SlideShare una empresa de Scribd logo
1 de 21
Introduction to LinuxIntroduction to Linux
Operating SystemOperating System
What is LinuxWhat is Linux
• Linux is a true 32 bit UNIX-like OS developed
originally for home PCs, but now it runs on a variety
of platforms including PowerPC, Macintosh, Amiga,
DEC Alpha, Sun Sparc, ARM, and many others. The
source code for Linux is freely available to everyone.
Linux was created by Linus Torvalds in 1991, and it
has been developed with the help of many
programmers across the Internet. Now it has
evolved into a very functional, powerful and usable
clone of Unix which has at least 10 million users
worldwide.
Why LinuxWhy Linux
• A Linux Distribution has thousands of dollars worth
of software for no cost.
• Linux is a complete operating system:
o stable - the crash of an application is much less likely to bring
down the OS under Linux.
o Reliable - Linux servers are often up for hundreds of days
compared with the regular reboots required with a Windows
system.
o extremely powerful
• Linux provides a complete development
environment.
Why Linux (continued)Why Linux (continued)
• Excellent networking facilities
• Ideal environment to run servers such as a web
server, or an ftp server.
• A wide variety of commercial software is available if
not satisfied by the free software
• Easily upgradeable.
• Supports multiple processors.
• True multi-tasking, multi-user OS.
• An excellent window system called X, the equivalent
of Windows but much more flexible.
• Full source code is provided and free.
The Linux SystemThe Linux System
• The Linux system excel in many area, ranging from
end user concerns such as stability, speed, ease of
use, to serious concerns such as development and
networking.
o Linux kernel
o Linux networking
o Linux file system
Linux KernelLinux Kernel
• The kernel is the central nervous system of Linux,
include OS code which runs the whole computer.
It provides resources to all other programs that
you run under Linux, and manages all other
programs as they run.
o The kernel includes the code that performs certain specialized
tasks, including TCP/IP networking.
o The kernel design is modular, so that the actual OS code is
very small to be able to load when it needs, and then free the
memory afterwards, thus the kernel remains small and fast
and highly extensible.
Linux NetworkingLinux Networking
• Networking comes naturally to Linux. In a real sense,
Linux is a product of the Internet or World Wide Web
(www).
• Linux is made for networking. Probably all
networking protocols in use on the Internet are
native to Unix and/or Linux. A large part of the Web
is running on Linux boxes, e.g. : AOL
Networking protocolsNetworking protocols
• The Linux kernel supports several networking
protocols:
o TCP/IP - Transport Control Protocol/Internet Protocol
• IP is the primary network protocol supported by Linux
o IPX - Internetwork Packet Exchange
o Applettalk DDP
o Amateur Radio AX.25 Level 2
Supported FeaturesSupported Features
• Forwarding
• Firewall operations
• Proxy and Masquerading
• Accounting
• Tunneling and Intranets
• Aliasing
Linux File SystemLinux File System
• Linux has an hierarchical, unified file system
• Supports 256-character filenames.
• All command line entries are case sensitive.
• Use the slash(/) rather than the backslash() you
have been using in DOS.
Types of FileTypes of File
• Ordinary files
o text files
o data files
o command text files
o executable files
• directories
• links
o rather than having multiple copies of a file, Linux uses linking to
one file to save disk space.
• special device files
SecuritySecurity
• Encryption
• Secure shell(ssh)
• Principles of security
EncryptionEncryption
• Encryption commonly used to secure data. It is
the ancient technique of hiding information in
plain sight. Include:
o strong encryption - is stronger than the 40-bit encryption
maximum that can be exported from the United States under
U.S. law.
o Public-key Encryption - is a type of asymmetric encryption,
which is a system that you encrypt your message with one
key, and the recipient decrypts it with a mathematically
related, but different key.
The Secure Shell(ssh)The Secure Shell(ssh)
• The ssh and its tools use strong encryption to allow
remotely located systems to exchange data
securely.
• By using strong encryption, ssh significantly
enhances the security of both the authentication
process and the session itself.
Principles of securityPrinciples of security
• Two broad categories of attack exist:
o unauthorized access
o denial of service
• Defense against the attacks:
o enforce the use of password
o use TCP wrappers to limit which resources are made available
to which categories of users.
o monitor internal users, protect your organization against
unauthorized or inappropriate use of the computer facilities to
harass personnel.
Linux vs. UnixLinux vs. Unix
• Linux is free, but Unix is not.
• Unix is compatible with Linux at the system call level,
meaning most programs written for either Unix or
Linux can be recompiled to run on the other system
with a minimum of work. But Linux will run faster than
Unix on the same hardware.
Linux vs. MicrosoftLinux vs. Microsoft
WindowsWindows
• Both offer some of the graphics capabilities and
include some networking capabilities. But Linux
networking is excellent.
• Linux is multi-user, multi-tasking, but Microsoft
Windows doesn’t support it.
Linux vs. Windows NTLinux vs. Windows NT
• Linux needs 2MB RAM to try out, while NT needs 12 MB
• Linux needs at least 15 MB disk space, while NT needs 70 MB at
least.
• Both system support multitasking
• Both system support multiprocessing.
• Both system support dynamic cache.
• Linux has full multi user support. Local users, modem users, and
network users can all simultaneously run text and graphics
programs. This is a powerful feature for business environments that
is unmatched by NT.
Linux vs.WindowsLinux vs.Windows
NT(continued)NT(continued)
• The issue of size is a great strength for Linux. It was
designed to be as small and efficient as possible. NT’s
most important criterion was portability.
• Linux was built on the Internet, and hence has better
support for networking then NT.
• Most software packages that run on Linux have their
source code available, security problems are found and
solved many times quicker then with NT.
ThankThank You !!!You !!!
For More Information click below link:
Follow Us on:
http://linuxcoursetraining.vibranttechnologies.co.in/linux-classes-in-
mumbai.html

