Unit-5 (OS)
Unit-5 (OS)
Chapter-1
System Protection
Goals of Protection
Today the computer systems have become more sophisticated and universal in
their applications; the need to protect their integrity has also grown. Protection was
originally considered as an adjunct to multiprogramming operating systems, so that
unreliable users might safely share a common logical name space, such as a directory
of files, or share a common physical name space, such as memory. Modern protection
concepts have evolved to increase the reliability of any complex system that makes
use of shared resources. We need to provide protection for several reasons. The most
obvious is the need to prevent the mischievous, intentional violation of an access
restriction by a user. Safe sharing of a common logical address space(directory of
files) or common physical address space(memory). If anyone want to share a file or
directory, it should be shared safely. Fair and reliable resource usage Program in the
system resource can use the reliable resource only accordance to the policies which
are stated that particular process
E.g. Process P1--→ granted to use only Printer. P1→ is not granted to access
using printer, using scanner, and etc. that will be unfair
Principles of Protection
Domain of Protection
1
modes for which it needs access and only during the time frame when it needs
access.
The modes available for a particular object may depend upon its type .
Domain Structure
An Example: UNIX
2
An Example: MULTICS
Rings are numbered from 0 to 7, with outer rings having a subset of the
privileges of the inner rings.
Each file is a memory segment, and each segment description includes an entry
that indicates the ring number associated with that segment, as well as read,
write, and execute privileges.
Each process runs in a ring, according to the current-ring-number, a counter
associated with each process.
A process operating in one ring can only access segments associated with
higher ( farther out ) rings, and then only according to the access bits.
Processes cannot access segments associated with lower rings.
Domain switching is achieved by a process in one ring calling upon a process
operating in a lower ring, which is controlled by several factors stored with each
segment descriptor:
o An access bracket, defined by integers b1 <= b2.
o A limit b3 > b2
o A list of gates, identifying the entry points at which the segments may
be called.
If a process operating in ring i calls a segment whose bracket is such that b1
<= i <= b2, then the call succeeds and the process remains in ring i.
Otherwise a trap to the OS occurs, and is handled as follows:
o If i < b1, then the call is allowed, because we are transferring to a
procedure with fewer privileges. However if any of the parameters being
passed are of segments below b1, then they must be copied to an area
accessible by the called procedure.
3
oIf i > b2, then the call is allowed only if i <= b3 and the call is directed to
one of the entries on the list of gates.
Overall this approach is more complex and less efficient than other protection
schemes.
Access Matrix
The Access Matrix is a security model for a computer system's protection state.
It is described as a matrix. An access matrix is used to specify the permissions of
each process running in the domain for each object. The rows of the matrix represent
domains, whereas the columns represent objects. Every matrix cell reflects a set of
access rights granted to domain processes, i.e., each entry (i, j) describes the set of
operations that a domain Di process may invoke on object Oj.
There are various methods of implementing the access matrix in the operating
system. These methods are as follows:
1. Global Table
4. Lock-Key Mechanism
Global Table
Every access matrix column may be used as a single object's access list. It is
possible to delete the blank entries. For each object, the resulting list contains
ordered pairs <domain, rights-set> that define all domains for that object and a
nonempty set of access rights.
We may start by checking the default set and then find the access list. If the
item is found, we enable the action; if it isn't, we verify the default set. If M is in the
default set, we grant access. Access is denied if this is not the case, and an
extraordinary scenario arises.
4
Capability Lists for Domains
A domain's capability list is a collection of objects and the actions that can be
done on them. A capacity is a name or address that is used to define an object. If you
want to perform operation M on object Oj, the process runs operation M, specifying
the capability for object Oj. The simple possession of the capability implies that
access is allowed.
In most cases, capabilities are separated from other data in one of two ways.
Every object has a tag to indicate its type as capability data. Alternatively, a
program's address space can be divided into two portions. The programs may access
one portion, including the program's normal instructions and data. The other portion
is a capability list that is only accessed by the operating system.
Lock-Key Mechanism
It is a compromise between the access lists and the capability lists. Each object
has a list of locks, which are special bit patterns. On the other hand, each domain has
a set of keys that are special bit patterns. A domain-based process could only access
an object if a domain has a key that satisfies one of the locks on the object. The
process is not allowed to modify its keys.
