Skip to main content

Linux OS introduction

 LINUX OPERATING SYSTEM

Linux Introduction:

  LINUX is an operating system or a kernel distributed under an open-source license. It is one of popular version of UNIX operating system. Linux was designed considering UNIX compatibility Its functionality list is quite similar to that of UNIX.





Components of Linux System:

Linux OS has primarily three components;

1. Kernel: It is the core part of Linux. It is responsible for all major activities of this operating system. It consists of various modules and it interacts directly with the underlying hardware.

2. System Library: These libraries implement most of the functionality of the operating system and do not requires kernel module's code access rights.

3. System utility: These programmes are responsible to do specialized, individual level tasks.

Basis Features:

  • Some of the features of Linux OS are:
  • Portable
  • Open source
  • Multi-user
  • Multiprogramming
  • Hierarchical file system
  • Security... etc.,


courtesy: Pinterest



Benefits of Using LINUX:

  • Free operating system
  • Being open source, anyone with programming knowledge can modify it.
  • It is easy to learn for beginners
  • After installing Linux operating system you no longer need an antivirus! Linux is highly secure system. With each upgrade, the OS becomes more secure and robust.
  • Linux freeware is the OS of choice for server environments due to its stability and reliability. Mega companies like Facebook, Amazon, and Google use Linux for their Server.


FACTS:

33.8% of the world runs on LINUX OS compared to 7.4% WINDOWS OS.


Thank you reading..! Subscribe for more blogs and contents:)

-Raghul David R

 



Comments

Post a Comment

Popular posts from this blog

ETHICAL HACKING

  ETHICAL HACKING E thical H acking is a structured hacking performed to expose vulnerabilities in a system, using a tools and techniques with organizations knowledge.  The act of hacking is defined as the process of finding a set of vulnerabilities in a target system and systematically exploiting them. Ethical hacking as a discipline discerns itself from hacking by adding a vital element to the process. The process becomes a legal activity and since the hacker takes permission prior to hacking into system, it is legally made sure that he has no malicious intent. This is normally performed by making the ethical hacker sign contracts that legally bind him to work towards the improvement of the security of the company. ETHICAL HACKER: An Ethical hacker is a computer security specialist, who hacks into a system with the consent or permission of the owner to disclose vulnerabilities in the security of the system in order to improve it.  Types of Hackers: White hat hackers Bla...

Cloud Computing basics

  CLOUD COMPUTING BASICS Cloud computing is a latest generation virtualization based-technology that allows us to create, configure, modify and customize applications through an internet connection. The cloud technology includes hard disk, software application, and database. Accessing and storing data, information over internet rather than hard drive. Internet of things can be integrated with cloud computing and can develop many projects easily with low cost. Basically the term "cloud" refers to a network or the internet. Technology that uses remote servers on the internet to store, access, and fetch data online rather than local drives. The data can be anything such as files, images, documents, audio, video, and more. Cloud Computing is one of the emerging and trending technology in this generation. Most of the companies switched over Cloud Computing services for  company growth. Some of the following operations used by cloud computing Developing new applications and service...