**OPERATING SYSTEM**

 

 

                                                                         www.bilalahmad.20m.com ! Its My Home on Internet...

 

 


 * Home* *About Me* *Guest Book* * Games* *Tips* * Al-Islam/Pakistan*


 

SERIAL NO.

 

DESCRIPTION

1

Type of OS

2

Feature of OS

3

Architecture of OS

4

Windows NT environment

5

Installation and Configuration of WinNT

6

Managing file system

7

Managing Partition

8

Managing Fault Tolerance

9

WinNT network services

10

WinNT protocols

11

Using WinNT (multi vender)

12

Intro: administering WinNT

13

User & group management

14

Securing network resources, NTFS permission

15

Administering network printer

16

Intro: to UNIX & LINUIX

17

Core architecture & features

18

File system & management

19

Commands (User level)

20

Commands (User level)

21

Administration of User A/C

22

Administration of Backup

23

Administration of printing

 

 

 

 

 

 

 

 

 

 

 

**TYPES OF OPERATING SYSTEM**

OPERATING SYSTEM:

Operating system is software, which is used to manage all the internal and external work of the computer as well as the communication between user and machine.

There are two types of Operating System.

1)      Single User Operating System  2)      Multi User Operating System

Single User Operating System:

In single user operating system one user works on one task at the time. For example DOS is a single user operating system.

Multi User Operating System:

In multi user operating system different users works in an operating system. For example Windows & Windows NT is a multi user operating system.

 

**FEATURES OF OPERATING SYSTEM**

Operating System Stability:

Operating Systems supports each application in its own memory address space. Windows NT keep high stability performance, which is differentiating to other operating system.

Security:

It’s providing local security for files, folders, printers and other resources. Either the local computer or a domain controller must authenticate users in order to access any resources on the computer or network. Security features protect network and local resources.

Multitasking And Multithreaded Operations:

Different applications can run at the same time. Background application can continue while a user works in the foreground. Multiple threads in an application can operate simultaneously.

Reliability:

Windows NT supports application in separate memory address spaces. When applications are running in separate memory address spaces, malfunctioning applications will not affect other application or the operating system.

 

**ARCHITECTURE OF OPERATING SYSTEM**

Control Programming:

Control program maintain the operating system efficiency. The central program of operating system is “Kernel”. Window NT executive runs on kernel, which is the mode of Window NT. Kernel protects the services of operating system.

Operating Systems Compatibilities:

If we works on an operating system and we called another operating system, this method is called the Operating System Compatibilities.

Context Switching:

If we work on more then one tasks, that is called the Context Switching. This commands is ALT+TAB.

 

Virtual Storage Memory:

 

Virtual Storage Place is the temporary memory, which is created by operating system as per requirements. It created on the hard disk.

Real Time Processing:

The Real Time Processing is the concept in which another person can check you that what are you doing at another system.

 

**WINDOWS NT ENVIRONMENT**

Windows NT is a multipurpose network operating system that can act as both a client and a server in a network environment. Windows NT environment supports the Apple talk system, Netware and including Unix operating system.

Oval: Remote Access System
Oval: Apple Talk
Oval: NetWare
Oval: TCP/IP System including UNIX System
Oval: Microsoft
Networks
Text Box: Windows NT

 

 

 

 

 

 

 

 

 


Global User & Local User:

 The global user is always created on server & access on any network machine, but local user is that who is access on that machine where it is created.

There are two types of Administrators.

1) Workstation Administrator:

Windows NT Workstation is optimized for use as a high performance; secure network client and corporate desktop Operating System. Windows NT Workstation can be used alone as a desktop Operating System, networked in a peer-to-peer workgroup environment, or used as a workstation in a Windows NT Server domain environment.

2) Server Administrator:

Windows NT Server is optimized for use as a file, print, and application server that can handle tasks for organizations ranging from small workgroups to enterprise networks. Windows NT Server can also be configured as a member server (a non domain controller).  Server Administrator also called as Domain.

DOMAIN:

A domain is a logical grouping of computers and users. In a domain, all computers have access to a central directory database that stores security and user account information for the domain. One or more Windows NT Server “Domain Controllers” manages the directory database. There are two types of Domain.

1) Primary Domain Controller (PDC):

One computer in each domain, referred to as the primary domain controller (PDC), is responsible for account maintenance. The PDC is defined during installation. The PDC contains the master copy of the directory database for the domain.

2) Backup Domain Controller (BDC):

The PDC periodically copies its directory database to other computers running Windows NT Server in the domain. These computers are designated during installation as backup domain controllers (BDC’s). It is recommended to have at least one BDC in every domain, and it is common to have more than one. If the PDC fails, a domain BDC can be promoted to the role of PDC.

Workgroup & Workstation:

Before adding a machine in domain it is simple a workgroup, but after adding its becomes the workstation.

SYSTEM LOGON PROCESS:

When we start the system of Window NT, three messages (Ctrl+Alt+Del) are appearing on window screen. When we press these keys a new window are appearing on screen, who are consists on User Name, password & Domain. When we enter the password of machine, the system goes to Local Security Authority (LSA). From (LSA) system go to System Account Manager (SAM) & then go to Data Base. From Data Base system again return to LSA. When the system checks that this password is correct he provide the key to logon into the system.

**MANAGING FILE SYSTEMS**

During the installation of Windows NT we also manage the file system as per our requirement on any drive. This is very important for our network security & permission to any user in a network environment.

There are two types of file system that support Windows NT.

These file systems are called as FAT (file allocation table) & NTFS (new technology file system).

 

Flowchart: Magnetic Disk: FAT
Flowchart: Magnetic Disk: NTFS

 

 

 

 

 

 


File Allocation Table (FAT):

FAT is required for Windows 95 & MS-DOS. There is no local security on FAT, but some advantages in FAT file system, which are following.

*          Supports Long File Systems.

*          Maximum File/Partition Size: 4GB

*          Provide the Attribute list of any file & folder & easily hide or unhide to any file or folder.