Example:
In this example, there are 4 domains and objects in the above matrix, and also
consider 3 files (including F1, F2, and F3) and one printer. Files F1 and F3 can be read
by a process running in D1. A process running in domain D4 has the same rights
as D1, but it may also write on files. Only one process running in domain D2 has
access to the printer. The access matrix mechanism is made up of various policies
5
and semantic features. Specifically, we should ensure that a process running in
domain Di may only access the objects listed in row i.
The protection policies in the access matrix determine which rights must be
included in the (i j)th entry. We should also choose the domain in which each process
runs. The OS usually decides this policy. The Users determine the data of the access-
matrix entries.
The relationship between the domain and the processes might be static or
dynamic. The access matrix provides a way for defining the control for this domain-
process association. We perform a switch action on an object when we switch a
process from one domain to another. We may regulate domain switching by
containing domains between the access matrix objects. If they have access to switch
rights, processes must be enabled to switch from one domain (Di) to another
domain (Dj).
Access control
6
also reduces the risk of data exfiltration by employees and keeps web-based threats
at bay. Rather than manage permissions manually, most security-driven
organizations lean on identity and access management solutions to implement access
control policies.
There are four main types of access control – each of which administrates
access to sensitive information in a unique way.
Discretionary Access Control (DAC)
In DAC models, every object in a protected system has an owner,
and owners grant access to users at their discretion. DAC provides case-
by-case control over resources
Mandatory Access Control (MAC)
In MAC models, users are granted access in the form of a clearance.
A central authority regulates access rights and organizes them into tiers,
which uniformly expand in scope. This model is very common in
government and military contexts
Role Based Access Control (RBAC)
In RBAC models, access rights are granted based on defined
business functions, rather than individuals’ identity or seniority. The goal
is to provide users only with the data they need to perform their jobs—
and no more
Attribute Based Access Control (ABAC)
In ABAC models, access is granted flexibly based on a combination
of attributes and environmental conditions, such as time and location.
ABAC is the most granular access control model and helps reduce the
number of role assignments
7
Implementation of Access Control
Connect on goals
Align with decision makers on why it’s important to implement an access
control solution. There are many reasons to do this—not the least of which is
reducing risk to your organization. Other reasons to implement an access
control solution might include:
• Productivity: Grant authorized access to the apps and data employees
need to accomplish their goals—right when they need them.
• Security: Protect sensitive data and resources and reduce user access
friction with responsive policies that escalate in real-time when threats arise.
• Self-service: Delegate identity management, password resets, security
monitoring, and access requests to save time and energy.
Select a solution
Choose an identity and access management solution that allows you to both
safeguard your data and ensure a great end-user experience. The ideal
should provide top-tier service to both your users and your IT department—
from ensuring seamless remote access for employees to saving time for
administrators.
Set strong policies
Once you’ve launched your chosen solution, decide who should access your
resources, what resources they should access, and under what conditions.
Access control policies can be designed to grant access, limit access with
session controls, or even block access—it all depends on the needs of your
business.
9
Chapter-2
System Security
System security
System security may be threatened through two violations, and these are as
follows:
1. Threat
A program that has the potential to harm the system seriously.
2. Attack
A breach of security that allows unauthorized access to a resource.
There are two types of security breaches that can harm the system: malicious
and accidental. Malicious threats are a type of destructive computer code or web
script that is designed to cause system vulnerabilities that lead to back doors and
security breaches. On the other hand, Accidental Threats are comparatively easier to
protect against.
Security may be compromised through the breaches. Some of the breaches are
as follows:
1. Breach of integrity
This violation has unauthorized data modification.
2. Theft of service
It involves the unauthorized use of resources.
3. Breach of confidentiality
It involves the unauthorized reading of data.
4. Breach of availability
It involves the unauthorized destruction of data.
5. Denial of service
It includes preventing legitimate use of the system. Some attacks may be
accidental.
There are several goals of system security. Some of them are as follows:
10
1. Integrity
Unauthorized users must not be allowed to access the system's
objects, and users with insufficient rights should not modify the system's
critical files and resources.
