51
OOPS Out of Present Syllabus

The Technology Talk

Embed Size (px)

DESCRIPTION

A presentation of a small talk on technology given in my college given by me.

Citation preview

Page 1: The Technology Talk

OOPSOut of Present

Syllabus

Page 2: The Technology Talk

Operating system (O.S)

An operating system (OS) is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system. A user cannot run an application program on the computer without an operating system, unless the application program is self booting.

Page 3: The Technology Talk

Operating Systems Services

Following are the five services provided by an operating systems

1] Program ExecutionThe purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems.

Page 4: The Technology Talk

2] I/O Operations

Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs.

Page 5: The Technology Talk

3] File System Manipulation

The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished.

Page 6: The Technology Talk

4] Communications

There are instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on the different computers.

Page 7: The Technology Talk

5] Error Detection

An error is one part of the system may cause malfunctioning of the complete system. To avoid such a situation the operating system constantly monitors the system for detecting the errors.

Page 8: The Technology Talk

Types of Operating systems

As computers have progressed and developed so have the operating systems.

GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. Below are some examples of GUI Operating Systems.System 7.xWindows 98Windows CE

Page 9: The Technology Talk

Multi-user - A multi-user operating system allows for multiple users to use the same computer at the same time and different times.LinuxUnixWindows 2000

Page 10: The Technology Talk

Multiprocessing - An operating system capable of supporting and utilizing more than one computer processor. LinuxUnixWindows 2000

Page 11: The Technology Talk

Multitasking - An operating system that is capable of allowing multiple software processes to run at the same time.

UnixWindows 2000

Page 12: The Technology Talk

Multithreading - Operating systems that allow different parts of a software program to run concurrently. Operating systems that would fall into this category are:LinuxUnixWindows 2000

Page 13: The Technology Talk

Different Operating Systems

Microsoft Windows isn't the only operating system for personal computers, or even the best... it's just the best-distributed. Its inconsistent behavior and an interface that changes radically with every version are the main reasons people find computers difficult to use.

Page 14: The Technology Talk

The Mac OS user interface inspired the creation of Windows, and is still the target Microsoft is trying to equal. As a popular consumer product, there's plenty of software available for it, and it's moving beyond its traditional niches of graphic design, education, and home use, into general business use.etc

MAC OS

Page 15: The Technology Talk

Linux ("LIH-nux") is a free Unix-like operating system, originally developed by programmers who simply love the challenge of solving problems and producing quality software. even if that means giving the resulting product away.

Ubuntu (Linux)

Page 16: The Technology Talk

Google Chrome OS

Google's Chrome OS is still vaporware so far, and it's arguably just another flavor of Linux, but it promises to be a viable alternative to Windows on small portable "netbooks" which will come with it preinstalled.

Page 17: The Technology Talk

Haiku is based on BeOS, which was designed with multimedia in mind, including the kinds of features that Microsoft is just recently taking onto Windows.

Haiku

Page 18: The Technology Talk

FreeBSD is commonly called "the free Unix". It's descended from the

classic 1970's Berkeley Software Distribution of Unix (from before the OS became "UNIX"®), making it one of the most mature and stable operating systems around.

The BSD Family

Page 19: The Technology Talk

OpenBSD is "the other free Unix". It's similar to FreeBSD both in the Berkeley code it's based on, and the licensing terms. One key advantage it has over its BSD siblings is that it's incredibly secure from attack, as implied by its blowfish mascot, and made explicit by their boast of only one remotely-exploitable hole - ever - in their default installation.

OPENBSD

Page 20: The Technology Talk

NETBSD

NetBSD is "the other free Unix". It's the work of another group of volunteer developers using the net to collaborate. Their mission is to get the OS to run - and run well - on hardware platforms no other Unix supports.

Page 21: The Technology Talk

Syllable is a free alternative OS for standard PCs. It uses some of the better ideas from Unix, BeOS, AmigaOS, and others, and is compatible enough with portable software written for Unix that many have already been ported over to it.

Syllable

Page 22: The Technology Talk

And there are never ending O.S’s

AmigaMorphOSRISC OSGNUMinix2warpMSDOS

Did you know that there are a total of 584+Operating systems in the world . And a matter of fact ,

there are 605 Linux distributions (Small Linux

based operating systems like android, symbian, Badaetc.)

Page 23: The Technology Talk

A Small Talk about well known O.S

Windows 98 (codenamed Memphis) is a graphical operating

system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95.

Page 24: The Technology Talk

Windows NT

Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993. It was a powerful high-level-language-based, processor-independent, multiprocessing, multiuser operating system with features comparable to Unix. It was intended to complement consumer versions of Windows that were based on MS-DOS.

