University of Phoenix Material UNIX® and Linux® Comparison Matrix Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column. UNIX® or Linux® operating system version: Fedora Components Role of shell Provide a friendly command line with some built in commands Three features and roles of each feature Security: firewall tools provided and a applet task bar to alert you to an application that is in violation of security. Shell: Gnome environment friendly to use with easy to use function much like a pc. Rescue feature: This feature is in the disk that comes with the program.
The operating system loads itself into memory and begins managing the resources available on the computer. It then provides those resources to other applications that the user wants to execute. * A task scheduler * A memory manager * A disk manager * A network manager * Other I/O services manager * Security manager The Linux kernel, created by Linus Torvalds, was made available to the world for free. Because it is free and runs on PC platforms, it gained a sizeable audience among hard-core developers very quickly. Linux has a dedicated following and appeals to several different kinds of people: * People who already know UNIX and want to run it on PC-type hardware * People who want to experiment with operating system principles * People who need or want a great deal of control over their operating system * People who have personal problems with Microsoft * In general, Linux is harder to manage than something like Windows, but offers more flexibility and configuration options.
Increase fault tolerance by splitting DHCP scopes. 2. Balance the load on your DHCP server by using the 80/20 rule for scopes 3. Allow remote administration of DHCP servers by comfiguring windows Firewall ports. | Question 4 | What is the name of the computer you are working from?
5. What does the Skipfish application do and why is it a good security tool for web servers and web application testing? Skipfish application is an open source web app and a fully automated security reconnaissance tool. It is a good security tool because it can perform security and vulnerability tests. 6.
List and describe in detail four advantages of Linux. 4. List three examples of different hardware platforms onto what Linux has been ported. Apple, Compaq’s, Alpha-based machines, Motorola’s 68k-based machines, various 64-bit systems, and IBM’s S/390x 5. What are the minimum system requirements for fedora 15 with the GUI installed?
The df utility displays all mounted filesystems along with information about each. Use the df utility with the –h (human-readable) option to answer the following questions. a. How many filesystems are mounted on your Linux system? b.
By proper end user training for anyone involved with the Corporate Techs site, proper scanning of all USB and thumb drives on a test computer being used for this particular site, can mitigate threats from bugs and viruses. Also, by changing all local computer default autorun policies, will disable usage of these USB ports and stop an occurrence from taking place. Last, it’s almost near impossible for an end user to not use a personal laptop during work hours for personal use or for work. But to mitigate further problems from happening, I will implement an encrypted file system for sensitive data. TrueCrypt is a program that I have found efficient that controls over endpoints that enter and exit the internal system.
University of Phoenix Material NOTE: This assignment is three pages in length File Processing Commands and Linux Directory Log Worksheet From:Matthew Kirkland Date:06/15/2012 Physical Memory | Within your Linux environment, what UID and PID have the highest amount of physical memory that a process is using? Show all information for that one process. Hint: Use the `ps` command with the proper options to provide output sorted by the amount of physical memory used by each process. Note: The answer to this question does NOT involve the `top` command. Use the `ps` command and the proper options.
I believe the best approach for this company would be to have everything done electronically, since we don’t need a very big office space due to patients being seen in their homes we can save on space and paperwork by installing Electronic Health Record system or as most of us call it today EHR. “EHRs are computerized systems that store and provide access to patient-specific clinical data. Separate kinds of EHRs support hospitals and physician practices. There are many types of EHRs for physician practices; some require a server be physically located at the practice. Others use servers that are based remotely and accessed via a private network or a secure internet connection.
This comparison of the Unix and Microsoft NT/Win2K/XP operating systems is written from the point of view of one technical user - someone who spends some time with system administration, some with scientific and database application programming, and the remainder doing documentation, e-mail, web browsing, and following a small number of news groups. Like many over the last few years, I've watched Microsoft's push from the desktop into the server market in particular with some misgivings. Probably the greatest fear of all has been the implicit threat to open standards. The networking aspects of commercial unix (SunOS, Solaris, HP-UX, AIX, Linux etc) have always rested on a solid foundation of the freely available RFCs (Requests For Comment). And because the free 'nixes such as Linux (GNU), FreeBSD, and so on, are available in source form, they're completely open by definition.