2. Secrecy
The system's objects must only be available to a small number of
authorized users. The system files should not be accessible to everyone.
3. Availability
All system resources must be accessible to all authorized users, i.e.,
no single user/process should be able to consume all system resources. If
such a situation arises, service denial may occur. In this case, malware
may restrict system resources and preventing legitimate processes from
accessing them.
Program threats
The operating system's processes and kernel carry out the specified task as
directed. Program Threats occur when a user program causes these processes to do
malicious operations. The common example of a program threat is that when a
program is installed on a computer, it could store and transfer user credentials to a
hacker. There are various program threats. Some of them are as follows:
1.Virus
A virus may replicate itself on the system. Viruses are extremely
dangerous and can modify/delete user files as well as crash computers. A virus
is a little piece of code that is implemented on the system program. As the user
interacts with the program, the virus becomes embedded in other files and
programs, potentially rendering the system inoperable.
2. Trojan Horse
This type of application captures user login credentials. It stores them to
transfer them to a malicious user who can then log in to the computer and
access system resources.
3. Logic Bomb
A logic bomb is a situation in which software only misbehaves when
particular criteria are met; otherwise, it functions normally.
4. Trap Door
A trap door is when a program that is supposed to work as expected has
a security weakness in its code that allows it to do illegal actions without the
user's knowledge.
System Threats
System threats are described as the misuse of system services and network
connections to cause user problems. These threats may be used to trigger the
11
program threats over an entire network, known as program attacks. System threats
make an environment in which OS resources and user files may be misused. There
are various system threats. Some of them are as follows:
1. Port Scanning
It is a method by which the cracker determines the system's
vulnerabilities for an attack. It is a fully automated process that includes
connecting to a specific port via TCP/IP. To protect the attacker's identity, port
scanning attacks are launched through Zombie Systems, which previously
independent systems now serve their owners while being utilized for such
terrible purposes.
2. Worm
The worm is a process that can choke a system's performance by
exhausting all system resources. A Worm process makes several clones, each
consuming system resources and preventing all other processes from getting
essential resources. Worm processes can even bring a network to a halt.
3. Denial of Service
Denial of service attacks usually prevents users from legitimately using
the system. For example, if a denial-of-service attack is executed against the
browser's content settings, a user may be unable to access the internet.
Network Threats
1. Unauthorized access
12
Many websites accept user inputs and fail to validate and sanitize those inputs.
Attackers can then fill out a form or make an API call, passing malicious code
instead of the expected data values. The code is executed on the server and
allows attackers to compromise it.
5. Privilege escalation
Once attackers penetrate your network, they can use privilege escalation to
expand their reach. Horizontal privilege escalation involves attackers gaining
access to additional, adjacent systems, and vertical escalation means attackers
gain a higher level of privileges for the same systems.
6. Insider threats
A network is especially vulnerable to malicious insiders, who already have
privileged access to organizational systems. Insider threats can be difficult to
detect and protect against, because insiders do not need to penetrate the
network in order to do harm. New technologies like User and Even Behavioral
Analytics (UEBA) can help identify suspicious or anomalous behavior by internal
users, which can help identify insider attacks.
4. Authenticity: Authenticity ensures the sender and recipient can verify each
other’s identities and the destination of the message.
History of Cryptography
Cryptography began with ciphers, the first of which was the Caesar Cipher.
Ciphers were a lot easier to unravel compared to modern cryptographic algorithms,
13
but they both used keys and plaintext. Though simple, ciphers from the past were the
earliest forms of encryption. Today’s algorithms and cryptosystems are much more
advanced. They use multiple rounds of ciphers and encrypting the ciphertext of
messages to ensure the most secure transit and storage of data. There are also
methods of cryptography used now that are irreversible, maintaining the security of
the message forever.
The reason for more advanced cryptography methods is due to the need for
data to be protected more and more securely. Most of the ciphers and algorithms
used in the early days of cryptography have been deciphered, making them useless
for data protection. Today’s algorithms can be deciphered, but it would require years
and sometimes decades to decipher the meaning of just one message. Thus, the race
to create newer and more advanced cryptography techniques continues.