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Introduction to Linux basic
Introduction to Linux basicIntroduction to Linux basic
Introduction to Linux basic
 
Linux history & features
Linux history & featuresLinux history & features
Linux history & features
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
 
History of linux
History of linuxHistory of linux
History of linux
 
Linux
Linux Linux
Linux
 
Linux
LinuxLinux
Linux
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Linux presentation
Linux presentationLinux presentation
Linux presentation
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
 
Linux
Linux Linux
Linux
 
Linux
LinuxLinux
Linux
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Introduction to Ubuntu
Introduction to UbuntuIntroduction to Ubuntu
Introduction to Ubuntu
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting Process
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 

Destacado

Presentation on Android operating system
Presentation on Android operating systemPresentation on Android operating system
Presentation on Android operating systemSalma Begum
 
A general Overview of linux !!
A general Overview of linux !!A general Overview of linux !!
A general Overview of linux !!jainema23
 
ppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATELppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATELneo_patel
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating SystemsSinbad Konick
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux osjoycoronado
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsBrendan Gregg
 

Destacado (12)

Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
 
Presentation on Android operating system
Presentation on Android operating systemPresentation on Android operating system
Presentation on Android operating system
 
Planning
PlanningPlanning
Planning
 
Linux
LinuxLinux
Linux
 
Linux
LinuxLinux
Linux
 
A general Overview of linux !!
A general Overview of linux !!A general Overview of linux !!
A general Overview of linux !!
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 
ppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATELppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATEL
 
Linux Os
Linux Os Linux Os
Linux Os
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating Systems
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
 

Similar a Linux - Introductions to Linux Operating System

Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonHariharan Ganesan
 
Linux [2005]
Linux [2005]Linux [2005]
Linux [2005]Raul Soto
 
Basics of Linux
Basics of LinuxBasics of Linux
Basics of LinuxNayan Seth
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systemsVandana Salve
 
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfEidTahir
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computersgyanikashukla
 
Introduction, Features, Basic Commands and Distribution of LINUX
Introduction, Features, Basic Commands and Distribution of LINUXIntroduction, Features, Basic Commands and Distribution of LINUX
Introduction, Features, Basic Commands and Distribution of LINUXDeeksha Verma
 
Linux – an introduction
Linux – an introductionLinux – an introduction
Linux – an introductionWingston
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.pptgadisaAdamu
 
Hillel kobrovski Linux security overview for ciso
Hillel kobrovski   Linux security overview for cisoHillel kobrovski   Linux security overview for ciso
Hillel kobrovski Linux security overview for cisoHillel Kobrovski
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - OverviewAshita Agrawal
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system pptAchyut Sinha
 

Similar a Linux - Introductions to Linux Operating System (20)

Linux basics
Linux basicsLinux basics
Linux basics
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
Linux [2005]
Linux [2005]Linux [2005]
Linux [2005]
 
Linux for everyone
Linux for everyoneLinux for everyone
Linux for everyone
 
Basics of Linux
Basics of LinuxBasics of Linux
Basics of Linux
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
 
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdfintroductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
introductiontolinuxpptbatch2-141025005514-conversion-gate01 (1).pdf
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
Introduction, Features, Basic Commands and Distribution of LINUX
Introduction, Features, Basic Commands and Distribution of LINUXIntroduction, Features, Basic Commands and Distribution of LINUX
Introduction, Features, Basic Commands and Distribution of LINUX
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Licão 01 introduction
Licão 01 introductionLicão 01 introduction
Licão 01 introduction
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
Linux
LinuxLinux
Linux
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
The Linux System
The Linux SystemThe Linux System
The Linux System
 
