Preview

Unix And Linux Comparison Matrix Analysis

Good Essays
Open Document
Open Document
489 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unix And Linux Comparison Matrix Analysis
University of Phoenix Material

Unix® and Linux® Comparison Matrix

Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare in the following matrix. Insert the three chosen versions and fill out the columns based on the components on the left-hand side of the matrix.

Components | Solaris 9 | Redhat Linux | NetBSD | Role of shell | Bourne Shell is the default. Reads commands inputted into the system. | The default shell is bash. The shell allows users to type commands and have the output displayed on the screen. | | Three features and roles of each feature | 1. RBAC - Role based access control. This creates rights to the system. 2. Live upgrade command-line features. When upgrading the system the percentage completed is
…show more content…
| Finger provides information to hackers about the system running, Linux allows this feature to be turned off. The system is free and therefore lots of people have created ways to help secure this. Lots of good websites to provide insturctions on securing the system. | | Comments on administration | A lot of features are able to be performed without the admin sitting doing them. For example automatic dynamic reconfiguration allows for load based operations. This means the system bases its usage of the system load, the administrator does not need to allocate space. | Red hat is an easy Unix system for first time unix users to administer. This is built to be user friendly for administrators and users. | | Comments on networking | Using in-kernel cache allows the system to use system memory to increase HTTP performance. This increases the speed for the web server and minimizes overhead between kernal and web server. | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network. |

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Installs and removes roles, role services and features. Also displays the list of all roles, role services, and features available, and shows which are installed on this computer. For additional information about the roles, roles services, and features that you can specify using this tool, refer to the Help for Server Manager.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    system or kernel to load when the computer starts. It is very important to lock this down because of the high access…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    | |the ability to fulfill duties |options for data tiering |private addresses is just some |…

    • 1522 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +Ability: Operating system should permit effective, development, texting, and introduction to new system function without interfering with service…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    comparison matrix

    • 439 Words
    • 2 Pages

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Guide to UNIX Using Linux Fourth Edition Chapter 4 SolutionsAnswers to the Chapter 4 Review Questions…

    • 1020 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    11. To show what an attacker would have access to if they were in the system.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 5 Bsa/310

    • 4336 Words
    • 18 Pages

    What exactly does this mean? It means that all your local and network resources need to be made accessible all the time, but to only the right people. It is the second part of this statement that causes difficulty. Most administrators have no problem making the resources available, but the issue of "to only the right people" is where the confusion begins. Who are the "right people"? Who decides who the "right people" are? Is it possible for someone to be considered in the "right people" group only during certain hours of the day?…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Netw250

    • 2162 Words
    • 9 Pages

    In this week's lecture, we talk about the items in TCO 2. Each student will be required to perform a Linux installation. Planning for the installation is key, as well as deciding which type of Linux to use for either a workstation or server installation. Please use all items in this lecture and the accompanying lab assignment to provide research for your Project Paper as described in TCO 1.…

    • 2162 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Amazon has made a business of selling a variety media types while also making the reselling of the same media an attractive option. What better way to regain in part what you spent on media interests than to resell it and have money to put towards the next interest. As of 2004 Amazon began running the Linux operating system across the board. Amazon then became one of the largest and well known companies running the Linux operating system. As one of the largest ecommerce centered businesses with a large global customer base with high expectations of constant expansion. Currently, it is known that Amazon is running Linux servers "Amazon's Elastic Compute Cloud (EC2), had close to half-a-million servers already running on a Red Hat Linux variant (Vaughn, 2012)." At this time "Amazon has never officially said what it's running as EC2's base operating system, it's generally accepted that it's a customized version of Red Hat Enterprise Linux (RHEL).(Vaughn, 2012)" In addition Amazon uses Xen hypervisor as host to the Linux system for virtual machines. Solaris; OpenSolaris; FreeBSD and NetBSD and Windows 2003 and 2008 are additional virtual machine instances. The multiple operating services that Amazon is currently using assist with meeting the high demand of users that browse and purchase from their sites. In using their cloud technology, EC2, it is also possible that not all information will be stored at any specific location, but is easily accessible to anyone within the company to access it. With Linux gaining popularity this will ultimately become beneficial to Amazon in their continual global expansion goals.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Open Versus Closed System

    • 609 Words
    • 3 Pages

    In the technological industry the terms open source and closed source of often passed around when the discussion turns to which operating system to use. This paper will discuss the difference between open and closed source operating systems in an effort to provide the information necessary to make an informed decision regarding which one to choose.…

    • 609 Words
    • 3 Pages
    Good Essays