Email messages
SIM card authentication
Web security
Exchange of private keys
Types of Cryptography
Cryptography can be broken down into three different types:
14
AES
DES
Caesar Cipher
One key is kept private, and is called the “private key”, while the other is
shared publicly and can be used by anyone, hence it is known as the “public key”. The
mathematical relation of the keys is such that the private key cannot be derived from
the public key, but the public key can be derived from the private. The private key
15
should not be distributed and should remain with the owner only. The public key can
be given to any other entity.
Examples:
ECC
Diffie-Hellman
DSS
Hash functions are irreversible, one-way functions which protect the data, at
the cost of not being able to recover the original message. Hashing is a way to
transform a given string into a fixed length string. A good hashing algorithm will
produce unique outputs for each input given. The only way to crack a hash is by
trying every input possible, until you get the exact same hash. A hash can be used for
hashing data (such as passwords) and in certificates.
MD5
SHA-1
SHA-2 family which includes SHA-224, SHA-256, SHA-384, and SHA-
512
SHA-3
Whirlpool
Blake 2
Blake 3
User Authentication
Organizations need to understand that passwords are not the only way to
authenticate users. There is a wide variety of authentication technologies and an even
greater range of activities that require authentication methods.
Cybercriminals can gain access to a system and steal information when user
authentication is not secure. The data breaches companies like Adobe, Equifax, and
16
Yahoo faced are examples of what happens when organizations fail to secure their
user authentication.
Hackers gained access to Yahoo user accounts to steal contacts, calendars and
private emails between 2012 and 2016. The Equifax data breach in 2017 exposed
credit card data of more than 147 million consumers. Without a secure authentication
process, any organization could be at risk.
1. Password-based authentication
The bottom line is that passwords have a lot of weaknesses and are not
sufficient in protecting online information. Hackers can easily guess user
credentials by running through all possible combinations until they find a match.
2. Multi-factor authentication
17
Multi-Factor Authentication (MFA) is an authentication method that
requires two or more independent ways to identify a user. Examples include
codes generated from the user’s smartphone, Captcha tests, fingerprints, voice
biometrics or facial recognition.
3. Certificate-based authentication
The certificate contains the digital identity of a user including a public key,
and the digital signature of a certification authority. Digital certificates prove the
ownership of a public key and issued only by a certification authority.
Users provide their digital certificates when they sign in to a server. The
server verifies the credibility of the digital signature and the certificate
authority. The server then uses cryptography to confirm that the user has a
correct private key associated with the certificate.
4. Biometric authentication
5. Token-based authentication
19
security levels and help keep our private data secure. One such tool is a 'firewall' that
prevents unauthorized access and keeps our computers and data safe and secure.
Apart from that, there are cloud-based firewalls. They are commonly referred to
as FaaS (firewall as a service). A primary advantage of using cloud-based firewalls is
that they can be managed centrally. Like hardware firewalls, cloud-based firewalls are
best known for providing perimeter security.
20
Firewalls are designed in such a way that they can react quickly to detect and
counter-attacks throughout the network. They can work with rules configured to
protect the network and perform quick assessments to find any suspicious activity. In
short, we can point to the firewall as a traffic controller.
1. Open Access
3. Network Crashes
In the absence of a firewall, anyone could access our network and shut
it down. It may lead us to invest our valuable time and money to get our
network working again.
Therefore, it is essential to use firewalls and keep our network, computer, and
data safe and secure from unwanted sources.
Firewalls have been the first and most reliable component of defense in network
security for over 30 years. Firewalls first came into existence in the late 1980s. They
were initially designed as packet filters. These packet filters were nothing but a setup
of networks between computers. The primary function of these packet filtering
firewalls was to check for packets or bytes transferred between different computers.
The turn of the century saw a new approach to firewall implementation during
the mid-2010. The 'Next-Generation Firewalls' were introduced by the Palo Alto
Networks. These firewalls came up with a variety of built-in functions and capabilities,
such as Hybrid Cloud Support, Network Threat Prevention, Application and Identity-
21
Based Control, and Scalable Performance, etc. Firewalls are still getting new features
as part of continuous development. They are considered the first line of defense when
it comes to network security.
