Preview

Fedora Installation

Powerful Essays
Open Document
Open Document
5170 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fedora Installation
Fedora 17 DVD Installation Documentation
Arizala, Mailyn
Marikina City mailyn_arizala@yahoo.com Ruiz, Armand Arvie
Pasig City ruizarmandarvie@yahoo.com Jayco, Rayna Mae
Cubao, Quezon City raynajayco@yahoo.com Samson, Joselito
Antipolo City
Jhay33@gmail.com
Rellona, Mark
Quezon City markrellona23@yahoo.com ABSTRACT

One of the popular open source Linux-based operating system is Fedora. It is designed as a secure, general purpose operating system. The Fedora operating system is developed on a six-month release cycle, under the auspices of the Fedora Project. Fedora is sponsored by Red Hat. It is also designed to be safe and is used by companies and governments. Its flexibility makes it capable of serving as a digital repository for a variety of use cases. Fedora’s objective is not only to lead the advancement of free and open source software and content as a collaborative community, but also to be on the leading edge of such technologies. Fedora developers prefer to make upstream changes instead of applying fixes specifically for Fedora—this ensures that their updates are available to all Linux distributions. To ensure that Fedora’s updates are available to all Linux distributions its developers prefer to make upstream changes instead of applying fixes. Compared to more mainstream non-Linux operating systems, Fedora has a short life cycle. Fedora is focused on security. One of its security features is Security-Enhanced Linux, a Linux feature that implements a variety of security policies, including mandatory access controls, through the use of Linux Security Modules (LSM) in the Linux kernel. Fedora is one of the distributions leading the way with SELinux.

OBJECTIVE

- To learn and experience the process of downloading iso image of Fedora Operating system.

- To be able to manage the verification of integrity of the downloaded OS.

- To learn how to install a new operating system in a



References: [1] DOI=http://fedoraproject.org/en/ [2] DOI=http://fedoraproject.org/en/about-fedora [3] DOI=http://www.ntchosting.com/fedora-linux-based-operating-system.html [4] DOI= http://simple.wikipedia.org/wiki/Fedora_(operating_system) [5] DOI= http://en.wikipedia.org/wiki/Fedora_(operating_system)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Update appliance * Patch/Configuration appliance * Embedded biometrics * Remote policy management * Endpoint Encryption * Secure browser * Secure Email * Incremental backup…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1430 Unit 2 Discuss

    • 401 Words
    • 2 Pages

    The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux distributions without having to go through extra effort. This matches their experiences on other popular platforms, such as Windows or Mac OS X. In addition, application developers want to ensure that the platform as a whole does not diverge. Even if an application works on today's distributions, will it work on tomorrow's? The LSB workgroup has, as its core goal, to address these two concerns. We publish a standard that describes the minimum set of APIs a distribution must support, in consultation with the major distribution vendors. We also provide tests and tools which measure support for the standard, and enable…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    In this lab, you practiced properly securing a Linux server system. You performed the steps to secure the bootloader, enable iptables, and run SELinux to help lock down the Linux OS. You also applied ACLs to directories and files to secure file and data access and then checked those ACLs and permissions on the system.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Netw 240 course project

    • 1091 Words
    • 5 Pages

    During my research of Linux vendors, I have narrowed my options to three distinct vendors. I have found Red Hat, Novell, and Ubuntu were three of the best companies worldwide. Each vendor has their advantages and disadvantages. I will address the positive and negative points of each vendor. The main differences between the three vendors that I will discuss are cost, training & support, performance & reliability, and lastly availability.…

    • 1091 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet.…

    • 638 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Installing Fedora/RHEL uses the process of copying operating system files from a CD, DVD, or USB flash drive to the hard disk on a system and setting up configuration files so Linux runs properly on the hardware. Many types of installations are possible including: fresh installations, upgrades from older releases of Fedora, and dual-boot.…

    • 516 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Netw 240 Lab 1

    • 2291 Words
    • 10 Pages

    Note: If you would like to install the 64-bit version of Fedora, open your browser to http://archive.fedoraproject.org/pub/fedora/linux/releases/14/Fedora/x86_64/iso and click on Fedora-14-x86_64-DVD.iso to download the Fedora installation image.…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Intro to Operating System

    • 907 Words
    • 4 Pages

    To understand three operating systems, you must first know what an operating system is. An operating system is software that controls the computer. It manages hardware, run applications, provides’ an interface for uses, stores, retrieves files. Here are three operating systems DOS, Windows 2000, and Linux. DOS, which is a disk operating system was the first OS within IBM computers. DOS was the operating system utilized by early versions of Windows including Windows 3.1 and 3.11. Next you have Windows 2000, which is an upgraded version of Windows NT and comes in numerous versions some are designed for the desktop and other designed high-end servers. Windows 2000 was a popular choice for corporate offices and their employees. The ultimate reason Windows 2000 was so successful over Windows NT was because it was more stable, support for Plug and Play, device manager, recovery console, activity directory, and better network support. At this time Windows 2000 is a dying operating system and provides no support from Microsoft due to the newer operating systems coming out at this time. The third operating system would be Linux is predominantly used for servers. Between Windows, and Mac, Linux is not a high option and is actually one to two percent of the desktop market. The creation of Linux was one of the best examples for free and open source software collaborations. Linux is packaged in a format known as Linux distribution for desktop and server use.…

    • 907 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Thin Station

    • 919 Words
    • 4 Pages

    Thinstation is opensource thin client operating system that allows you to connect to servers via network with the use use of some programs Thinstation is mainly use for office, company or department use and it is based on Linux.Thinstation also supports a MS Windows-only environment and requires no unix or linux understanding.…

    • 919 Words
    • 4 Pages
    Good Essays

Related Topics