Linux – an introduction
Linux – an introductionLinux – an introduction
Linux – an introduction
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.ppt
 
Hillel kobrovski Linux security overview for ciso
Hillel kobrovski   Linux security overview for cisoHillel kobrovski   Linux security overview for ciso
Hillel kobrovski Linux security overview for ciso
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 

Más de Vibrant Technologies & Computers

Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.Vibrant Technologies & Computers
 

Más de Vibrant Technologies & Computers (20)

Buisness analyst business analysis overview ppt 5
Buisness analyst business analysis overview ppt 5Buisness analyst business analysis overview ppt 5
Buisness analyst business analysis overview ppt 5
 
SQL Introduction to displaying data from multiple tables
SQL Introduction to displaying data from multiple tables  SQL Introduction to displaying data from multiple tables
SQL Introduction to displaying data from multiple tables
 
SQL- Introduction to MySQL
SQL- Introduction to MySQLSQL- Introduction to MySQL
SQL- Introduction to MySQL
 
SQL- Introduction to SQL database
SQL- Introduction to SQL database SQL- Introduction to SQL database
SQL- Introduction to SQL database
 
ITIL - introduction to ITIL
ITIL - introduction to ITILITIL - introduction to ITIL
ITIL - introduction to ITIL
 
Salesforce - Introduction to Security & Access
Salesforce -  Introduction to Security & Access Salesforce -  Introduction to Security & Access
Salesforce - Introduction to Security & Access
 
Data ware housing- Introduction to olap .
Data ware housing- Introduction to  olap .Data ware housing- Introduction to  olap .
Data ware housing- Introduction to olap .
 
Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.
 
Data ware housing- Introduction to data ware housing
Data ware housing- Introduction to data ware housingData ware housing- Introduction to data ware housing
Data ware housing- Introduction to data ware housing
 
Salesforce - classification of cloud computing
Salesforce - classification of cloud computingSalesforce - classification of cloud computing
Salesforce - classification of cloud computing
 
Salesforce - cloud computing fundamental
Salesforce - cloud computing fundamentalSalesforce - cloud computing fundamental
Salesforce - cloud computing fundamental
 
SQL- Introduction to PL/SQL
SQL- Introduction to  PL/SQLSQL- Introduction to  PL/SQL
SQL- Introduction to PL/SQL
 
SQL- Introduction to advanced sql concepts
SQL- Introduction to  advanced sql conceptsSQL- Introduction to  advanced sql concepts
SQL- Introduction to advanced sql concepts
 
SQL Inteoduction to SQL manipulating of data
SQL Inteoduction to SQL manipulating of data   SQL Inteoduction to SQL manipulating of data
SQL Inteoduction to SQL manipulating of data
 
SQL- Introduction to SQL Set Operations
SQL- Introduction to SQL Set OperationsSQL- Introduction to SQL Set Operations
SQL- Introduction to SQL Set Operations
 
Sas - Introduction to designing the data mart
Sas - Introduction to designing the data martSas - Introduction to designing the data mart
Sas - Introduction to designing the data mart
 
Sas - Introduction to working under change management
Sas - Introduction to working under change managementSas - Introduction to working under change management
Sas - Introduction to working under change management
 
SAS - overview of SAS
SAS - overview of SASSAS - overview of SAS
SAS - overview of SAS
 
Teradata - Architecture of Teradata
Teradata - Architecture of TeradataTeradata - Architecture of Teradata
Teradata - Architecture of Teradata
 
Teradata - Restoring Data
Teradata - Restoring Data Teradata - Restoring Data
Teradata - Restoring Data
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Linux - Introductions to Linux Operating System

