.

Friday, March 1, 2013

Pos420 Week2 Dqs

1.What is the relationship between Linux® and UNIX®? How has their relationship evolved over time? What similarities and differences atomic number 18 seen between them?

Linux OS is a derivative of the Unix OS. The Linux OS descend momentum through its progressive licensing which allow others to increase growing with the OS. With overwhelming popularity from the creation of Linux OS, Unix OS reintroduce itself again. The functionality of both UNIX and Linux is rattling similar by both establishments able to multitask, both systems argon able to run on a variety of ironwargon platforms, and both are capable to use a play line. Linux is different through user friendly OS and by GUI.

2.How can accuse licences be used to establish system security? What effect does this have on the UNIX® or Linux® direct system?

File permissions is used by allowing individual users and groups rise to power to files based on a set of security settings for distributively file and directory.

Linux uses a system of user IDs and group IDs to cherish access to files, directories, and devices. Linux stores breeding about user accounts in the /etc/passwd file, and information about groups in the /etc/group file. Each user is charge a unique numeric user ID, along with a text edition login name to identify the user in the system.

Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!

Groups are also assigned unique numerical group IDs, and text group names. A group can contain whiz or more users to allowed shared access to system resources.
Linux uses a complicated system of bits to determine access permissions for files and directories. Each file contains ternion security levels of protection: the files owner, a default group that has access to the file, and a level for everyone else on the system. Each security level is defined by three access bits: read, write, and execute. The combination of three bits is often referred to by the symbols rwx, for read, write, and execute. If permission is denied, its symbol is replaced with a dash (such as r-- for read-only permission).If you want to stick to a full essay, order it on our website: Ordercustompaper.com



If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment