Page 293 - DCAP103_Principle of operating system
P. 293

Principles of Operating Systems



                   Notes         of the updates as soon as they are accessible. Microsoft’s Windows family platform has got an
                                 extraordinary expansion as a server and client platform. Whether it is installed in the thousands
                                 of home PCs, in the Internet server or on corporate LANs, its fame has made it more prone
                                 for breakage by many hackers. Bodily security is becoming more and more common through
                                 out the world as novel and graver terrorizations are emerging. Physical security of public and
                                 possessions comes in course of time to most human; still the lost in the mix up is the prime
                                 necessitate for securing the data. Over and over again, this data contains responsive information
                                 that is sought after by people against the law.

                                 Encryption and Privacy Resource

                                    •  It acts as a source for learning about a range of encryption schemes.
                                    •  This includes privacy fortification tips and security fundamentals.

                                 NIST Vulnerability and Threat Portal

                                    •  It is an absolute portal for recent attacks or incidents, bugs, advisories, etc. kept up by the
                                      National Institute of Standards and Technology.
                                 PC Talk - Security

                                    •  This is the latest news from the field of IT security.
                                 CERT/CCC Current Activity

                                    •  Central depository for high force security vulnerabilities and incidents are being informed
                                      to the CERT or CCC.

                                 The two best security oriented operating systems are:
                                 Back Track

                                    •  This is an Innovative Penetration Testing which comes live from Linux distribution.

                                    •  This brilliant bootable live-CD has generated as a result of from the merger of Whax and
                                      Auditor.

                                    •  It shows off an enormous diversity of Security and Forensics apparatus and provides an
                                      affluent maturity of the environment.
                                    •  The user modularity is highlighted so the allocation can be customized with no trouble
                                      by the user to incorporate private scripts, extra tools, customized kernels, etc.

                                 Knoppix

                                    •  This is designed as the general purpose live bootable system to be taken on CD or DVD.
                                      It consists of a diplomatic set of involuntary hardware revealing, GNU/Linux software,
                                      and hold up for a lot of sound cards, graphics cards, USB and SCSI appliances and other
                                      peripherals.

                                    •  KNOPPIX can also be used as a creative Linux system as the educational CD, desktop,
                                      rescue system.





        286                               LOVELY PROFESSIONAL UNIVERSITY
   288   289   290   291   292   293   294   295   296   297   298