Sunday 25 February 2018

Basic Linux Commands

Basic Linux Commands

Ratings: 10+5=15


Linux Boot Process:

  1. Power On your Linux Machine- The system executes BIOS (Basic Input/Output System). BIOS passes the control to MBR.
  2. MBR (Master Boot Record)- Has a size of less than 512 bytes. MBR can't load the kernel since it is unaware of file system. So. MBR loads and executes GRUB (Grand Unified Boot Loader).
  3. GRUB- Is boot loader, there will be multiple kernel images installed on your system, GRUB, shows the available OS images and allows you to choose. GRUB executes the kernel images.
  4. Kernel- Is the heart of operating system, when kernel is loaded, it configures hardware and memory allocation. Kernel executes the INIT levels.
  5. INIT- Is the run level program stored in slash etc slash inittab file. There are six run levels,
  • Level Zero is Halt or Shutdown the system.
  • Level 1- is single user mode.
  • Level 2- is Multi user mode.
  • Level 3- is Full user mode.
  • Level 4- is unsued INIT mode.
  • Level 5- is Graphical mode (it is default mode).
  • Level 6- is Reboot of the system. Finally INIT executes the Run Level programs and the user can see Login screen on his machine.

Introduction to Linux Shell:

  • Layered components in Linux OS
  1. Hardware Layer (RAM/HDD/CPU etc.)
  2. Kernel
  3. Shell uses BASH (Bourne Again Shell)
  4. Application and Utilities

Linux Hierarchical File System:

  • Data files are stored in directories (folders)
  • A hierarchical file system is how drives, folders and files are arranged in an operating system.
  1. Slash/ is also known as root directory.
  2. /root is the default home directory of the root user.
  3. /home contains the home directory of all users.
  4. /boot contains the kernel, which is the core operating system named as vmlinuz.
  5. /sbin stands for system binary.
  6. /bin stands for binary.
  7. /usr is Unix System Resources.
  8. /var stands for variable.
  9. /dev stands for device.
  10. /etc stands for et cetra.
  11. /opt stands for optional.
  12. /media is the default mount point for removable media.

Windows Hierarchical File System and comparison with Linux.

  • In GUI based Windows operating systems, the expands a drive or folder to see its contents by double-clicking the icon.
  • In Non-GUI console like MS-DOS, the drive and director is are listed  in text format.
  • The image illustrates Windows File System Hierarchy. In the image, the windows directory (Windows/) folder hierarchy that contains the System32, Tasks and Web folders. Each of these folders could have hundreds of their own files, but unless they are opened the files are not displayed.
  • Linux is case-sensitive while Windows is not case-sensitive. This means that you could have files named file, File and FILE in the same folder. Each file would have different contents. Linux treates capitalized letters and lower-case letters as different characters.
  • Windows uses backslashes (C;:\Users\Name), whereas Linux uses forward slashes (/home/name)
  • Windows have Drive letters like C:\, D:\ while Linux has /(slash).
Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 20-02-2018
Session Name: Basic Linux Commands
Summary of learning: Learning about basic commands to operate Linux.

Monday 19 February 2018

Introduction to Unix/Linux

Unix & Linux

Ratings:10+5=15



Introduction to UNIX Operating System:

  • Developed in 1970s at Bell Labs research center by Ken Thompson & Dennis Ritchie.
  • Written in C and assembly language.
  • Designed as portable, multi-tasking and multi-user.

History Of UNIX:

MULTICS
  • Started in mid-1960s as joint project of MIT, Bell Labs and General Electric.
  • It was a time sharing operating system.
UNICS
  • The project was developed in 1970 by Ken Thompson and Dennis Ritchie.
UNIX
  • Written in C programming language in 1972.
  • In 1975, the first source license for UNIX was sold to University Of Illions.
UNIX OS Variants:
  • The variants of UNIX Operating System, the table illustrates thevendors and the corresponding operating system released by the vendors.
  • The most prominent UNIX Operating Systems used in present environments are:
  1. SUN or Oracle with its Solaris operating system.
  2. IBM with AIX operating system.
  3. Hewlett Packard with HP-UX operating system.
  4. Apple with MacOS X server operating system.
  5. Berkeley Software Design Inc. with FreeBSD UNIX operating system.
  6. Also, Linux is the leading UNIX-like operating system.