New Technology File System (NTFS):

The NTFS file system is most secure file system. If security is important in corporate environment, NTFS is the preferred file system for Windows NT Server installation. NTFS allows the administrator to set up permission that specify who can and cannot access files or directories (folder) on the drive. In other words, selecting NTFS allows the administrator to take full advantage of Windows NT’s security features and the FAT file system does not.

The advantages of NTFS file system are following.

*          NTFS provide a local security to any file or folder, which is most required on a network environment.

*          NTFS is the only file system on computers running Windows NT that allows permissions to be assigned to individual files & folders.

*          NTFS also provide the audit system for file or folder and make ownership to any user on a file/folder.

 

**MANAGING PARTITION**

Before a hard disk can be formatted with a file system, the disk must first be partitioned. Partitions are logical divisions of a hard disk. As per above discussion we also manage that files system during the partition a drive. In Windows NT we used that method by Disk Administrator. Disk Administrator is considerably easier to use than FDISK.EXE. We can create or delete partition by Disk Administrator.

Disk Administrator:

Disk Administrator is in the Administrative Tools folder. It displays the system’s disk resources through a status bar and legend. In Disk Administrator we creates logical drives into the system as per our requirement. This partition method we used for security of our data and to improve our system performance. The boot partition contains system files such as the WINNT folder and the SYSTEM32 folder. When the system partition is set to active the computer will boot from that partition. We also create primary partition or extended partition by Disk Administrator.

Primary and Extended Partitions:

Before we can access our hard disks, they first must be partitioned. We can create either primary partition or extended partitions. A primary partition is a part of a disk that can be used by the system to start the computer. A primary partition cannot be partitioned further. The Windows NT system partition must be a primary partition. Each hard disk can have up to four primary partitions.


If we use an extended partition on a disk, we can only have three primary partitions on that disk. An extended partition is a method for extending the four-partition limit, and for configuring a hard disk into more than four logical volumes.

Flowchart: Magnetic Disk: F:
G:
H:
Flowchart: Magnetic Disk: E:
Flowchart: Magnetic Disk: D:
Flowchart: Magnetic Disk: C:
Text Box: OR
Text Box: EXTENDED PARTITION
Flowchart: Magnetic Disk: F:
Flowchart: Magnetic Disk: E:
Flowchart: Magnetic Disk: D:
Flowchart: Magnetic Disk: C:
Text Box: PRIMARY PARTITION
Text Box: PRIMARY PARTITION

 

 

 

 

 

 

 

 

 

 

 


Volume Sets:

Volume Sets can be created to optimize disk space usage. A volume set is a collection of free-space area combined into a single logical drive, but does not improve performance.

Combining from 2 through 32 areas of unformatted free space on one creates volume sets or more physical drives. For example, 100MB of free space can be combined with 50MB of free space to create a 150MB partition volume set.

Steps of creating for Volume Set:

Ø      Open Disk Administrator.

Ø      Select the areas of free space to create volume set.

Ø      Choose partition from the menu bar.

Ø      Enter the size of the volume set.

Ø      Click OK.

Ø      Choose partition from the menu bar for change the comments.

Ø      Format the volume set.

Flowchart: Magnetic Disk: F:
150 MB
Flowchart: Magnetic Disk: D:
150 MB
Flowchart: Magnetic Disk: Free Space
50 MB
Flowchart: Magnetic Disk: E:
50 MB
Text Box: Physical Disks
Text Box: Logical Disks
Flowchart: Magnetic Disk: Free Space
100 MB
Flowchart: Magnetic Disk: D:
150 MB
Flowchart: Magnetic Disk: E:
50 MB
Flowchart: Magnetic Disk: C:
150 MB
Flowchart: Magnetic Disk: C:
150 MB
Text Box: Disk 0
Text Box: Disk 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



**MANAGING FAULT TOLERANCE**

Fault Tolerance is used to improve the performance of the system and the performance of hard ware equipment like input out put controller on the different hard disk. When planning partitions especially for system or boot partition we should also consider Fault Tolerance.

RAID (Redundant Array of inexpensive Disk) Fault Tolerance:

Windows NT server provides a software implementation of a fault tolerance technology known as Redundant Array of Inexpensive Disk (RAID). RAID Fault Tolerance is applied on the different no. Of disk arrange in the form of Array inside the system at different levels, which are following.

Ø      Level 0:           Strip Set Without Parity

Ø      Level 1:           Disk Mirroring

Ø      Level 5:           Strip Set With Parity

Stripe Sets:

A stripe set is similar to a volume set. Both volume sets and stripe sets combine area of unformatted free space into one large logical drive.

Stripe Set Without Parity:

Stripe set without parity use for creates the different number of partition on the different number of hard disk. In this, we are used the partition for the different works. It is also manage with the help of RAID fault tolerance. They can combine 2 to 32 areas of free space as a single logical drive, however, the free space must on different hard disks and each hard disk must contain the same amount of free space that you want to use for the size of the stripe set.

Stripe Set With Parity:

Parity is a mathematical method of verifying data integrity. Three to 32 disks are supported in a stripe set with parity. If a single disk fails, data is not lost because the Windows NT Server fault tolerance driver has spread the information across the remaining disks. The data can be completely reconstructed.

Flowchart: Magnetic Disk: PARITY
Text Box: DISK 1
Flowchart: Magnetic Disk: PARITY
Text Box: DISK 3
Flowchart: Magnetic Disk: PARITY
Text Box: DISK 5
Flowchart: Magnetic Disk: PARITY
Text Box: DISK 4
Flowchart: Magnetic Disk: PARITY
Text Box: DISK 2

 

 

 

 

 

 

 


 

 

Steps to create stripe set with parity:

Ø      Logon with Administrator.

Ø      Open disk administrator.

Ø      Select the area on different disk.

Ø      Click the partition menu.

Ø      Clicks create and select with parity.

Ø      Enter the size of strips and then OK.

Ø      Again open and write comments.

Mirror Sets:

RAID level 1 is disk mirroring, in which two hard disks contain identical information. If one drive fails, the other drive can still be accessed. Mirror sets are can be expensive because disk space usage is only 50 percent. However, for peer-to-peer and modest server based LANs, a mirror set usually have a lower initial cost because it requires only two disks.

A mirror set is used to get the backup of the drives.


Steps to creating mirror set:

Ø      Open disk administrator.

Ø      Select the partition that you want to mirror. Press Ctrl and select free space on another drive that is the same size or larger than the partition you want to mirror.

Ø      Text Box: Disk 1

 

Text Box: Disk 0

 

Click Fault Tolerance to establish mirror.

 

Flowchart: Magnetic Disk: E:
Flowchart: Magnetic Disk: D:
Flowchart: Magnetic Disk: C:
Flowchart: Magnetic Disk: G:
Flowchart: Magnetic Disk: D:
Flowchart: Magnetic Disk: F:

 

 

 

 


Disk Duplexing:

However, a second controller can be installed in the computer so that each disk in the mirror set has its own controller. This arrangement, called Disk Duplexing, can protect the mirror set against both controller failure and disk failure.

Disk duplexing is exactly like mirroring except that it uses two disk controller cards, one card for each drive in the mirror.

 

**WINDOWS NT NETWORK SERVICES**

The Network program in Control Panel is used to install and configure Windows NT networking components, such as protocols, network adapter card drivers, and to configure bindings.

Network Adapter:

Network adapter also called as LAN card or NIC (Network Interface Card) card. Network adapter card are the physical interface between the computer and the network cable. Network adapter card drivers are typically installed during setup. To configure network adapter card drivers, in Control Panel, double-click the Network icon, and then click the Adapters tab.

Network Services:

Windows NT network services provide a computer running Windows NT with access to the network and its resources. Select and install Windows NT network services through the Services tab in the Network program in Control Panel.

Client Service For Netware:

Text Box: Windows NT Workstation with CSNW

 

Client service for Netware, included with Windows NT Workstation, enables computers running Windows NT Workstation to make direct connections to file and print resources at NetWare servers running NetWare. Logon script support is also included.

Text Box: NetWare Server
Text Box: Windows NT Workstation with CSNW
Text Box: File and Print Resources

 

 

 

 

 

 

 

 

 

 

 


Gateway: 

Gateway provides the links between two different technologies or topologies.

GSNW enables computers running Windows NT Server, and using NWLink, to access files and printers on NetWare servers.


Computer Browser:

On the Desktop the “Network Neighborhood” icon is called as Computer Browser. Windows NT uses the Computer Browser service to display a list of currently available network resources. The Computer Browser service maintains a centralized list of available network resources, called the browse list. By assigning the browser role to specific computers, the Computer Browser service reduces the amount of network traffic required to build and maintain a list of all shared resources on the network.

Server Services:

To install the Server service on a computer running Windows NT Server, in Control Panel, double-click the Network icon. On the Services tab, click Add, and then click Microsoft DNS Server. To start the service, restart the computer. Its primary function is to configure DNS objects. This service is use for server in the network environment.

Workstation Services:

Workstation is optimized for use as a high performance; secure network client and corporate desktop Operating System. This service is use for Workstation in the network environment.

 

**WINDOWS NT PROTOCOLS**

Microsoft Windows NT includes the following network protocols:
·        TCP/IP
·        NW Link IPX/SPX compatible transport
·        NETBEUI
Protocols are pre-define routine, which is install during the installation of Windows NT. These protocols can be added, removed, or configures using the Network program in Control Panel. In addition, use the Network program in Control Panel to optimize network performance by configuring network bindings. Protocols provide a mechanism by which computers can be connected with each other and exchange information over a network.
Net BIOS Interface/(NetBEUI):

Net BIOS extended user interface (NetBEUI) is a protocol developed for small departmental LANs with 20-200 computers. It is therefore not suitable for WANs. Bet BEUI is a small, fast protocol.

Apple Talk:

Another flexibility available with Windows NT is the support it provides to Apple Macintosh computers. To support the Macintosh as a client on a Windows NT based network, the Apple Talk protocol is utilized. Apple Talk works behind the scenes to ensure that computers on your network can talk to each other.

DHCP:

DHCP is the abbreviation of “Dynamic Host Connection Protocol”. DHCP is used to assign TCP/IP configuration parameters on networked clients. The DHCP server administrator configures a scope, for which sets of valid IP addresses are assigned. Each time a DHCP client starts, it requests this TCP/IP configuration information from a DHCP server receives a request, it selects an IP address from a pool of addresses defined in its database, and then offers it to the DHCP client.

Text Box: Non-DHCP
Client
Text Box: DHCP
Client
Text Box: IP Address 2
Text Box: DHCP
Client
Text Box: DHCP
Server
Text Box: IP Address 1
Text Box: DHCP Database
IP Address 1
IP Address 2
IP Address 3

 

 

 

 

 

 

 

 

 

 


TCP/IP (Transport Control Protocol/Internet Protocol):

TCP/IP is a networking protocol that provides communication across interconnected networks. TCP/IP can be used to communicate with Windows NT systems and with non-Microsoft systems, such as UNIX. TCP/IP must be configured manually. To do this, in Control Panel, double-click the Network icon, click the Protocols tab, and then double-click TCP/IP Protocol, In the Microsoft TCP/IP Properties dialog box, enter the TCP/IP configuration parameters. For each network adapter card in the computer that uses TCP/IP, three parameters can be configured: IP Address, Subnet Mask, and Default Gateway. TCP/IP is the default protocol when Windows NT Server is first installed. TCP/IP is a combination of protocols.

NW Link IPX/SPX:

It is most commonly used in environments where clients running Microsoft operating systems are used to access resources on NetWare servers. NW Link allows computers running Windows NT to communicate with other network devices that are using IPX/SPX. NW Link does not require any configuration.

Network Bindings:

Network bindings are links that enable communication between network adapter card drivers, protocols, and services.

 Many combinations of network bindings are possible. Here is an explanation of the example shown in the slide:

Text Box: Workstation
Service
Text Box: Server
Service
Text Box: NetBEUI
 
Text Box: NW Link
Text Box: TCP/IP
Text Box: Network Adapter Card (0)
Text Box: Network Adapter Card (1)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


All three protocols are bound to the Workstation service, but only the routable protocols, NW Link and TCP/IP, are bound to the Server service. It is possible to select which protocols are bound to the network adapter cards. Network adapter card (0) is bound to all three protocols, while network adapter card (1) is only bound to the routable protocols. Administrators have full control over which components are bound together.

When adding network software, Windows NT automatically binds all dependent network components.

To configure network bindings, in Control Panel, double-click the Network program, and then click the Binding tab. The Binding tab shows the bindings for the installed network components.

 

 

 

**USER & GROUP MANAGEMENT**

Windows NT security is based on the concept of user accounts. A user account is the user’s unique credential that allows the user to access resources.

Types Of User Accounts:

There are three types of user account; one is the type of accounts that we create, and two are built-in user accounts that are created automatically when Windows NT Server or Windows NT Workstation is installed.

Domain User Account:

A domain user account contains information that defines a user to the domain. With a domain user account, a user can log on to the domain and gain access to domain resources from any computer on the network. A domain user account is always created in User Manager for Domains. This accounts is always created in the master directory database on the primary domain controller (PDC).

Text Box: User Manager for Domain
Flowchart: Magnetic Disk: Master Directory
Database
Text Box: Domain
Flowchart: Magnetic Disk: Master Directory
Database copy
Text Box: PDC
Text Box: BDC

 

 

 

 

 

 

 

 

 

 


Local User Account:

A local user account contains information that defines a user to the local computer with a local user account; a user can log on to and access local resources. Local user accounts should only be created within a workgroup, as shown in the following illustration.

Text Box: Workgroup

 

Text Box: User Manager

 

 

Flowchart: Magnetic Disk: Local
Accounts
Flowchart: Magnetic Disk: Local
Accounts
Flowchart: Magnetic Disk: Local
Accounts

 

 

 

 

 

 

 

 

 

 


Types of Groups:

Adding a user account to a group makes the user a member and gives the user all the rights and permissions granted to the group. Group membership provides an easy way to assign permissions and user rights to sets of users at one time.

Local And Global Groups:

There are two types of groups, local and global.

Text Box:  
Local Group
Text Box: Permissions
Text Box:  
Global Group
Text Box: Resources

 

 

 

 

 

 

 


Local Groups:

Local groups are used to provide users with permission to access a network resource on the local computer. Local groups are also used to provide users with rights to perform system tasks, such as changing the system time on a computer, or backing up and restoring files.

The following is the list of default local groups:

Ø      Administrator

Ø      Users

Ø      Guests

Ø      Backup Operators

Ø      Account Operators (Domain Controller Only)

Ø      Print Operators (Domain Controller Only)

Ø      Server Operators (Domain Controller Only)

Ø      Power Users (Non-Domain Controllers)

Ø      Replicators

Global Groups:

Global groups can contain only user accounts from the domain where the global group is created.

Although global groups can be assigned permission to resources, use global groups only for grouping domain user accounts. By default, all domain user accounts are added to the Domain Users group.

The following is a list of the default global groups:

The default global groups are:

Ø      Domain Administrator

Ø      Domain Users

Ø      Domain Guests.

USER MANAGER:

Within the Administrative tools program group there is an icon entitled User Manager for Domain, which an administrator uses to control the various features of a user account. In User Manager a list of Usernames at the top and groups at the bottom, within the username area there are three columns. The first is the username itself, the second is the full name of the user, and the third column is a brief description of the user. If there is more than one domain in an organization, the description field helps administrator maintain and troubleshoot the user database.

User Profiles:

In Windows NT, a user’s computing environment is determined primarily by the user profile. Windows NT security requires a user profile for each account that has access to the system. The user profile contains all user-definable settings for the work environment of a computer running Windows NT, including display, regional, mouse, and sounds settings, and network and printer connections.

Roaming User Profiles:

Unlike a default user profile, roaming user profiles provide users with the same working environment, no matter which Windows NT-based computer a user logs on to. Roaming user profiles are stored centrally on a network server rather than on the user’s local computer.

Text Box: PROFILE
 
1) Network Connections
2) Start Options
3) Printers
This is a user profile that a user can change. If we use roaming personal user profiles, each user should be assigned his or her owned profile.

Text Box: Profile Server
Text Box: Windows NT
Clients

 

 

 

 

 

 

 

 

 


Mandatory User Profiles:

This is a pre-configured user profile that users cannot change. One mandatory profile can be assigned to many users. We use this type of profile to assign common settings for all users who require identical desktop configurations.

 

** SECURING NETWORK RESOURCES, SHARE & NTFS PERMISSION **

Windows NT enables we to designate disk resources that you want to share with others. For example, when a folder is shared, authorized users can make connections to the folder from their own computers. When a folder is shared, all users by default can connect to the shared folder and gain access to the folder’s content.

We can assign share permissions to user and group accounts to control what users can do with the content of a shared folder. A shared folder appears in Windows NT Explorer and My Computer as an icon of a hand holding the shared folder and is often referred too simply as a share.

Share Permissions:

To control how users access a shared folder, we can assign share permissions to users, groups, or both. The following illustration shows the share permissions, from most restrictive at the bottom to least restrictive at the top.

The following table describes the four share permissions.

Full Control:               Modify file permissions.

                                    Take ownership of files on NTFS volumes.

                                    Perform all tasks permitted by the change and read permissions.

Change:                      Create folder and add files.

                                    Change data in files.

                                    Delete folders and files.

Read Only:                  Display folder name and file names.

                                    Run program files.

                                    Access other folders within that folder.

No Access:                  Establish only a connection to the shared folder. Access to the folder is denied and the contents do not appear. This is the most restrictive permission, and is useful for high security.

Assigning Share Permissions:

After we assign a share name, the next step is to specify which users can access the shared folder by assigning permissions to selected users or groups. By default, when a folder is shared, the everyone group is assigned the Full Control permission from everyone and assigned permissions to specific user and group accounts.

NTFS Permissions:

NTFS permissions are permissions that are only available on a volume that has been formatted with the Windows NT file system (NTFS). NTFS permissions provide a greater degree of security because they can be assigned to folders and to individual files.

NTFS permissions are assigned to user and group accounts in the same way that share permissions are assigned-a user can be assigned NTFS permissions directly or as a member of one or more groups. For example, if a user has read permission to a folder and Write permission to a file in that folder, then the user will be able to write to the file, but will be unable to create a new files in the folder.

Assigning NTFS Permissions:

When a volume is formatted with NTFS, the permission Full Control is automatically assigned to the everyone group.

We modify permissions by right-clicking the folder or file in Windows NT explorer, clicking Properties, clicking the Security tab, and then clicking Permissions.

 

 

The following table describes the Permissions dialog box.

Replace Permissions on Subdirectories:         If selected, changes existing permissions for all folders within the selected folders. This option does not change permissions on existing files in the folder. This check box is cleared by-default.

Replace Permission on Existing Files:            If selected, changes existing permissions for all files within the selected folder only. It does not change file permissions for folders within the same folder.

Name:                                                             Display the folder or file permissions assigned to a group or user for the resources.

Type of Access:                                               Display the folder or file permissions for the selected group or user in the Name box and allows you to change the permission assigned to the selection.

Auditing Files and Folder:

To gain access to the Directory Auditing dialog box, in Windows NT Explorer, right-click the folder or

 File, click Properties, click the Security tab, and then click Auditing.

The following table explains the options for auditing folders.

Replace Auditing on Subdirectories:               Having auditing changes apply to all folders within the folder.

Replace Auditing on Existing Files:                Apply auditing changes to the folder only. This check box is selected by default.

The following table describes the events that we can audit for both folders and files:

Read:                                                               when a user opens a file; views its attributes, permissions, or owner; or copies the file.

Write:                                                              when a user changes a file’s content or attributes; views its permissions or owner; or copies the files.

Execute:                                                          when a user views a file’s attributes, permissions, or owner; or starts a program.

Delete:                                                             Deleted folder or files. Tracks copying of files.

Change Permissions:                                      change to folder or file permissions.

Take Ownership:                                             change to folder or file ownership.

 

Taking Ownership of Folders and Files:

By default, the user who creates a folder or file is the owner. In some situations, it may be necessary for an administrator to remove control from a user by taking ownership of the folder or file. The user who creates a folder or file is the owner of that folder or file. As the owner of a folder or file, a user can share the folder and assign the Take Ownership permission (0) to other users and groups.

Text Box: Assign Permission (0)
Text Box: Take Ownership

 

 

 


 

Text Box: User

Text Box: Owner

 

  

 

 

 

 


How to Take Ownership:

By default, users who are members of the Administrators group always have the ability to take ownership of a folder or file.

 

 

 

The following checklist provides how to take ownership of a file:

v     Log on as Administrator.

v     On the Security tab of the folder Properties, click Ownership (to determine the current owner).

v     In the Owner dialog box, click Take Ownership.

 

**ADMINISTERING NETWORK PRINTER**

Windows NT offers several advanced printing features. For example, as an administrator, we can remotely administer Windows NT print servers. Another advanced feature is the fact that you do not have to install a printer driver on a Windows NT client computer to enable it to use a Windows NT print server.

Printer:

A printer is a software interface between the operating system and the print device. A print server is the computer that runs the printer software, and that receives and processes documents from clients.

Text Box: Clients
Text Box: Print
Server
Text Box: Printer

 

 

 

 

 

 

 

 

 

 

 

 

 

 


To add and Share a Printer:

Ø      Log on as Administrator.

Ø      Click the Start button, point to Settings, and then click Printers. The printer window appears.

Ø      Double-click the Add Printer icon.

Ø      Click Next to adds a printer on Server.

Ø      Under Available ports, select the LPT1 check box, and then click Next.

Ø      Under Manufacturers, click EPSON.

Ø      Under Printers, click EPSON-400LQ, and then click Next.

Ø      To accept the default settings, click Next.

Ø      Click Shared.

Ø      When asked if we want to print a test page, click No for not printing a test page, and then click Finish.

The printer driver folder name is I386.

Spooling:

A process on a server in which print documents are stored on a disk until a printing device is ready to process them or spooling is the concept used the printer make a queue for the printing job.

 

 

 

 

 

 

 

** INTRODUCTION TO ADMINISTERING WINNT **

Windows NT Server is optimized for use as a file, print, and application server that can handle tasks for organizations ranging from small workgroups to enterprise networks.

Administrator Responsibilities:

It is provide to create a checklist of network administration duties for which an administrator is responsible. These include:

  Creating And Managing User Accounts.

  Security.

  Updating Existing Software And Implementing New Software.

  Archiving.

  Preventing Data Loss.

  Monitoring And Regulating Server Storage Space.

  Data Backup.

  Protecting The Network Against Viruses.

  Troubleshooting.

  Adding New Computer To The Network.

Windows NT Administrator Tools:

Both Windows NT Server and Windows NT Workstation include administrative tools. The Windows NT Workstation administrator tools are only used to administer the local computer. The Windows NT Server Administrator Tools are used to administer any computer in the domain.

The following illustration shows the administrative tools that are installed on a computer running Windows NT Workstation.

   Backup.

   Disk Administrator.

   Event Viewer.

   Performance Monitor.

   Remote Access Admin.

   User Manager.

   Windows NT Diagnostics.

The following illustration shows the administrative tools that are installed on a computer running Windows NT Server.

   Administrative Wizards.

   Backup.

   Disk Administrator.

   Event Viewer.

   License Manager.

   Migration Tool for Netware.

   Network Client Administrator.

   Performance Monitor.

   Remote Access Admin.

   Server Manager.

   System Policy Editor.

   User Manager for Domains.

   Windows NT Diagnostics.

The following table describes the administrative tools that will be used throughout in Server and Workstation.

Administrative Wizards:       

The administrative wizards are Windows NT Server tools that guide you through tasks, such as creating user accounts, creating and modifying group accounts, setting permissions on files and folders, and setting up network printers.

User Manager for Domain:  

User Manager for Domains is a Windows NT Server tool that enables you to establish, delete, or disable domain user accounts. We can also set security policies and add user accounts to groups.

User Manager:

User Manager is a Windows NT Workstation tool that enables you to establish, delete, or disable local user and group accounts.

Server Manager:

Server Manager is a Windows NT Server tool that enables you to view and manage computers and domains.

Event Viewer:

Event viewer notifies you and puts the event in a log. It provides information about errors, warnings, and the success or failure of a task, such as a user logon attempt.

Windows NT Diagnostics:

Windows NT Diagnostics displays and prints system configuration information, such as data about memory, drives, and installed services.

Backup:

Backup is a tool used to back up information to your local tape drive. Backing up your computer protects your data from accidental loss and media failures.

Disk Administrator:

Disk Administrator is in the Administrative Tools folder. It displays the system’s disk resources through a status bar and legend. We also create primary partition or extended partition by Disk Administrator.

Performance Monitor:

We can use Performance Monitor to look at resource use for specific components and program processes. With Performance Monitor, we can use charts and reports to gauge our computer's efficiency, identify and troubleshoot possible problems.

Remote Access Admin:

Remote Access Admin is use to administer RAS servers and set permissions for RAS users. On a Windows NT Workstation computer, a RAS server supports only one dial-up connection. On a Windows NT Server computer, a RAS server supports 256 dial-up connections.

 

**USING WINNT (MULTI VENDER)**

Windows NT is a multipurpose network operating system that can act as both a client and a server in a network environment. The steps in which we are created a network environment in an organization are the following. A proper network cable and two or more system with LAN Card are required to create a network environment.

Steps for Creating/Maintain a Network:

Ø      Click the Control Panel from settings, and then click the network icon in control Panel (on each machine separately).

Ø      Add the adapter of that company which we installed internally into the system. (The adapter driver name is 3COM or new 3 COM).

Ø      If the message is appeared to shutdown the system click Yes.

Ø      After the installation of LAN Card, add TCP/IP & NetBEUI Protocol from network icon.

Ø      Add the services of Server, Workstation and Computer Browser service.

Ø      Click the TCP/IP protocol from network icon in Control Panel and click Properties.

Ø      Write down the IP address and subnet mask address and then bind these protocols.

Ø      If the message is appeared to shutdown the system, click yes to restart.

Ø      Click network icon from Control Panel and click the identification tab to add the machine into the Domain.

Ø      Write down the machine name and write down the Domain name in identification tab.

Ø      If the message is appeared to shutdown the system, click yes to restart.

Ø      If the above operation is complete go to the Server and click the start button, go to program and then go to Server Manager in administrator tool.

Ø      Click the add system to add the machine in server.

Ø      Give the computer name and then click add.

Ø      If the message is appeared to shutdown the system, click yes to restart.

Ø      The message is appeared for Welcome to the Windows NT Server.

 

**INTRODUCTION TO UNIX **

Unix is an operating system “a master control” that operates the computer on user behalf. Unix is a general-purpose operating system. Unix system includes both the operating system and an associated command. They have simple but powerful command language and a device independent file system.

The Unix system is very successful at the time. Unix can be found in universities, government, laboratories, commercial organization and many other areas of industry. The software, which supports the Unix, called as Telnet. The minimum 386 machine, 4MB Ram and 55 to 60MB hard disk space required for Unix. The administrator name in Unix called as Root and Root belong the other group.

Unix Controlling:

There are three different groups co-ordinates together and control the Unix.

Unix Developers:

·        AT & T

·        University of California

·        IBM

·        Open Software foundation

Unix Setters:

·        Unix International

·        ANSI (American National Standard Institute)

·        IEEE (Institute of Electrical & Electronics Egg.)

·        ISO (International Standard Organization)

·        NIST (National Institute of Standard & Technology)

Unix Users:

·        Uniform

·        Userix

Unix Terminals:

The Unix terminal name is host terminal or consol terminal.

Dump Terminal:

Those terminals consider are the dump terminals, which there is no use of their own processor.

Intelligent Terminals:

Those terminals consider as the intelligent terminal, which there is use of own processor.

Dial in Terminals:

In these terminal the telephone line are involves.

Terminal Emulation:

The terminal emulation the concept in which is used two different operating system the help of terminal emulation on the one system at the same time. A software, which is provided this facility, is called the terminal emulation software. Vt100 is used in terminal emulation.

 

**CORE ARCHITECTURE & FEATURES OF UNIX**

Unix created in 1960 from Bell Labs. The following of the some salient features of Unix is operating system for which it is famous in the market. In Unix each and every information called in file type therefore if we want to get any information about any file we open a concerning file.

 

Multi Tasking:

In multi tasking more then one program executes at a time. Unix can print a document edit another and sort a list of files at the same time. Multi tasking means more then one task performs at a same time.

Multi Users:

A multi user operating system permits several users to use the same computing jobs. Several terminals are connected to a single powerful computer (Server) and each user of the terminal can run program, access file and print a document at the same time.

Communication Facilities:

Unix supports two major type of communication.

1)      Communication between different terminals connected to the same computer.

2)      Communication between user of the one computer at a specific location to the user of another type and size of the computer located elsewhere.

Strong Security:

The several levels of security exist in Unix. It level is system security. This ensures that just any body can start running Unix on our system. A started ‘login’ procedure has been incorporated before Unix even starts running on the system. 2nd level is incorporated into Unix, when it comes to accessing files. The owner of a file to each of his files can assign three permission namely “Read, Write and Execute”. All these permissions can be individually conceded or denied to all other users of the system. 3rd level of security allows users to except data files on the disk, so that even if someone does manage to access them, he can’t make much sense of it.

Time Sharing:

Time-sharing is way-allowing user to run program on different terminals at the same time.

Tree Structure:

In Unix the structure is hererical structure that is define in the following table.

. Boot.

. Unix

. Unix Old

. Dos

                        . Bin                 (all necessary file or required files)

            . Etc                 (file which are used as per requirement)

                        . Lib                 (all the manual help files)

            . Install            (software install concerning files)

                        . Dev                (all the device concerning files)

            . U                   (user account folder in new version)

                        . User              (user account folder in old version)

                        . Tamp             (all the temporary files created in this folder)

                        . Lost & found (concerning with send the message from server backup)

                        . West Basket   (like recycle bin to every terminal)

 

**FILE SYSTEM AND MANAGEMENT**

There are two type of ordinary file.

1) Text file (in text type)                                             2) Binary File (in binary type)

Directory File:

Directory file are those file who just like a directory.

Special File:

The entire device file consider as a special file.

Different Type of File:

S (system file)                          __ (ordinary file)                     D (directory file)         M (memory file)

B (block device file)                C (character device file)         L (link file)

 

Shell:

Shell is the command place of the Unix that is use to put the command at the shell prompt to get their result.

Born Shell:

Stephen R.Bourne creates it in bell laboratory in 1970. It indicate by $ sign.

Korn Shell:

David Korn working in Bell lab developed Korn Shell. Later there were some amendment on its.

(1) History Mechanism            (2) Job Controlling                 (3) Allaying

History Mechanism:

Same as dos key keeps previous command in the buffer memory.

Job Controlling:

If we use Korn Shell we can stop a command, pause, delete a command.

Allaying:

To rename some things and can renaming commands.

C Shell:

Syntax:            $CSH to move to the C Shell.

After this command the prompt change into % sign for indication of C-Shell. When there was more development in Unix, it was converted into C language. The Korn Shell was adopted as it is but brought some more changes.

I node:

I node is the abbreviation of index node. It stored the information for each and every file present in the system. This information file called by specific name “I node or Index node”. Each node contains all the information that Unix needs in order to work with any specific file. I node is control by Kernel.

The information of file is following:

1)      Type of file

2)      Size of the file

3)      Time  & date of creation

4)      Honored of the file

5)      Last time which is modified

6)      Last time which is access

7)      Last time the I node was modify

8)      Numbers of the links

. Profile:

In which each and every information of the created users is present like user name, assigned rights, assign shell etc.

 

**COMMANDS (USER LEVEL)**

PS:                  This command provides the process perform/shell presentation.

WHO AM I:     This command is use for user identification.

PWD:              To show the present working directory, if show not found us CD command.

DOT:               for hidden a file (dot . abc).

LS –A:             To view hidden files.

TTY:                This command is used for check the terminal no.

U Name:         To provide version of system.

U Name - A:    To provide all the information about Unix.

DATE:             To show the system date and time.

CAL:               To use for calendar.

MESG:                        This command is used to accept or reject the different messages.

MESG – Y:      To accept the messages of user levels.

MESG – N:     To reject the messages of user levels.

WRITE:           To write same data into another terminal. To exit from this command we use Ctrl+D.

Syntax:                        (Write <terminal no>)

HELLO:          To exit from write command.

WALL:             First we move in specific directory we gone into ($ Cd/etc/wall).

                        Wall we use to send the message on every terminal.

CAT:               To display all the contents to hidden or present file or to show the. Profile contents.

Syntax:                        Cat. profile | pg

REDICATOR: Redicator we use for write any file into the system.

Syntax:                        (Cat > abc) To save the file we used Ctl+D.

If we read the above file on the screen (abc) we write ($Cat ABC).

If we use ($Cat ln ABC) the result of this command show the file in lines.

Another command of Cat is ($Cat>/dev/terminal number).

CHMOD:                     This command is used to change the rights (rwx) to different groups.

Syntax:                                    (chmod 7 or 3 or 1 abc)

BANNER:                    This command is use to show any message on the screen.

BANNER “Hello”:      This command is use when we show the message on our terminal.

If we show the message on another terminal we use (Banner “hello”>/dev/terminal number).

W/WHO/WHO DO:      This command gives the information about current login user.

WC:                             This command is use for word counting in a specific file.

Syntax:                                    WC<file name>

                                    WC – w space – c – s<file name> is showing the sentences, word etc.

LP:                              This command is use for line printer.

KILL:                          kill command is use for end any task when our system is hanging.

Syntax:                                    kill – 9<terminal number>

LOCK:                                    This command is use for lock the system for one minute.

                                    If we want to lock the terminal for five minutes we use (lock-v-300).

GREP:                         This command is use to search any specified wording in a specified text file.

Syntax:                                    grep “string” <file name>.

CHONAR:                   It is use to change the owners of any specific file.

Syntax:                                    chonar<file name>.

HEAD:                                    This command is use to display the first 10 lines of any specified file.

Syntax:                                    head<file name>.

TAIL:                           This command is used to display the bottom 10 lines of any specified file.

Syntax:                                    tail<file name>.

LAST:                          This is use to display the view of events same as Windows NT in event viewer.

KILL ALL:                  This command stops all the process.

SYSADMSH:                This command is the abbreviation of “system administrator shell”. If we want to perform the administrator activities then we apply this command to activate administrator shell.

Syntax:                                    sysadmsh.

KSH:                           To move on the Korn Shell. To exit from this command we use exit.

CSH:                           To move on C Shell. The C Shell symbol is %.

BC:                              This command is use for basic calculator.

MAIL:                          This command is use to send the message to any user.

Syntax:                                    mail student.

MV:                             This is use to move the file from one place to another place with all links.

Syntax:                                    mv<file 1><file2>.

CP:                              This is use for copy the first file into the second file.

Syntax:                                    cp<file 1><file 2>.

MAN:                          This command is use to get the help from Unix.

Syntax:                                    man<any command>.

COPY:                         To copy the file into other file.

Syntax:                                    copy<file 1><file 2>.

MKDIR:                       This command is use to create a directory.

Syntax:                                    mkdir<directory name>. To exit from directory we use CD <file name>.

                                    If we want to view the contents of a directory we use PWD.

RMDIR:                       To remove the directory.

Syntax:                        RMDIR<directory name>.     

RM:                             This command is use for delete any file.

Syntax:                                    RM<file name>.

SU:                              This is the super user command to apply password.

MORE:                        This command is use for appearing the files lines by lines.

For example                ($ Cat. profile | more). To exit from lengthy file we use delete key.

ENABLE or DISABLE:           To disable or enable the any terminal.

Syntax:                                    Enable<terminal number>.

                                    Disable<terminal number>.

DOSDIR:                     To show the Dos base files in Unix.

Syntax:                                    $Dos dir.

FIND:                          This command is use to find any specified or specific file.

Syntax:                                    $find-v-f</file name>

 

**INTRODUCTION TO LINUX **

Linux is the multi-user and multitasking operating system. It is an operating system the modified form of Unix with GUI concepts. Linux security system is very high from Windows NT and Unix. In Linux the different users can work at the same time. The function are pre-define routine in Linux.

Text Box: LINUX SYSTEM
Oval: Provide User level Security
Oval: Multi-user & Multitasking Operations
Oval: User Works at same time in Linux
Oval: Modified form of Unix with GUI

 

 

 

 

 

 

 

 

 

 


Where Linux Came From:

Linux torvalds is created the Linux, which is the project of Minix. The purpose of Linux is the switch to different tasks or objects. In 1991 the Linux release in Internet and the first version of Linux is 0.01 and 0.02 is the second version of Linux.

The Linux Release Companies:

1)      Red Hat

2)      Open Linux

3)      Gaiters

4)      Sues

Contents Of Linux:

1)      Each and every standard compiler is available in Linux.

2)      The all-standard protocols are also available in Linux.

X-Window System:

X-Window system are simple X is a standard graphical user interface for Linux machine and is the powerful environment which support the many application. $ Start X is use for to show the Linux with GUI.

**FILE SYSTEM OF LINUX**

User Data File:

User data files are those types of files that are concerned the user.

System Data File:

Those files that are created by the system are called System Data Files.

Directory File:

That files consider as directory.

Special File:

Special file is all device concerning files. For example Hdc, Hdd, Hde.

Executable File:

Those file which are provide output after execute.

BASH:

To create the new users define commands in Born again shell. BASH features are same as Unix.

DTSH:

DTSH is the abbreviation of Desktop Shell. This directory activate when the Linux works on GUI mode.

TCSH:

The TCSH is just like C Shell and also built-in c compiler at the command prompt.

 

**INSTALLATION AND CONFIGURATION OF WINDOWS NT**

Windows NT is a multipurpose and multithreaded operating system and provides a secure network environment. The following is the minimum requirement for hardware configuration of the system for Windows NT.

1)      Minimum 386-motherboard machine.

2)      Minimum 16 MB Ram for Workstation.

3)      Minimum 32 MB Ram for Server.

4)      Approximately 110 MB space for Workstation + 110 MB free space.

5)      Approximately 125 MB space for Server + 125 MB free space

Before installing of Windows NT, decide which file system to use. Windows NT supports the following file system on hard disk.

Ø      FAT (File Allocation Table)

Ø      NTFS (New Technology File System)

We also manage these file system during the installation of Windows NT because Windows NT support both file system.

During the pre-installation process we can use FDISK and FORMAT from a DOS boot disk to partition and format the hard disk. For this exercise, we will need both a DOS boot disk with FDISK and FORMAT as well as the installation CD and boot disks.

In the following exercises, we will prepare our hard disk for Windows NT Server installation.

1)      We insert the Windows NT bootable disk. If we use the DIR command in CD drive we can see the different directory in CD drive. In these directory the I386 is use for Workstation and NT4 is use for Server installation.

2)      Now we use the command CD NT4 for Server installation.

3)      After above step we use CD I386 command. The I386 directory is available in both Workstation and Server.

4)      Now we enter the command WINNT/B to start the boot installation. We use B command if we not use the floppy drive. If we use floppy drive to boot the system then we not use the B command with the WINNT command.

Now the system is ready to start Windows NT setup and installation.

After these steps the system will boot for installation of Windows NT and copying files from CD to Hard disk. After a few minute the system will say that the system is restarting. Now we removed the CD drive from CD Rom and click Yes to restart.

The different options are following which is including in installation of Windows NT.

  SETUP INITIALIZATION.

  INSTALLED STANDARD.

  FINISHING SOFTWARE.

These steps are given below which are questionnaire during the installation.

 

**SETUP INITIALIZATION**

1) Question about Organization:

In this step, we give the User Name and Company Name.

2) Question about Server Type:

In this step, we give the information about Per Server (limited) and Perceet Server (un limited). If we select the Per Server option we define the connection. So we select the Perceet Server.

3) Question about Server Information:

In this step, we defined the following information about server.

Ø      PDC (Primary Domain Controller).

Ø      BDC (Backup Domain Controller).

Ø      Stand Alone (If the server is more than one in a network environment, we select the Stand Alone option).

4) To Create Emergency Disk:

If we do not create an emergency disk, we escape this option.

5) To Confirmed the Contents:

In this option we confirmed the contents.

 

**INSTALLED STANDARD**

1) Information about the Network:

In this way we define the network type, which are following.

1) Wide Network                                 2) Remote Access Network

In the network option we select the Wide Network type.

2) Information about Internet Server:

In this step, we define the Internet Server. For example, HTTP and FTP.

3) Question about Installation of Network Adapter:

In this, we select any network Adapter Card / LAN Card.

4) Question about Protocols:

In this step we select all Protocol because any one protocol use in anywhere.

5) Question about Services:

In this step we also select all the services.

6) Question about DHCP:

If we select the TCP/IP the next question after Services will be DHCP. The DHCP configured TCP/IP automatically.

7) Question about IP address of Server:

In this step we define the IP address of Server.

8) Question about Password of Supervisor:

After the assigning of IP address the next question is the password of supervisor, which we assign our machine.


**FINISHING SOFTWARE**

1) Question about Services:

The first question of Finishing Software Option is about Services.

2) Create Sub-directory:

This means that are we create a sub-directory for SQL Server or ODBC (Open Database Connectivity). If we installed the SQL server after the installation of Windows NT we select this option as per our requirement.

3) Question about Time & Zone:

The next question about Time and Zone of our system.

4) Question about the Display:

The last question is concerned about system display.

 

**Now the installation setup is completed and we can start Windows NT Server**