  • 1.
  • 2. Introduction to LinuxIntroduction to Linux Operating SystemOperating System
  • 3. What is LinuxWhat is Linux • Linux is a true 32 bit UNIX-like OS developed originally for home PCs, but now it runs on a variety of platforms including PowerPC, Macintosh, Amiga, DEC Alpha, Sun Sparc, ARM, and many others. The source code for Linux is freely available to everyone. Linux was created by Linus Torvalds in 1991, and it has been developed with the help of many programmers across the Internet. Now it has evolved into a very functional, powerful and usable clone of Unix which has at least 10 million users worldwide.
  • 4. Why LinuxWhy Linux • A Linux Distribution has thousands of dollars worth of software for no cost. • Linux is a complete operating system: o stable - the crash of an application is much less likely to bring down the OS under Linux. o Reliable - Linux servers are often up for hundreds of days compared with the regular reboots required with a Windows system. o extremely powerful • Linux provides a complete development environment.
  • 5. Why Linux (continued)Why Linux (continued) • Excellent networking facilities • Ideal environment to run servers such as a web server, or an ftp server. • A wide variety of commercial software is available if not satisfied by the free software • Easily upgradeable. • Supports multiple processors. • True multi-tasking, multi-user OS. • An excellent window system called X, the equivalent of Windows but much more flexible. • Full source code is provided and free.
  • 6. The Linux SystemThe Linux System • The Linux system excel in many area, ranging from end user concerns such as stability, speed, ease of use, to serious concerns such as development and networking. o Linux kernel o Linux networking o Linux file system
  • 7. Linux KernelLinux Kernel • The kernel is the central nervous system of Linux, include OS code which runs the whole computer. It provides resources to all other programs that you run under Linux, and manages all other programs as they run. o The kernel includes the code that performs certain specialized tasks, including TCP/IP networking. o The kernel design is modular, so that the actual OS code is very small to be able to load when it needs, and then free the memory afterwards, thus the kernel remains small and fast and highly extensible.
  • 8. Linux NetworkingLinux Networking • Networking comes naturally to Linux. In a real sense, Linux is a product of the Internet or World Wide Web (www). • Linux is made for networking. Probably all networking protocols in use on the Internet are native to Unix and/or Linux. A large part of the Web is running on Linux boxes, e.g. : AOL
  • 9. Networking protocolsNetworking protocols • The Linux kernel supports several networking protocols: o TCP/IP - Transport Control Protocol/Internet Protocol • IP is the primary network protocol supported by Linux o IPX - Internetwork Packet Exchange o Applettalk DDP o Amateur Radio AX.25 Level 2
  • 10. Supported FeaturesSupported Features • Forwarding • Firewall operations • Proxy and Masquerading • Accounting • Tunneling and Intranets • Aliasing
  • 11. Linux File SystemLinux File System • Linux has an hierarchical, unified file system • Supports 256-character filenames. • All command line entries are case sensitive. • Use the slash(/) rather than the backslash() you have been using in DOS.
  • 12. Types of FileTypes of File • Ordinary files o text files o data files o command text files o executable files • directories • links o rather than having multiple copies of a file, Linux uses linking to one file to save disk space. • special device files
  • 13. SecuritySecurity • Encryption • Secure shell(ssh) • Principles of security
  • 14. EncryptionEncryption • Encryption commonly used to secure data. It is the ancient technique of hiding information in plain sight. Include: o strong encryption - is stronger than the 40-bit encryption maximum that can be exported from the United States under U.S. law. o Public-key Encryption - is a type of asymmetric encryption, which is a system that you encrypt your message with one key, and the recipient decrypts it with a mathematically related, but different key.
  • 15. The Secure Shell(ssh)The Secure Shell(ssh) • The ssh and its tools use strong encryption to allow remotely located systems to exchange data securely. • By using strong encryption, ssh significantly enhances the security of both the authentication process and the session itself.
  • 16. Principles of securityPrinciples of security • Two broad categories of attack exist: o unauthorized access o denial of service • Defense against the attacks: o enforce the use of password o use TCP wrappers to limit which resources are made available to which categories of users. o monitor internal users, protect your organization against unauthorized or inappropriate use of the computer facilities to harass personnel.
  • 17. Linux vs. UnixLinux vs. Unix • Linux is free, but Unix is not. • Unix is compatible with Linux at the system call level, meaning most programs written for either Unix or Linux can be recompiled to run on the other system with a minimum of work. But Linux will run faster than Unix on the same hardware.
  • 18. Linux vs. MicrosoftLinux vs. Microsoft WindowsWindows • Both offer some of the graphics capabilities and include some networking capabilities. But Linux networking is excellent. • Linux is multi-user, multi-tasking, but Microsoft Windows doesn’t support it.
  • 19. Linux vs. Windows NTLinux vs. Windows NT • Linux needs 2MB RAM to try out, while NT needs 12 MB • Linux needs at least 15 MB disk space, while NT needs 70 MB at least. • Both system support multitasking • Both system support multiprocessing. • Both system support dynamic cache. • Linux has full multi user support. Local users, modem users, and network users can all simultaneously run text and graphics programs. This is a powerful feature for business environments that is unmatched by NT.
  • 20. Linux vs.WindowsLinux vs.Windows NT(continued)NT(continued) • The issue of size is a great strength for Linux. It was designed to be as small and efficient as possible. NT’s most important criterion was portability. • Linux was built on the Internet, and hence has better support for networking then NT. • Most software packages that run on Linux have their source code available, security problems are found and solved many times quicker then with NT.
  • 21. ThankThank You !!!You !!! For More Information click below link: Follow Us on: http://linuxcoursetraining.vibranttechnologies.co.in/linux-classes-in- mumbai.html