Introduction to Linux:

  • Linux is a UNIX like computer OS.
  • Developed by Linus Torvalds in 1991.
  • Source model can be Open-source or Proprietary.
  • Available for Mobile devices, Desktops, Servers, Mainframes and Supercomputers.
  • 35% of Internet Servers and 99% of Supercomputers are powered by Linux OS.

Compare Linux & UNIX:

  • Linux shares similar architecture and concepts from UNIX. Additionally, Linux Kernel and other components are free and open-source software.
  • Linux was originally developed for Intel's x86 hardware while UNIX was originally designed for x86 and Itanium systems, while MAC OSX is compliant with PowerPC/x86/x64 systems.

Popular Linux Distributions:

  1. Red Hat- A Billion Dollar commercial Linux Company developing Linus, editions supported are Fedora (free edition) and CentOS (free,community supported).
  2. Ubuntu Linux- Free Linux version from Canonical Company. Popular among home users. Provides graphical Linux Desktop without any need to access command line.
  3. Debian- Extremely popular among advanced users due to its technical excellence and expectations from Linux community. Example Kali Linux.
  4. Arch Linux- Supported on x86-64 hardware architecture. Arch Linux ARM is a prominent version, used on devices like BeagleBoard, Raspberry Pi and Trimslice.
  5. Slackware Linux- Created in 1993, is one of the oldest distributions of Linux. OpenSUSE is a descendent of Slackware Linux.
  6. BOSS (Bharat Operating System Solutions)- A GNU Linux developed in INDIA by C-DAC Chennai. Used on Desktop PCs of GOVERNMENT Of INDIA Employees.

Companies Using Linux:


Red Hat OS variants:

RED HAT is the most popular Linux version used in Commercial Market. However RED HAT Enterprise Linux is not directly rolled out in companies, rather it is released in various variants like Fedora, CentOS and RHEL. Each of the variants are explained as:

Fedora:
  • Free, community driven, run by Red Hat company.
  • Focused on quick releases (~ 6 months)
Red Hat Enterprise:
  • Commercial version based on Fedora
  • Focused on long stable release
CentOS (Community ENTprise Operating System):
  • Free version based on commercial Red Hat
  • Community supported, stable features
Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 19-02-2018
Session Name: Introduction to Unix/Linux
Summary of learning: Learning about UNIX & Linux

Friday 16 February 2018

Configuring Windows Recovery & Windows Update

Windows Recovery & Windows Update

Ratings:10+5=15

Understanding Windows Updates

  • Windows Update is a Free Online Service from Microsoft. It allows users to detect and install updates for Microsoft products installed on a Windows system.
  • The types of updates are:


  1. Service Packs: It is a periodic update that corrects problems in one version of a product. Service packs provide tools, drivers and updates that extend product functionality, including enhancements developed after the product was released.
  2. Regular Updates: These are code fixes for products that are provided to individual Windows 10 customers. Updates are not intended for general installation. It can be noted that, customers may receive a custom update that is designed to enhance functionality present only within their organisation.
  3. Security Updates: These updates address security vulnerabilities. Attackers seeking to break into systems can exploit such vulnerabilities. Security updates are similar to regular updates but it is considered mandatory and it must be deployed as an when required.

