subject: How does Linux [print this page] main problem you may encounter trying to raise the lid, which makes Linux tick is knowing where to start. This is a complicated stack of software, which has been developed by thousands of people.
After the boot sequence would be reasonable, explaining what it actually is Grub, before jumping to initiate the RAM disk and load the kernel. But the problem with that is obvious. Grub too early to mention in any article and youre likely to scare away many readers. We would have the same problem to clarify the kernel, if we did chronological.
Instead we have chosen to view from the top, fighting each layer of technology from the desktop to the Linux kernel, as it seems for the average user. This way you can go from desktop comfort zone to the underground archaeological Linux, where you will find many monuments of the bygone era of multi-user systems, dumb terminals, remote connections, and geeks of the past.
This is one of the things that makes Linux so interesting: you can see exactly what happened, why and when. This allows us to dissect the operating system in such a way that can not try some solutions, podczas when the same time, kiedy learn something about why something works the way on the surface.
Level 1: userspace
Before we delve into the basement of Linux, is an idea that it is important to understand. It is a concept that combines the user-space, privileges and groups, and it governs how the whole system works, and Linux as you, as a user interaction.
is based on the assumption that the normal user desktop should not be able to make important changes to the system without demonstrating that they have the correct administrative privileges to do so. Therefore, you are asked for your password when you install new packages or open the distribution panel configuration, and this is why a normal user can not see the contents of / root or make changes to individual files.
Your use sudo distribution or an administrator account to grant access to the entire system configurable part of the system. The former usually works on only one session or command, and is used as an ad-hoc solutions for normal use from day to day, as a way as Windows 7 and OS X operating privileges.
USER CONTROL: Groups allows you to enable and disable certain services to each user
Z full-scale system administrator account on the other hand, sometimes too easily logged on for too long(and therefore more likely that you can make a mistake or irreversible). But it is because for both methods of security.
Linux uses a system of users, groups and permissions to the system as secure as possible. The idea is that you can experiment with your own files as you want, but you can not mess about the integrity of the entire system without at least entering the password. This may seem a bit redundant in the system when youre the only user of the system, but as we shall see in many other parts of Linux, this concept is back to when the system was the average number of users and only one controller or two.
Linux is a variant of the Unix operating system, which is one of the most popular multi-user systems for decades. This means that many functions are difficult to avoid in Linux, but is also one of the reasons why Linux is such a popular? C multi-user systems must be safe, and Linux has inherited many advantages of these systems early.
user account in Linux is still a self-contained, for example. All personal files are stored in your own home directory, and the same for other users of the system. You can usually see their names, looking at the contents of / home from the file manager, depending on their powers, even look inside the folders of other people in the house.
But who can and can not read their contents are controlled by the user who owns the file, and it is up to the powers.
Permissions
Each file or folder on a Linux file system consists of nine attributes that are used to determine how to access them. These attributes correspond to whether the user, group, or everyone can read, write and perform a file.
may want to share a collection of photos from other users in the system, for example, and if you create a group named images, add all users who want access to the group and set permissions on a folder, a group of photos, you will be able to limit who has access to the images.
Any modern file manager will be able to perform this task, usually by selecting a file and selecting its properties to change its permissions. It is also the way to the desktop will store the configuration information for applications, tools and utilities.
hidden directories(those starting with a dot), often are created in your home directory, and youll find in these text files, desktop and applications to store configuration.
No one else can see them, and this is one of the reasons for the transfer of the current home folder to a new distribution can be such a good idea? C, you can keep all the settings, even changing the entire operating system.
Related Posting Search Result:7 best BitTorrent clients Linux
BitTorrent is a P2P file-sharing protocol is often the quickest way to get the latest distributions. Is expanded far b...Six of the best content filter for Linux