Since the firewall acts as a barrier or filter between the computer system and
other networks (i.e., the public Internet), we can consider it as a traffic controller.
Therefore, a firewall's primary function is to secure our network and information by
controlling network traffic, preventing unwanted incoming network traffic, and
validating access by assessing network traffic for malicious things such as hackers
and malware.
Generally, most operating systems (for example - Windows OS) and security
software come with built-in firewall support. Therefore, it is a good idea to ensure
that those options are turned on. Additionally, we can configure the security settings
of the system to be automatically updated whenever available.
o Scalable Performance
o Access Validation
Limitations of Firewall
When it comes to network security, firewalls are considered the first line of
defense. But the question is whether these firewalls are strong enough to make our
devices safe from cyber-attacks. The answer may be "no". The best practice is to use
a firewall system when using the Internet. However, it is important to use other
defense systems to help protect the network and data stored on the computer.
Because cyber threats are continually evolving, a firewall should not be the only
consideration for protecting the home network.
23
Types of Firewall
o Proxy Firewall
o Packet-filtering firewalls
Firewalls and anti-viruses are systems to protect devices from viruses and other
types of Trojans, but there are significant differences between them. Based on the
vulnerabilities, the main differences between firewalls and anti-viruses are tabulated
below:
24
as a network controlling responsible for detecting and
system. It means that removing viruses from computer
firewalls are primarily systems or other devices. These
responsible for monitoring viruses can be in the form of
and filtering network infected files or software.
traffic.
1 Type A
Highest Level. Uses formal design specifications and verification techniques.
Grants a high degree of assurance of process security.
2 Type B
Provides mandatory protection system. Have all the properties of a class C2
system. Attaches a sensitivity label to each object. It is of three types.
B1 − Maintains the security label of each object in the system. Label is
used for making decisions to access control.
B2 − Extends the sensitivity labels to each system resource, such as
storage objects, supports covert channels and auditing of events.
B3 − Allows creating lists or user groups for access-control to grant
access or revoke access to a given named object.
25
3 Type C
Provides protection and user accountability using audit capabilities. It is of
two types.
C1 − Incorporates controls so that users can protect their private
information and keep other users from accidentally reading / deleting
their data. UNIX versions are mostly Cl class.
C2 − Adds an individual-level access control to the capabilities of a Cl
level system.
4 Type D
Lowest level. Minimum protection. MS-DOS, Window 3.1 fall in this category.
26
Chapter- 3
Case Studies
Linux
Evolution of Linux OS
27
1) Kernel
28
o device management: A system has many devices connected to it like CPU, a
memory device, sound cards, graphic cards, etc. A kernel stores all the data
related to all the devices in the device driver (without this kernel won't be able
to control the devices). Thus kernel knows what a device can do and how to
manipulate it to bring out the best performance. It also manages
communication between all the devices. The kernel has certain rules that have
to be followed by all the devices.
o Memory management: Another function that kernel has to manage is the
memory management. The kernel keeps track of used and unused memory and
makes sure that processes shouldn't manipulate data of each other using virtual
memory addresses.
o Process management: In the process, management kernel assigns enough
time and gives priorities to processes before handling CPU to other processes. It
also deals with security and ownership information.
o Handling system calls: Handling system calls means a programmer can write
a query or ask the kernel to perform a task.
2) System Libraries
System libraries are special programs that help in accessing the kernel's
features. A kernel has to be triggered to perform a task, and this triggering is done by
the applications. But applications must know how to place a system call because each
kernel has a different set of system calls. Programmers have developed a standard
library of procedures to communicate with the kernel. Each operating system
supports these standards, and then these are transferred to system calls for that
operating system.
The most well-known system library for Linux is Glibc (GNU C library).
3) System Tools
Linux OS has a set of utility tools, which are usually simple commands. It is a
software which GNU project has written and publish under their open source license
so that software is freely available to everyone.
With the help of commands, you can access your files, edit and manipulate data
in your directories or files, change the location of files, or anything.
4) Development Tools
With the above three components, your OS is running and working. But to
update your system, you have additional tools and libraries. These additional tools
29
and libraries are written by the programmers and are called toolchain. A toolchain is a
vital development tool used by the developers to produce a working application.
