Preview

comparison matrix

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
comparison matrix
University of Phoenix Material

Unix® and Linux® Comparison Matrix

Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.

UNIX® or Linux® operating system version: Fedora

Components
Your response
Role of shell
Gives a command line with built in commands
Three features and roles of each feature
Security-there is a firewall tool provided with a task bar that lets the user know of any security issues. Shell- Is environment friendly for the user and has functions that run like a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the user continue their work.
Comments on security
This is a main important feature for the OS
Comments on administration
It is easy for ADMIN use and the tools are not as difficult
Comments on networking
Networking is ok even though the security firewall is good
Comments on performance
Neat and clean
Comments on programmability
The functions are easier to navigate for the programming.
Other

UNIX® or Linux® operating system version: LINUX XP

Components
Your response
Role of shell
Built in commands
Three features and roles of each feature
Security-there is a firewall tool provided with a task bar that lets the user know of any security issues. Shell- Is environment friendly for the user and has functions that run like a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the user continue their work
Comments on security
Has a firewall built into the system
Comments on administration
Very easy to use and navigate
Comments on networking
Great for a beginner
Comments on performance
Performance is ok but could be better
Comments on programmability
Some of the features are a bit confusing and could be a little bit more standardized
Other

UNIX® or Linux® operating system version: SunOS

You May Also Find These Documents Helpful

  • Satisfactory Essays

    bad data and common input files. It also allows them to create applications that can resolve exceptions.…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risk Management

    • 426 Words
    • 2 Pages

    All have their own purpose if a threat occurs. Administrative will look at the treat and determine which steps to take. Detective will show the threat and a series of actions are required. Preventive will hopefully stop the threat before it causes damage. If a threat does occur and damages the system then the corrective tool will kick in. This tool will help fix the damage the threat caused. All these steps are needed to properly manage a threat.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Os Security

    • 369 Words
    • 2 Pages

    1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare in the following matrix. Insert the three chosen versions and fill out the columns based on the components on the left-hand side of the matrix.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are many administration advantages for UNIX. One example will be how multiple users can run multiple programs each at the same time without interfering with each other or crashing the system. Also, all users must be authenticated by a valid account and…

    • 3411 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.…

    • 746 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Catching Hackers: I am very familiar with a lot of hacks. This allows me to easily spot hacks and/or hacked clients.…

    • 803 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unix Architecture

    • 880 Words
    • 4 Pages

    The shell or the command interpreter is the mediator which interprets the commands we give and then conveys them to the Kernel which ultimately executes them. It provides the user interface to the Kernel. It is basically an expensive program running on the computer all the time and provides an interactive interface between the user and the computer functions.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    which user can execute programs in a convenient and efficient manner. It is a resource…

    • 2505 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Sonicwall

    • 1842 Words
    • 8 Pages

    High performance security engine Integrated intrusion prevention Advanced IPSec and SSL VPN Streamlined GUI and advanced management wizards Application intelligence, control and visualization Dual-band wireless Content/URL filtering Gateway Anti-Virus and Anti-Spyware Service Comprehensive Anti-Spam Service Multiple security zones WAN/ISP redundancy and failover Comprehensive centralized management Enforced Client Anti-Virus…

    • 1842 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Resume

    • 686 Words
    • 3 Pages

    ➢ Diagnostics, Anti Virus and Anti Spyware Applications: ERD Commander, Hirens, Norton Internet Security, McAfee Internet Security Suite, Ad-aware, Spy Sweeper and Antivirus.…

    • 686 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Involvement in all aspects of technical support including networks, desktop, UNIX administration, backups, disaster recovery, internal/external interfaces, security and software, Help Desk support.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    discussion

    • 278 Words
    • 2 Pages

    Reconnaissance- public internet, email, social networking; Discovery- port scanning, icmp, snmp; Fingerprinting- looking for system versions; Targeting- either a scattershot, or the most vulnerable part of the system; Intrusion- remote access; Privilege escalation- running utilities to gain admin rights; Snooping and eavesdropping- tapping into conversations between computers; Remote Access- installation of rootkits to conceal presence; Zombies- host becomes passive.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Protection and Security

    • 1598 Words
    • 5 Pages

    Protection has security policies that are supported by protective mechanisms and decides which information a user can access within the system. Another type of protection is available by UNIX security, which allows the system to be protected by or from other users. The UNIX security is more about protection than actual security; it is for users and groups.…

    • 1598 Words
    • 5 Pages
    Powerful Essays