Linux basics

Information Security and Cyber Forensics Professional ( BE, CHFI,CEH,CCI, RHCSA, PGDBA)
28 de Jun de 2012
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
Linux basics
1 de 61

Más contenido relacionado

La actualidad más candente

Introduction to linuxIntroduction to linux
Introduction to linuxStephen Ahiante
Linux seminarLinux seminar
Linux seminarBuntha Chhay
Linux OS presentationLinux OS presentation
Linux OS presentationSahilGothoskar
Linux pptLinux ppt
Linux pptlincy21
Lesson 2 Understanding Linux File SystemLesson 2 Understanding Linux File System
Lesson 2 Understanding Linux File SystemSadia Bashir
Linux command pptLinux command ppt
Linux command pptkalyanineve

Destacado

GuassvirusGuassvirus
GuassvirusSantosh Khadsare
Linux Kernel ImageLinux Kernel Image
Linux Kernel Image艾鍗科技
智能風扇智能風扇
智能風扇艾鍗科技
Android is NOT just 'Java on Linux'Android is NOT just 'Java on Linux'
Android is NOT just 'Java on Linux'Tetsuyuki Kobayashi
ToolchainToolchain
ToolchainAnil Kumar Pugalia
Linux Kernel OverviewLinux Kernel Overview
Linux Kernel OverviewAnil Kumar Pugalia

Similar a Linux basics

Linux [2005]Linux [2005]
Linux [2005]Raul Soto
Linux for everyoneLinux for everyone
Linux for everyonePradeep Shankhwar
Introduction to linuxIntroduction to linux
Introduction to linuxPrasanth V
Linux Linux
Linux Teja Babu
Ibm system programming training   module 2 - linux basicsIbm system programming training   module 2 - linux basics
Ibm system programming training module 2 - linux basicsBinsent Ribera
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfEidTahir

Más de Santosh Khadsare

Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)Santosh Khadsare
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSSantosh Khadsare
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
Linux forensicsLinux forensics
Linux forensicsSantosh Khadsare
Network forensics1Network forensics1
Network forensics1Santosh Khadsare
WindowsforensicsWindowsforensics
WindowsforensicsSantosh Khadsare

Último

Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratorenpanagenda
How resolve Gem dependencies in your code?How resolve Gem dependencies in your code?
How resolve Gem dependencies in your code?Hiroshi SHIBATA
Advancing Equity and Inclusion for Deaf Students in Higher EducationAdvancing Equity and Inclusion for Deaf Students in Higher Education
Advancing Equity and Inclusion for Deaf Students in Higher Education3Play Media
Webhook Testing StrategyWebhook Testing Strategy
Webhook Testing StrategyDimpy Adhikary
Getting your enterprise ready for Microsoft 365 CopilotGetting your enterprise ready for Microsoft 365 Copilot
Getting your enterprise ready for Microsoft 365 CopilotVignesh Ganesan I Microsoft MVP
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso

Linux basics

Notas del editor

  1. This PowerPoint presentation goes in conjunction with my Introduction to Linux Forensics paper.
  2. -Distributions such as Mandrake and Novell’s SuSE are much more GUI oriented, with friendlier installations than previous versions. Arguably easier than Windows to install now. -Apple OS now traces its roots to an operating system called OpenBSD, which is a form of Unix. -IBM, Adobe, Novell, and more -PDA’s, your cell phone, home alarm systems.
  3. Root Directory ( / ) Top of the file system . Similar to \\ in DOS /bin Contain the binary (executable code) of most essential Linux commands , e.g. bash, cat, cp, ln, ls, etc. /boot Contain all the files needed to boot the Linux system , including the binary of the Linux kernel. E.g., on Red Hat Linux 6.1, the kernel is in /boot/vmlinux-2.2.5-15 file /dev Contain the special files for devices, e.g. fd0, hd0, etc.
  4. The Motherboard BIOS Triggers the Video Display Card BIOS Initialization, Motherboard BIOS Initializes Itself, Disk Controllers Initialize, Hardware Summary, Master Boot Record on the first hard disk is read. (http://ourworld.compuserve.com/homepages/KanjiFlash/BPTour.htm) Common boot loaders include LILO and grub[ GNU GRUB (short for GNU GRand Unified Bootloader)]. The kernel has the capability to accept information at boot in the form of a `command line', similar to an argument list you would give to a program. In general this is used to supply the kernel with information about hardware parameters that the kernel would not be able to determine on its own, or to avoid/override the values that the kernel would otherwise detect. It is the job of the boot loader to take this information from the user and put it in a previously agreed upon place where the kernel can find it once it starts. (http://www.tldp.org/HOWTO/BootPrompt-HOWTO.html#toc3) Processor, Console, Memory init. PCI Bus Init. Network Init. The kernel idle thread (Process 0) is started. Device drivers init (parallel port, serial port, block device access including loop, floppy), SCSI bus init, Network Protocol Init, Fixed Disk examination and arrangement. (http://ourworld.compuserve.com/homepages/KanjiFlash/BPTour.htm) Init Program (Process 1) runs, and basically kicks off any initialization programs or applications. This includes start-up specific application processes, such as power management, terminal interfaces, utilities to verify the integrity of file systems, printer daemon, etc. Bash shell gives you a command prompt to begin executing commands from. After Bash, Linux may load a window manager such as KDE or Gnome. This is similar to Windows, where after the Windows splash screen, it loads into a GUI and eventually you are asked for a name and password (or dumped to your desktop). The difference being, Linux offers a choice of window managers.