Skip to main content

Operating Systems

An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a computer system. Application programs usually require an operating system to function.
             Early computers were built to perform a series of single tasks, like a calculator. Basic operating system features were developed in the 1950s, such as resident monitor functions that could automatically run different programs in succession to speed up processing. Operating systems did not exist in their modern and more complex forms until the early 1960s. Hardware features were added that enabled use of runtime librariesinterrupts, and parallel processing. When personal computers became popular in the 1980s, operating systems were made for them similar in concept to those used on larger computers.

Examples of popular modern operating systems include AndroidBSDiOSLinuxMac OS XQNXMicrosoft Windows, Windows Phone, and IBM z/OS. All these, except Windows and z/OS, share roots in UNIX.

Microsoft Windows


Microsoft Windows is a series of graphical interface operating systems developed, marketed, and sold by Microsoft.
Microsoft introduced an operating environment named Windows on November 20, 1985 as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUI). Microsoft Windows came to dominate the world's personal computer market with over 90% market share, overtaking Mac OS, which had been introduced in 1984.
As of April 2013, the most recent versions of Windows for personal computers, mobile devices, server computers and embedded devicesare respectively Windows 8, Windows Phone 8, Windows Server 2012 and Windows Embedded 8 Industry.
Consumer versions of Windows were originally designed for ease-of-use on a single-user PC without a network connection, and did not have security features built in from the outset. However, Windows NT and its successors are designed for security (including on a network) and multi-user PCs, but were not initially designed with Internet security in mind as much, since, when it was first developed in the early 1990s, Internet use was less prevalent.
These design issues combined with programming errors (e.g. buffer overflows) and the popularity of Windows means that it is a frequent target of computer worm and virus writers. In June 2005,Bruce Schneier's Counterpane Internet Security reported that it had seen over 1,000 new viruses and worms in the previous six months. In 2005, Kaspersky Lab found around 11,000 malicious programs—viruses, Trojans, back-doors, and exploits written for Windows and this time there were lots of exploit , virus , trojans , spyware,backdoors.
Emulation allows the use of some Windows applications without using Microsoft Windows. These include:
  • Wine – a free and open source software implementation of the Windows API, allowing one to run many Windows applications on x86-based platforms, including UNIX/Linux and OS X. Wine developers refer to it as a "compatibility layer"; and make use of Windows-style APIs to emulate the Windows environment.
    • CrossOver – A Wine package with licensed fonts. Its developers are regular contributors to Wine, and focus on Wine running officially supported applications.
    • Cedega – TransGaming Technologies' proprietary fork of Wine, designed specifically for running games written for Microsoft Windows under Linux. A version of Cedega known as Cider is used by some video game publishers to allow Windows games to run on OS X. Since Wine was licensed under the LGPL, Cedega has been unable to port the improvements made to Wine to their proprietary codebase. Cedega ceased its service in February 2011.
    • Darwine – A bundling of Wine to the PowerPC Macs running OS X by running Wine on top of QEMU. Intel Macs use the same Wine as other *NIX x86 systems.
  • ReactOS – An open-source OS that is intended to run the same software as Windows, originally designed to simulate Windows NT 4.0, now aiming at Windows XP and Vista/7 compatibility. It has been in the development stage since 1996.
  • Freedows OS – an open source attempt at creating a Windows clone for x86 platforms, intended to be released under the GNU General Public License. Started in 1996 by Reece K. Sellin, the project was never completed, getting only to the stage of design discussions which featured a number of novel concepts until it was suspended in 2002.


Mac OS


Mac OS is a series of graphical user interface-based operating systems developed by Apple Inc. for their Macintosh line of computer systems. The original version was the integral and unnamed system software first introduced in 1984 with the original Macintosh, and referred to simply as the System software. This is credited with popularizing the graphical user interface concept. Mac OS releases have existed in two series, Classic Mac OS from 1984 to 2000 and Mac OS X from 2001 to present. Both series share a general interface design, but have very different internal architectures.
New security features intend to provide better internal resiliency to successful attacks, in addition to preventing attacks from being successful in the first place.
Library Randomization
Leopard implements library randomization, which randomizes the locations of some libraries in memory. Vulnerabilities that corrupt program memory often rely on known addresses for these library routines, which allow injected code to launch processes or change files. Library randomization is presumably a stepping-stone to a more complete implementation of address space layout randomization at a later date.
Application Layer Firewall
Leopard ships with two firewall engines: the original BSD IPFW, which was present in earlier releases of Mac OS X, and the new Leopard Application Layer Firewall. Unlike IPFW, which intercepts and filters IP datagrams before the kernel performs significant processing, the Application Layer Firewall operates at the socket layer, bound to individual processes. The Application Layer Firewall can therefore make filtering decisions on a per-application basis. Of the two-firewall engines, only the Application Layer Firewall is fully exposed in the Leopard user interface. The new firewall offers less control over individual packet decisions (users can decide to allow or deny connections system wide or to individual applications, but must use IPFW to set fine-grained TCP/IP header level policies). It also makes several policy exceptions for system processes: neither mDNSResponder nor programs running with superuser privileges are filtered.
Sandboxes
Leopard includes kernel-level support for role-based access control (RBAC). RBAC is intended to prevent, for example, an application like Mail from editing the password database.
Application Signing
Leopard provides a framework to use public key signatures for code signing to verify, in some circumstances, that code has not been tampered with. Signatures can also be used to ensure that one program replacing another is truly an "update", and carry any special security privileges across to the new version. This reduces the number of user security prompts, and the likelihood of the user being trained to simply clicking "OK" to everything.
Secure Guest Account
Guests can be given access to a Leopard system with an account that the system erases and resets at logout.
Security features in Leopard have been criticized as weak or ineffective, with the publisher Heise Security documenting that the Leopard installer downgraded firewall protection and exposed services to attack even when the firewall was re-enabled. Several researchers noted that the Library Randomization feature added to Leopard was ineffective compared to mature implementations on other platforms, and that the new "secure Guest account" could be abused by Guests to retain access to the system even after the Leopard log out process erased their home directory.

