Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Explain about Operating System Security?

Answer Posted / andy rachman

In Indonesia
=============
SIstem operasi adalah salah satu bagian dari software.
Software sendiri dibagi menjadi 2 bagian :
1. Software System
2. Software Application

Software System terdiri dari Sistem Operasi (bagian paling
bawah),
Compiler, Editor dan Interpreter (pada bagian atas).
Sedangkan Software Application merupakan aplikasi yang
diciptakan untuk
menyelesaikan masalah-masalah yang dimiliki oleh pengguna,
misalnya :
Pemutar Musik MP3 - WInamp, Pembaca file PDF - Acrobat Reader,
Pemutar Film *.MOV - Quick Time, dan lain-lain.

Setiap Sistem Operasi mesti mempunyai keamanan,
Sistem Operas yang paling banyak digunakan saat ini adalah
1. Windows
2. Linux/UNIX

Untuk Windows Sistem Kemanannya tidak sebaik Linux/UNIX, hal
ini disebabkan
karena di WIndows tidak dibedakan kepemilikan file,
sedangkan pada Linux/Unix
kepemilikan file dibedakan.
Pada Linux/UNIX terdapat 3 buah hak akses :
1. Pemilik File
2. Anggota
3. Orang lain.

Sehingga jika kita memiliki file Delphi.pdf pada saat kita
berikan kemanan,
keamanan tersebut hanya dikenakan pada file dan tidak
melihat siapa pemiliknya,
misalnya keamanan yang dipakai adalah diberikan atribut
Hidden. Baik pemilik,
ataupun orang lain tidak akan bisa melihat file tersebut,
hal berlaku pada
sistem operasi WIndows.

Sedangkan pada sistem operasi Linux/UNIX, maka sistem
operasi akan
membedakan hak dari Pemilik, hak dari Anggota dan hak dari
orang lain.
Misal Hak Pemilik RWX (Read Write Execute), Hak Anggota
(R-X) dan
Hak orang lain (--X), maka Pemilik file bisa melakukan
pembacaan file,
bisa mengubah file dan bisa menyimpan hasil perubahan
tersebut, sedangkan
Hak Anggota hanya bisa membaca dan mengeksekusinya saja,
sedangkan
Hak Orang Lain hanya bisa mengeksekusi aplikasi yang
menempel padanya,
dalam hal ini *.pdf reader.

In English :

The operating system is part of the software.
Software is divided into 2 parts:
1. Software System
2. Software Application

System software consists of Operating System (at bottom),
Compiler, Editor and Interpreter (on top).
While the Software Application is an application that was
created for solve the problems which are owned by the user,
for example:
A. MP3 Music Player - Winamp,
B. Reader PDF file - Acrobat Reader,
C.Movie Player *. MOV - QuickTime, etc.

Each operating system has security system,
The operating system most used today is
1. Windows
2. Linux / UNIX

For Windows Security System not as good as Linux / UNIX,
this is due to because in Windows do not distinguish the
ownership of a file, whereas on Linux / Unix ownership of
files are distinguished.
On Linux / UNIX there are 3 pieces of access rights:
1. Owner Files
2. Members
3. Others.

So if we have a file Delphi.pdf when we give security,
security only applies to files and did not see who the
owner, security that is used is given Hidden attribute. Both
the owner, or another person will not be able to view the
file, it applies to Windows operating system.

While on the operating system Linux / UNIX, the operating
system will distinguish the rights of owners, the rights of
Members and the rights of others.
A. Rights Owner RWX (Read Write Execute),
B. Members has user right (R-X) and
C. The Other has (--X),

it's mean that the owner of the file can do the reading
file, change the file and save changes, whereas
Rights of Members can only read and execute only, whereas
Rights of Others can only execute applications that are
attached to it, in this case *. pdf reader.

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which is the best page replacement algorithm and Why? How

937


How do I enable plugins on firefox?

1074


When would you choose Top-down methodology?

2312


Tell something about deadlock and how can we prevent dead lock?

1113


What is plumbing/piping?

1010


What are placement and replacement algorithms in the context of memory management?

1127


How much ram can you put in a 64 bit system?

1134


What is sudo user?

978


What is chkdsk command?

1118


What is the trc timing?

1042


How can I make usb bootable?

913


Explain arm-stickiness?

989


Mention the steps involved in the execution of a program.

944


Explain the positioning time for a disk.

1078


Which os is best for coding?

950