Deploying Windows Updates

There are 3 methods to deploy windows update to corresponding Windows 10 PCs. They are:

  • Manual Method: It is recommended for local users of Windows 10 PCs, typically for Personal Devices or Non-Networked Devices.
  • WSUS, Windows Server Update Services Method: It is recommended for Small to Medium Enterprises. To deploy windows updates on corporate devices. The WSUS service is installed on the company server and this WSUS server authorizes the corresponding devices to receive the updates deployed by the Server.
  • The large diversified enterprises prefer automated method of Update Deployment, this is possible through integration of SCCM, System Center Configuration Manager and WSUS Server. This integration leads to automated deployment of Updates. It should be noted that, in Windows 10 Manual method, the users cannot select specific individual updates to install. While Administrators from SCCM, WSUS and Intune can select updates to be approved for installaion.
Name of Student : Harsh Tiwari
Faculty Name : Naresh  Sir
Roll No :  JK-ENR-SW-1621
Date :16-02-2018
Session Name : Configuring Windows Recovery & Windows Update
Summary of learning : Learning about Windows Recovery & Windows Update

Wednesday 7 February 2018

Manage Storage

Managing Windows 10 BitLocker

Ratings: 10+5=15

BitLocker Basics:

  • Encryption software like BitLocker war introduced in Windows 7 and revised in later Operating System version like Windows 8.1.
  • The objective of Bitlocker is to encrypt data stored on Operating System and Data Volumes.
  • BitLocker provides Offline and Start-Up Protection to the data stored on the volumes.
  • BitLocker uses TPM Chip to protect the kyes used to encrypt your computer's data. TPM (Trusted Platform Module), TPM 1.2 supports a single "owner" authorization, with RSA 2048 Bits security standards.
  • While, TPM 2.0 has the similar functionality, additionally it used for signing/attestation with unique "owner" authorization encryption.
  • BitLocker To Go is a process in BitLocker used to encrypt the removable media.

BitLocker and Windows 10:

  • BitLocker is supported on Windows 10 editions like Windows 10 Pro, Enterprise, Education, Mobile and Mobile Enterprise.
  • BitLocker in Windows 10 supportd XTS-AES encryption algorithm. XTS stsnds for XEX-based tweaked-codebook mode with cipher text stealing, AES (Advanced Encryption Standard), to encrypt data on drives.
  • Bitlocker can encrypt a drive and the recovery keys can be saved on Azure Active Directory.
  1. Device Health Attestation, is introduced in Windows 10, it integrates with Windows 10 Mobile Device Management (MDM), framework for Open Mobile Alliance (OMA) standards.
  2. Device Guard is ability to lockdown devices in a way that meets malware protection against new and unknown malware variants.
  3. Credential Guard is the ability to store credentials (that is NTLM hashes and Kerberos tickets), credentials are stored in isolated containers which use Hyper-V and virtualization based security for additional protection.

BitLocker Deployment Options:

  • Start-Up Key: In this method, no TPM chip is required. USB contains the start-up key. Computer BIOS must support USB drive access during system boot.
  • TPM Chip Only: TPM is  a security chip on motherboard used to provide secure storage. TPM is activated in BIOS. It must be oted that if drives are moved to another system, it will no longer be protected.
  • TPM with PIN: The encryption key is stored in TPM. The user needs to enter a pin to unlock this device.This option can be enabled through Group Policy.
  • TPM with Start-Up Key: The TPM chip controls the Boot-Up process, the start-up key is stored in USB stick, it should be enabled through Group Policy.
  • TPM+PIN+Start-Up Key: This is the most secure and potentially hardest to manage option. The start-up key is stored in the USB stick, encryption key is stored in TPM. This model supports the Multi-Factor Authentication. This method is enabled through Group Policy.

BitLocker To Go:

  • BitLocker To Go, is used to support encryption for devices like:
  1. Flash Drives
  2. SD Cards
  • The condition is removable drives must be formatted with NTFS or FAT file systems
  1. You can Use Password Or Smartcard to unlock the BitLocker To Go Drives.
  2. Note, in a Windows 10 Device, access conntrol panel, Navigate to BitLocker Drive Encryption, to access the features of "bitLocker To Go".


Name of Student : Harsh Tiwari
Faculty Name : Naresh
Roll No :  JK-ENR-SW-1621
Date :09-02-2018
Session Name : Manage Storage
Summary of learning : Learning about managing Windows 10 BitLocker

Networking Devices

Networking Devices Ratings:10+5=15 Introducing Networking Device: Networking: Network is a collaboration or connection of t...