Linux and GNU


Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released 5 October 1991 by Linus Torvalds. Since the main supporting user space system tools and libraries originated in the GNU Project, initiated in 1983 by Richard Stallman, the Free Software Foundation prefers the name GNU/Linux.
Linux was originally developed as a free operating system for Intel x86-based personal computers. It has since been ported to more computer hardware platforms than any other operating system. It is a leading operating system on servers and other big iron systems such as mainframe computers and supercomputers more than 90% of today's 500 fastest supercomputers run some variant of Linux, including the 10 fastest.Linux also runs on embedded systems (devices where the operating system is typically built into the firmware and highly tailored to the system) such as mobile phones, tablet computers, network routers, televisions and video game consoles; the Android system in wide use on mobile devices is built on the Linux kernel.
Linux Security Modules (LSM) is a framework that allows the Linux kernel to support a variety of computer security models while avoiding favoritism toward any single security implementation. The framework is licensed under the terms of the GNU General Public License and is standard part of the Linux kernel since Linux 2.6. AppArmorSELinuxSmack and TOMOYO Linux are the currently accepted modules in the official kernel.
Linux Embedded Device



The Linux kernel is used in some popular distributions, such as Red HatDebianUbuntuLinux Mint and Google's Android.

Chromium OS

Chromium OS is a Linux-based operating system designed by Google to work exclusively with web applications. It is the open source development version of Google Chrome OS.
  • The firmware contributes to fast boot time by not probing for hardware, such as floppy disk drives, that are no longer common on computers, especially netbooks. The firmware also contributes to security by verifying each step in the boot process and incorporating system recovery.
  • System-level software includes the Linux kernel that has been patched to improve boot performance. Userland software has been trimmed to essentials, with management by Upstart, which can launch services in parallel, re-spawn crashed jobs, and defer services in the interest of faster booting.
  • The window manager handles user interaction with multiple client windows much like other X window managers.

UNIX and UNIX-like operating systems


Unix was originally written in assembly language. Ken Thompson wrote B, mainly based on BCPL, based on his experience in the MULTICS project. B was replaced by C, and Unix, rewritten in C, developed into a large, complex family of inter-related operating systems which have been influential in every modern operating system .
The UNIX-like family is a diverse group of operating systems, with several major sub-categories including System V, BSD, and Linux. The name "UNIX" is a trademark of The Open Group which licenses it for use with any operating system that has been shown to conform to their definitions. "UNIX-like" is commonly used to refer to the large set of operating systems which resemble the original UNIX.
Unix-like systems run on a wide variety of computer architectures. They are used heavily for servers in business, as well as workstations in academic and engineering environments. Free UNIX variants, such as Linux and BSD, are popular in these areas.
FOR MORE

Comments

Popular posts from this blog

Virtualization vs Containerization: Understanding the Key Differences

 As technology continues to evolve, businesses are faced with new and innovative ways to deploy and manage their applications. Two popular approaches are virtualization and containerization, and understanding the differences between these two technologies is crucial for organizations looking to deploy their applications in the most effective and efficient way. While both technologies provide similar benefits, such as isolated environments and the ability to run multiple applications on a single physical server, there are some key differences between virtualization and containerization. Virtualization is a technology that allows multiple virtual machines to run on a single physical server. VMware is one of the most popular virtualization platforms, and it creates a virtual environment for each application, complete with its own operating system, memory, and disk space. This allows multiple applications to run independently on the same physical server, even if they use different operatin

Famous Hackers

Jonathan James Jonathan Joseph James  (December 12, 1983 – May 18, 2008), was an American  hacker  who was the first juvenile incarcerated for  cyber crime  in the United States.  The  South Florida  native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound. Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of BellSouth and the Miami-Dade school system. What brought him to the attention of federal authorities, however, was his intrusion into the computers of the Defense Threat Reduction Agency, a division of the United States Department of Defense, the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in a computer server in Dulles, Virginia, which he u

Containerization: Revolutionizing the Way Applications are Deployed and Managed

 In recent years, containerization has emerged as a game-changer in the world of software development and deployment. With its lightweight, isolated, and easily portable architecture, containerization has been hailed as a solution to many of the challenges that organizations face when building and deploying applications.  What is Containerization? Containerization is a method of packaging and deploying applications in a way that allows them to run consistently and reliably, regardless of the environment. Applications are packaged in containers, which are essentially isolated environments that include everything the application needs to run, including code, libraries, system tools, and runtime. This helps to attain portability and reduction in size. The process of making an image into a consolidated package (container) is known as Containerization. Containers help the developers help their applications run in any environment and not get dependent upon the host's hardware. Containers