These end tools make a system unique for a user. End tools are not required for
the operating system but are necessary for a user.
Some examples of end tools are graphic design tools, office suites, browsers,
multimedia players, etc.
This is one of the most asked questions about Linux systems. Why do we use a
different and bit complex operating system, if we have a simple operating system like
Windows? So there are various features of Linux systems that make it completely
different and one of the most used operating systems. Linux may be a perfect
operating system if you want to get rid of viruses, malware, slowdowns, crashes,
costly repairs, and many more. Further, it provides various advantages over other
operating systems, and we don't have to pay for it. Let's have a look at some of its
special features that will attract you to switch your operating system.
Most OS come in a compiled format means the main source code has run
through a program called a compiler that translates the source code into a language
that is known to the computer.
30
In short, Linux is an operating system that is "for the people, by the people."
And we can dive in Linux without paying any cost. We can install it on Multiple
machines without paying any cost.
It is secure
Linux supports various security options that will save you from viruses,
malware, slowdowns, crashes. Further, it will keep your data protected. Its security
feature is the main reason that it is the most favorable option for developers. It is not
completely safe, but it is less vulnerable than others. Each application needs to
authorize by the admin user. The virus cannot be executed until the administrator
provides the access password. Linux systems do not require any antivirus program.
Linux is suitable for the developers, as it supports almost all of the most used
programming languages such as C/C++, Java, Python, Ruby, and more. Further, it
facilitates with a vast range of useful applications for development.
Developers find that the Linux terminal is much better than the Windows
command line, So, they prefer terminal over the Windows command line. The
package manager on Linux system helps programmers to understand how things are
done. Bash scripting is also a functional feature for the programmers. Also, the SSH
support helps to manage the servers quickly.
Linux is a flexible OS, as, it can be used for desktop applications, embedded
systems, and server applications. It can be used from wristwatches to
supercomputers. It is everywhere in our phones, laptops, PCs, cars and even in
refrigerators. Further, it supports various customization options.
Linux Distributions
Many agencies modified the Linux operating system and makes their Linux
distributions. There are many Linux distributions available in the market. It provides a
different flavor of the Linux operating system to the users. We can choose any
distribution according to our needs. Some popular distros are Ubuntu, Fedora,
Debian, Linux Mint, Arch Linux, and many more.
For the beginners, Ubuntu and Linux Mint are considered useful and, for the
proficient developer, Debian and Fedora would be a good choice.
31
Also, Linux OS includes some core GNU tools to provide a way to manage the
kernel resources, install software, configure the security setting and performance, and
many more. All these tools are packaged together to make a functional operating
system.
We can use Linux through an interactive user interface as well as from the
terminal (Command Line Interface). Different distributions have a slightly different
user interface but almost all the commands will have the same behavior for all the
distributions. To run Linux from the terminal, press the "CTRL+ALT+T" keys. And, to
explore its functionality, press the application button given on the left down corner of
your desktop.
Microsoft Windows
It was released for both home computing and professional functions of Windows
on 10 November 1983. Later, it was released on many versions of Windows as well as
the current version, Windows 10.
Editions of Windows
Microsoft has produced several editions of Windows, starting with Windows XP.
These versions have the same core operating system, but some versions included
advance features with an additional cost. There are two most common editions of
Windows:
o Windows Home
o Windows Professional
Windows Home
Windows Professional
Business laptops or computers mainly use the Bitlocker feature to protect their
data on the computer. As if your computer has been stolen, it is very difficult to break
the Bitlocker password. It can be unlocked by entering the correct password only.
Furthermore, if you forget your Bitlocker password, it cannot be retrieved.
33
o It provides support for the systems that have more than 128 GB of RAM.
When Microsoft Windows was not introduced, all of the Microsoft users were
used MS-DOS operating system. Microsoft gave one word to most of its products; it
required a new Word that can represent its new GUI operating system. Microsoft
decided to call it Windows because it has the ability to perform several tasks and run
applications simultaneously.
Another reason behind calling it Windows was that you could not trademark a
common name like Windows. Its official name was Microsoft Windows, the first
version 1.0 of Windows was introduced in 1995.
