.A. With manufacturing plants in Southwest Michigan and Northwest Ohio, Pace Glass Company's online business plays a vital role in continued growth and as such there is heavy consideration underway as to which type of computer operating base the company upgrades will be implemented against. Pace Glass executives and partners recognize that security and reliability are key to the continued growth in their online presence which plays a substantial role in system determination. Purpose The purpose of this study is to discuss the differences between Unix, Linux and Microsoft Windows and server environments. This study will discuss facts that cover security, administrative, networking, performance, programmability as well as provide a briefing in conclusion. Security Approach A fundamental difference between the Unix approach to system security and the Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design...
Words: 2110 - Pages: 9