Welcome to YLOAN.COM
yloan.com » Linux » How does Linux
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

How does Linux

main problem you may encounter trying to raise the lid

, which makes Linux tick is knowing where to start. This is a complicated stack of software, which has been developed by thousands of people.

After the boot sequence would be reasonable, explaining what it actually is Grub, before jumping to initiate the RAM disk and load the kernel. But the problem with that is obvious. Grub too early to mention in any article and youre likely to scare away many readers. We would have the same problem to clarify the kernel, if we did chronological.

Instead we have chosen to view from the top, fighting each layer of technology from the desktop to the Linux kernel, as it seems for the average user. This way you can go from desktop comfort zone to the underground archaeological Linux, where you will find many monuments of the bygone era of multi-user systems, dumb terminals, remote connections, and geeks of the past.

This is one of the things that makes Linux so interesting: you can see exactly what happened, why and when. This allows us to dissect the operating system in such a way that can not try some solutions, podczas when the same time, kiedy learn something about why something works the way on the surface.


Level 1: userspace

Before we delve into the basement of Linux, is an idea that it is important to understand. It is a concept that combines the user-space, privileges and groups, and it governs how the whole system works, and Linux as you, as a user interaction.

is based on the assumption that the normal user desktop should not be able to make important changes to the system without demonstrating that they have the correct administrative privileges to do so. Therefore, you are asked for your password when you install new packages or open the distribution panel configuration, and this is why a normal user can not see the contents of / root or make changes to individual files.

Your use sudo distribution or an administrator account to grant access to the entire system configurable part of the system. The former usually works on only one session or command, and is used as an ad-hoc solutions for normal use from day to day, as a way as Windows 7 and OS X operating privileges.

USER CONTROL: Groups allows you to enable and disable certain services to each user

Z full-scale system administrator account on the other hand, sometimes too easily logged on for too long(and therefore more likely that you can make a mistake or irreversible). But it is because for both methods of security.

Linux uses a system of users, groups and permissions to the system as secure as possible. The idea is that you can experiment with your own files as you want, but you can not mess about the integrity of the entire system without at least entering the password. This may seem a bit redundant in the system when youre the only user of the system, but as we shall see in many other parts of Linux, this concept is back to when the system was the average number of users and only one controller or two.

Linux is a variant of the Unix operating system, which is one of the most popular multi-user systems for decades. This means that many functions are difficult to avoid in Linux, but is also one of the reasons why Linux is such a popular? C multi-user systems must be safe, and Linux has inherited many advantages of these systems early.

user account in Linux is still a self-contained, for example. All personal files are stored in your own home directory, and the same for other users of the system. You can usually see their names, looking at the contents of / home from the file manager, depending on their powers, even look inside the folders of other people in the house.

But who can and can not read their contents are controlled by the user who owns the file, and it is up to the powers.

Permissions

Each file or folder on a Linux file system consists of nine attributes that are used to determine how to access them. These attributes correspond to whether the user, group, or everyone can read, write and perform a file.

may want to share a collection of photos from other users in the system, for example, and if you create a group named images, add all users who want access to the group and set permissions on a folder, a group of photos, you will be able to limit who has access to the images.

Any modern file manager will be able to perform this task, usually by selecting a file and selecting its properties to change its permissions. It is also the way to the desktop will store the configuration information for applications, tools and utilities.

hidden directories(those starting with a dot), often are created in your home directory, and youll find in these text files, desktop and applications to store configuration.

No one else can see them, and this is one of the reasons for the transfer of the current home folder to a new distribution can be such a good idea? C, you can keep all the settings, even changing the entire operating system.

Via: How does Linux

Related Posting Search Result:7 best BitTorrent clients Linux

BitTorrent is a P2P file-sharing protocol is often the quickest way to get the latest distributions. Is expanded far b...Six of the best content filter for Linux

More and more countries implementing varying degrees of restrictions on access to content, Internet censorship has bec...Ubuntu: Linux meets when the ideology of business


Using Linux does not entail a clear winning design. There are so many different business models as there are distribut...The problem with Linux is not too much choice

Those of you not familiar with Linux does not know how to install new software. After 12 years with Linux, not me a...

How does Linux

By: blue60
Razones De Peso Para Hacer Negocios Por Internet En La Red Social Facebook Linux Command When I Put My Ramones Band Hat and My T-Shirt On Anti-cancer Agents Found In Red Wine Grapes Uninstall/Remove Red Cross Antivirus - How To Perform A Removal Of The Red Cross Antivirus Virus From Your PC Who Contends You Can't Avail Yourself Of Boisterous Red Crib Bedding In Your Tot's Room? Satellite Direct Linux Watch Boardwalk Empire Season 1 Episode 1 Pilot Online Free Streaming Hard Hat Decals: A Different Approach to Promote Your business Guidelines to Ensure Linux Server Security SEO Techniques - White Hat SEO versus Black Hat SEO Buy The Awesome Nokia 6700 Slide Red On Contract Deals Small Red Riding Hood Costume - Obtain One Today!
print
www.yloan.com guest:  register | login | search IP(18.220.248.77) Stockholms Lan / Kista Processed in 0.010815 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 54 , 6493, 12,
How does Linux Kista