Version History
34
Windows It was released in June 1988, and at the beginning, its
286 price was $100.00.
Windows It was the first Windows that needed a hard drive. It was
3.0 launched by Microsoft on 22 May 1990. Its full version was
sold for $149.95, and the updated version was $79.95.
Additionally, the multimedia supported Windows 3 was
introduced in October 1991.
35
was launched.
o On 21 September 1994, the Windows NT 5 was
introduced.
o The next version Windows NT 3.51, was introduced
on 30 May 1995.
Windows
o The first version 0 of Windows CE was introduced
CE
in November 1996.
o The Second version 0 of Windows CE was launched
in November 1997.
o The next version 1 of Windows CE was released
in July 1998.
o The third version, 3.0 of Windows CE, was introduced
in 1999.
36
Windows It was developed on Windows 95, and introduced in June
98 1998. It was released, including Internet Explorer 4,
Windows Address Book, Outlook Express, Microsoft Chat,
and NetShow Player.
The second version of Windows 98 was introduced on 5
May 1999, in this version the NetShow Player was replaced
by Windows Media Player 6.2. It was also brought with the
address bar and back/forward navigation buttons in
Windows Explorer, and more other features.
Windows 98 came with the new feature Windows Driver
model for computer components and accessories, which
offered support to all future editions of Windows.
Furthermore, it was improved USB support including USB
mice and USB hubs.
37
introduced on 24 April 2005.
38
it a default browser. Consequently, it had to provide the
users the option to choose and install the browser on the
first boot.
Features of Windows
Microsoft Windows includes a lot of features to help users. Some of its excellent
features are as follows:
39
2. Cortana: Windows 10 introduced a feature named Cortana, which is able to
accept voice commands. It can perform various tasks such as it can answers
your questions, search data on your computer, online purchases, set reminders,
and appointments, etc. Furthermore, it acts like other voice-activated services
such as Google Assistant, Alexa, or Siri, including one more benefit of searching
the information on your computer. To open the Cortana in Windows 10,
press Window key + S.
40
3. File Explorer: It is also known as Windows Explorer, which displays your files
and folders on the computer. It allows users to browse the data on the hard
drive, SSD and other inserted removable disks like pen drives and CDs, and you
can manage the content according to the requirements such as delete, rename,
search, and transfer the data.
41
browser in Microsoft Windows from the Windows edition 95 to 8.1 version.
7. Start menu: Microsoft Windows contains a start menu to the left side of the
taskbar. It displays programs and utilities that are installed on the computer. It
can be simply opened by clicking on the Start menu button or pressing the start
key on the keyboard.
42
8. Task Manager: Windows includes the task manager feature that provides
detail of the running applications or programs on the computer. You can also
check how much of the system resources, such as RAM, CPU, disk I/O, are
being used by each of the applications.
9. Disk Cleanup: It is used to free up disk space with the help of deleting
temporary or unnecessary files. It also helps to enhance the performance of the
computer, and boost storage space to download the programs and documents.
To open Disk Cleanup, follow the below steps:
o Open the File Explorer by pressing Window + E.
o Then, right-click on any disk drive and select Properties option from the
drop-down list.
43
o Now, click on the Disk Cleanup.
Reliability Windows has improved its Linux is more reliable and secure
reliability in the past few years, then Windows OS. It mainly
but still it is less reliable as focuses on system security,
compared to Linux. process management, and up-
time.
44
Security Microsoft has enhanced the Linux is a more secure operating
security features in Windows system as compared to Microsoft
over recent years. As it has a Windows. Even attackers found
huge user base, mostly for new difficulty in breaking the security
computer users, it can be easily with the help of Linux.
targeted for malicious coders.
Furthermore, among all of the
operating systems, Microsoft
Windows can be part of
developing malware and
viruses.
Support It provides users the online and A wide number of books are
integrated help systems, as well available to offer help about
as a large number of Linux, including online support.
informative books, are available
to provide help for people at all
skill levels.
Updates Regular Windows update makes Linux provides users full control
users frustrated by alerting the over updates. They can update it
Windows update for accordingly, and it takes less time
inconvenient times. to get an update as well as
Additionally, it takes more time without any reboot the system.
to get an update.
45