Page 25: The Technology Talk

ITS NOT LINUX ! ITS UBUNTU !

Ubuntu is an African ethic or humanistphilosophy focusing on people's allegiances and relations with each other. The real meaning of “UBUNTU” is “Humanity to others”.

Ubuntu 4.10 (Warty Warthog)Ubuntu 5.04 (Hoary Hedgehog)Ubuntu 5.10 (Breezy Badger)Ubuntu 6.06 LTS (Dapper Drake)Ubuntu 6.10 (Edgy Eft)Ubuntu 7.04 (Feisty Fawn)Ubuntu 7.10 (Gutsy Gibbon)Ubuntu 8.04 LTS (Hardy Heron)Ubuntu 8.10 (Intrepid Ibex)Ubuntu 9.04 (Jaunty Jackalope)Ubuntu 9.10 (Karmic Koala)Ubuntu 10.04 LTS (Lucid Lynx)Ubuntu 10.10 (Maverick Meerkat)Ubuntu 11.04 (Natty Narwhal)Ubuntu 11.10 (Oneiric Ocelot)Ubuntu 12.04 LTS (Precise Pangolin)

Page 26: The Technology Talk

The Birth Of Linux

In 1991, Linus Benedict Torvalds was a second year student of Computer Science at the University of Helsinki and a self-taught hacker. The 21 year old sandy haired soft-spoken Finn loved to tinker with the power of the computers and the limits to which the system can be pushed. With his legendary technical wizardry, he alone outclassed entire groups of programmers from commercial software vendors in creating GCC, considered as one of the most efficient and robust compilers ever created.

Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds. Linux system distributions may vary in many details of system operation, configuration, and software package selections.

Page 27: The Technology Talk

The Mastermind Behind Linux

Linus Torvalds

You are what you are. Whatever you do, Do it for the person in the mirror.

Page 28: The Technology Talk

Graphical User Interface (GUI)

A graphical user interface is a type of user interface that allows users to interact with electronic devices with images rather than text commands.

GUIs can be used in computers, hand-held devices such as MP3 players, portable media players or gaming devices, household appliances and office equipment .

A GUI represents the information and actions available to a user through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.

Page 29: The Technology Talk

New Features of the GUI

Pointing device

Icons

Desktop

Menus

Folders

Toolbar

Attachments

Multiple windows

On-line Help

Page 30: The Technology Talk

Beware Son,

Someone's watching!

Page 31: The Technology Talk

Computer Security

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can't access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.

Page 32: The Technology Talk

A computer security risk is any action that could cause loss of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI's top priorities.

Page 33: The Technology Talk
Page 34: The Technology Talk

There are several distinct

categories for people that cause

cybercrimes, and they are referred

to as hacker, cracker, cyber

terrorist, cyber extortionist,

unethical employee, script kiddy

and corporate spy.

Page 35: The Technology Talk

“A good hacker is

known by

everyone but a

great hacker is

known by None.”

:- Kevin Mitnick

(World Most

Wanted Hacker)

Page 36: The Technology Talk

“Hacking is easy as

anyone can do, but

not so easy that

everyone can do.”

:- Ankit Fadia

(Indian Hacker)

Page 37: The Technology Talk

The Hacker.The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network.

Page 38: The Technology Talk

The Cracker.The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It's basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills.

Page 39: The Technology Talk

The Cyber terrorist.A cyber terrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It's just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning.

Page 40: The Technology Talk

The Cyber extortionist.The term cyber extortionist refers to someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company's network. They will request a paid sum of money to prevent the threat from being carried out, a bit like black mailing.

Page 41: The Technology Talk

The Unethical Employee.An unethical employee is an employee that illegally accesses their company's network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge.

Page 42: The Technology Talk

How basically a Hardware Key logger Works ?

Page 43: The Technology Talk
Page 44: The Technology Talk
Page 45: The Technology Talk

The Script Kiddies.A script kiddy is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs

Page 46: The Technology Talk

The Corporate Spy.A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information.Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice.

Page 47: The Technology Talk

A Piece of Advice

Business and home users must do their best to protect or safeguard their computers from security risks.However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks.

Page 48: The Technology Talk

Computer Worms & Viruses

A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.

Page 49: The Technology Talk

Viruses

A computer virus is a computer program that can replicate itself and spread from one computer to another. A true virus can spread from one computer to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

Page 50: The Technology Talk

PLAY SAFE

Page 51: The Technology Talk

Thanking You.

Information researched by Mayank Rathore &

Divyendra Patil.

Presentation created by Divyendra Patil.

Technical & Hardware material totally contributed by

Ninad Yadav.