Found 2066 Articles for Operating System

Requirements of Linux System Administrator

Pranavnath
Updated on 23-Nov-2023 09:01:41

572 Views

Linux is a type of operating system that is used in many computers that acts as a common platform between hardware and software applications. It is not only implemented in computers but also in mobile phones, laptops, and tab. Linux OS can be installed and used for free as it comes under Open source. The Linux System Administrator is a position in Information Technology (IT) companies in the backend to maintain and install the Linux operating system in different computers for the workflow of the respective organization. So certain requirements of the Linux System administrator are needed and are discussed ... Read More

Protection ring

Pranavnath
Updated on 23-Nov-2023 08:42:59

131 Views

The operating system functions on different layers and each of them has its privileges. These privileges are mentioned using a protection ring that is used for sharing resources and the hardware systems, that manage the resources stored in the computer system like CPU processing time and memory access time. Protection rings are arranged in a hierarchical order from most trusted to least trusted privilege. The central ring at the kernel level can access all resources and has the highest privilege whereas the subsequent layers have a lesser level of access permissions. This mechanism is hardware imposed by the architecture of ... Read More

Protection in OS: Domain of Protection, Association, Authentication

Pranavnath
Updated on 23-Nov-2023 08:41:45

140 Views

The Operating system manages various application programs that are loaded into the memory after booting the system. The operating system offers security methods to protect the process from other processes and unauthorized access from outside resources manages the resources from both logical and physical address spaces which include CPU, internal memory, or disk area. Protection mechanisms should be provided for these resources to assure confidentiality and integrity factors. Users can directly access the applications in the operating system with the help of a Graphical user Interface or a Command Line Interface. Protection in OS When multiple users access resources ... Read More

Rate-monotonic scheduling

Pranavnath
Updated on 23-Nov-2023 08:40:51

337 Views

Rate monotonic scheduling is used in real-time operating systems and it is a priority assignment that provides a priority scheduling class. This algorithm assigns the task which has the minimum period will be given the higher priority. So, this algorithm is said a fixed priority algorithm, the time given to the task will not change and this in turn will not change the priority over time. All these priorities will not change over time as they are decided before beginning the execution process. It is a preemptive algorithm where the current process is preempted when another process with higher priority ... Read More

Race Condition Vulnerability

Pranavnath
Updated on 23-Nov-2023 08:39:53

81 Views

The conventional way of executing the process involves single threads, so the chances of malfunction are less when compared to multiple threads. When multiple threads or process occurs then there may be mixing or change in order of the tasks performed. Similarly, when some particular action or program is read and written at the same time, then the “Race Condition” occurs. This Race condition is a security threat to the system which leads to data corruption or loss of data. Race Condition Vulnerabilities It involves running multiple threads, the multiple threads means when many processes run at the same time ... Read More

Puppy Linux Operating System

Pranavnath
Updated on 23-Nov-2023 08:39:07

97 Views

Puppy Linux is a version of the Linux operating system which is created for small, portable, and versatile usage for home user systems. It has been developed by Barry Kauler in the year June 2003. The complete package of the system can be operated with 300MB for 32-bit and 600MB for 64-bit operating systems. Initially, it was developed to support minimum storage to run all the Linux configurations and later it contains all the standard user applications with inbuilt ISO downloaded to the system. Puppy OS takes size as the major factor to provide hardware and memory support to personal ... Read More

Protection in File System

Pranavnath
Updated on 23-Nov-2023 08:37:11

140 Views

The file system is defined as the process of storing the user’s data in the computer operating system. This data can be stored in primary memory or secondary memory devices to store and retrieve information. The File is represented in terms of bits, bytes, or any records that can be defined by the author of the file. Each file has a logical address or location which is used for storing and retrieval process. Without the use of an organized hierarchy in file directories, selecting an individual file that is isolated is a tedious task from the user's end. File system configuration ... Read More

Progress of a Process

Pranavnath
Updated on 22-Nov-2023 18:19:04

68 Views

In an operating system, the Process involves changing from one state to another state according to the specific condition such as the CPU, Input/output devices, and the user. There are some states available in the operating system such as new, waiting, ready, running, suspend ready or suspend wait. Progress can be seen through these process states to reach the destination. Progress of a process is one of the solutions to the critical section problem. The critical section affects the progress of a process when multiple processes are allowed in a system. Progress of a Process in the Operating System A Process in ... Read More

Webmin Alternatives

Shirjeel Yunus
Updated on 26-Sep-2023 15:12:55

432 Views

What is Webmin? Webmin is a system administration tool that can be accessed through a web browser. it is used to administer UNIX and Linux systems, servers, and services. Many things in the operating system can be configured through this app. Some of them include users, disk quotas, configuration files, and many more. The platform can also be used to make changes in different open-source apps like BIND DNS Server, PHP, Apache HTTP Server, etc. Why Webmin alternatives? Webmin has security issues and it is necessary to install frequent updates Less number of features are available Additional repositories are ... Read More

Preserve Linebreaks When Storing Command Output to a Variable

Prateek Jangid
Updated on 13-Sep-2023 10:41:44

299 Views

In Linux, command substitution allows a user to use the output of a command as an argument for other commands. Here you can substitute all commands that can write standard output. Moreover, you can use the command substitution to create a shell script and save the command's output as a variable. Some of the output consists of multiple lines, so the output may not appear in the same pattern when you perform command substitution. When you don't use the proper shell variable, the output shows in a single line, i.e., without preserving the linebreaks. In this tutorial, we will look ... Read More

1 2 3 4 5 ... 207 Next
Advertisements