Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet22/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   18   19   20   21   22   23   24   25   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible
10 тема вроде. Про Зинченко и тд, Bozor Iqtisodiyoti, Mysteries of the universe, 1. Korrelyatsionva regression tahlilning umumiy tushunchasi. Reg-fayllar.org, 2-mavzu. Excel va spss kompyuter dasturlarida ma’lumotlarni tash-fayllar.org
System Configuration
❖ 
Root password: The installation program asks you to enter a root or
administrator password with which you will be able to have access to
all the configuration areas of the system, which as a normal user is not
possible
❖ 
Creation of a user: The installation program asks for a login and
password, for the creation of the first user, which does not have the
necessary administrator permissions for security reasons
❖ 
Boot loader: Another point to consider is how you want to boot
Linux. If Windows exists, the easiest way is to install LILO or GRUB,
programs that are responsible for booting both operational systems
according to what the user indicates when starting the PC. It must be
selected when setting the option of saving the magazine in the first
sector of the disk. Problems will arise to boot Linux is if there is an
option to reinstall Windows again, since this operating system
assumes control of the PC and boot system, removing LILO (and
preventing Linux boot). Another very simple way would be to use the
boot floppy disk that is created during the installation of Linux
❖ 
Installation exit: The user is informed of the installed services and
the installation program is finished
Once Linux is first started, the initial wizard will start and allow you to
configure basic system items, such as the type of desktop to use; KDE,
Gnome, WindowMaker, etc. and some services like mail.
Conclusions
❖ 
The OS architecture defines a set of components, as well as how
they interact with each other and with the environment
❖ 
The most important for studying the architecture of the OS is the
concept of the core of the system. The core feature of the kernel is that
it runs in privileged mode
❖ 
The main types of OS architecture are monolithic and micro-kernel
based architecture. Monolithic architecture requires that the core


functions of the system be concentrated in the kernel, its most
important advantage being performance. In microkernel systems in
privileged mode, only the basic functions are performed, the main
advantages of such systems are reliability and flexibility

The operating system directly interacts with the computer
hardware. Modern computer architectures offer many operating
system support tools
❖ 
The operating system interacts with applications. It provides a set of
system calls to access functions implemented in the kernel. For
applications, system calls, along with system library tools, are
accessible through the application programming interface



Download 6,34 Mb.
1   ...   18   19   20   21   22   23   24   25   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish