Upload
creative-technology
View
350
Download
4
Embed Size (px)
DESCRIPTION
A presentation of a small talk on technology given in my college given by me.
Citation preview
OOPSOut of Present
Syllabus
Operating system (O.S)
An operating system (OS) is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system. A user cannot run an application program on the computer without an operating system, unless the application program is self booting.
Operating Systems Services
Following are the five services provided by an operating systems
1] Program ExecutionThe purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems.
2] I/O Operations
Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs.
3] File System Manipulation
The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished.
4] Communications
There are instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on the different computers.
5] Error Detection
An error is one part of the system may cause malfunctioning of the complete system. To avoid such a situation the operating system constantly monitors the system for detecting the errors.
Types of Operating systems
As computers have progressed and developed so have the operating systems.
GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. Below are some examples of GUI Operating Systems.System 7.xWindows 98Windows CE
Multi-user - A multi-user operating system allows for multiple users to use the same computer at the same time and different times.LinuxUnixWindows 2000
Multiprocessing - An operating system capable of supporting and utilizing more than one computer processor. LinuxUnixWindows 2000
Multitasking - An operating system that is capable of allowing multiple software processes to run at the same time.
UnixWindows 2000
Multithreading - Operating systems that allow different parts of a software program to run concurrently. Operating systems that would fall into this category are:LinuxUnixWindows 2000
Different Operating Systems
Microsoft Windows isn't the only operating system for personal computers, or even the best... it's just the best-distributed. Its inconsistent behavior and an interface that changes radically with every version are the main reasons people find computers difficult to use.
The Mac OS user interface inspired the creation of Windows, and is still the target Microsoft is trying to equal. As a popular consumer product, there's plenty of software available for it, and it's moving beyond its traditional niches of graphic design, education, and home use, into general business use.etc
MAC OS
Linux ("LIH-nux") is a free Unix-like operating system, originally developed by programmers who simply love the challenge of solving problems and producing quality software. even if that means giving the resulting product away.
Ubuntu (Linux)
Google Chrome OS
Google's Chrome OS is still vaporware so far, and it's arguably just another flavor of Linux, but it promises to be a viable alternative to Windows on small portable "netbooks" which will come with it preinstalled.
Haiku is based on BeOS, which was designed with multimedia in mind, including the kinds of features that Microsoft is just recently taking onto Windows.
Haiku
FreeBSD is commonly called "the free Unix". It's descended from the
classic 1970's Berkeley Software Distribution of Unix (from before the OS became "UNIX"®), making it one of the most mature and stable operating systems around.
The BSD Family
OpenBSD is "the other free Unix". It's similar to FreeBSD both in the Berkeley code it's based on, and the licensing terms. One key advantage it has over its BSD siblings is that it's incredibly secure from attack, as implied by its blowfish mascot, and made explicit by their boast of only one remotely-exploitable hole - ever - in their default installation.
OPENBSD
NETBSD
NetBSD is "the other free Unix". It's the work of another group of volunteer developers using the net to collaborate. Their mission is to get the OS to run - and run well - on hardware platforms no other Unix supports.
Syllable is a free alternative OS for standard PCs. It uses some of the better ideas from Unix, BeOS, AmigaOS, and others, and is compatible enough with portable software written for Unix that many have already been ported over to it.
Syllable
And there are never ending O.S’s
AmigaMorphOSRISC OSGNUMinix2warpMSDOS
Did you know that there are a total of 584+Operating systems in the world . And a matter of fact ,
there are 605 Linux distributions (Small Linux
based operating systems like android, symbian, Badaetc.)
A Small Talk about well known O.S
Windows 98 (codenamed Memphis) is a graphical operating
system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95.
Windows NT
Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993. It was a powerful high-level-language-based, processor-independent, multiprocessing, multiuser operating system with features comparable to Unix. It was intended to complement consumer versions of Windows that were based on MS-DOS.
ITS NOT LINUX ! ITS UBUNTU !
Ubuntu is an African ethic or humanistphilosophy focusing on people's allegiances and relations with each other. The real meaning of “UBUNTU” is “Humanity to others”.
Ubuntu 4.10 (Warty Warthog)Ubuntu 5.04 (Hoary Hedgehog)Ubuntu 5.10 (Breezy Badger)Ubuntu 6.06 LTS (Dapper Drake)Ubuntu 6.10 (Edgy Eft)Ubuntu 7.04 (Feisty Fawn)Ubuntu 7.10 (Gutsy Gibbon)Ubuntu 8.04 LTS (Hardy Heron)Ubuntu 8.10 (Intrepid Ibex)Ubuntu 9.04 (Jaunty Jackalope)Ubuntu 9.10 (Karmic Koala)Ubuntu 10.04 LTS (Lucid Lynx)Ubuntu 10.10 (Maverick Meerkat)Ubuntu 11.04 (Natty Narwhal)Ubuntu 11.10 (Oneiric Ocelot)Ubuntu 12.04 LTS (Precise Pangolin)
The Birth Of Linux
In 1991, Linus Benedict Torvalds was a second year student of Computer Science at the University of Helsinki and a self-taught hacker. The 21 year old sandy haired soft-spoken Finn loved to tinker with the power of the computers and the limits to which the system can be pushed. With his legendary technical wizardry, he alone outclassed entire groups of programmers from commercial software vendors in creating GCC, considered as one of the most efficient and robust compilers ever created.
Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds. Linux system distributions may vary in many details of system operation, configuration, and software package selections.
The Mastermind Behind Linux
Linus Torvalds
You are what you are. Whatever you do, Do it for the person in the mirror.
Graphical User Interface (GUI)
A graphical user interface is a type of user interface that allows users to interact with electronic devices with images rather than text commands.
GUIs can be used in computers, hand-held devices such as MP3 players, portable media players or gaming devices, household appliances and office equipment .
A GUI represents the information and actions available to a user through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.
New Features of the GUI
Pointing device
Icons
Desktop
Menus
Folders
Toolbar
Attachments
Multiple windows
On-line Help
Beware Son,
Someone's watching!
Computer Security
Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can't access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.
A computer security risk is any action that could cause loss of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI's top priorities.
There are several distinct
categories for people that cause
cybercrimes, and they are referred
to as hacker, cracker, cyber
terrorist, cyber extortionist,
unethical employee, script kiddy
and corporate spy.
“A good hacker is
known by
everyone but a
great hacker is
known by None.”
:- Kevin Mitnick
(World Most
Wanted Hacker)
“Hacking is easy as
anyone can do, but
not so easy that
everyone can do.”
:- Ankit Fadia
(Indian Hacker)
The Hacker.The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network.
The Cracker.The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It's basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills.
The Cyber terrorist.A cyber terrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It's just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning.
The Cyber extortionist.The term cyber extortionist refers to someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company's network. They will request a paid sum of money to prevent the threat from being carried out, a bit like black mailing.
The Unethical Employee.An unethical employee is an employee that illegally accesses their company's network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge.
How basically a Hardware Key logger Works ?
The Script Kiddies.A script kiddy is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs
The Corporate Spy.A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information.Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice.
A Piece of Advice
Business and home users must do their best to protect or safeguard their computers from security risks.However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks.
Computer Worms & Viruses
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.
Viruses
A computer virus is a computer program that can replicate itself and spread from one computer to another. A true virus can spread from one computer to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
PLAY SAFE
Thanking You.
Information researched by Mayank Rathore &
Divyendra Patil.
Presentation created by Divyendra Patil.
Technical & Hardware material totally contributed by
Ninad Yadav.