Skip to main content

Give a brief introduction to UNIX.

#RHL-1.1

1. Give a brief introduction to UNIX.

Ans. 
1. In 1969, Ken Thompson, Dennis Ritchie and the researchers at AT&T bell laboratories developed the UNIX Operating system.

2. They designed the system for the needs of a research environment, designing it run on a minicomputers.

3. UNIX was an affordable and efficient multiuser and multi-tasking operating system.

4. UNIX gradually grew from one person’s tailored design to a standard software product distributed by many different vendors, such as Novell and IBM.5. Throughout the 1970’s Bells lab began issuing official versions of UNIX and licensing the system to different users.

6. Berkeley added many new features to the system that later became standard in 1975 Berkeley released its own version of UNIX known by its distribution arm, Berkeley Software Distribution (BSD).

7. This BSD version of UNIX became a major contender to the AT&T bell lab’s version called ‘system3’, this was later followed by ‘SystemV’, which became a supported commercial software product.

8. In 1983, Berkeley released a powerful version of UNIX called BSD release 4.2, this release included sophisticated file management as well as Internet network protocols- the same protocols are now used for internet.

9. Several other companies like IBM, Harvard Packard created their own standard versions of UNIX.10. Two commercial standard versions of UNIX existed then the Open software foundation (OSF) and SystemV.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...