The Importance Of File Management

Superior Essays
Register to read the introduction… Disk clean up removes unused file fragments, and files left on the Hard drive. Finally back up which can be done on a physical object like a CD or DVD to online servers, which they now call the cloud.
Now there are a few things that define file management, they are as follows:

1) To Check the validity of a file
2) I/O support for devices
3) Minimize / eliminate potential lost / destroyed data
4) I/O support for multiple users
5) Provide standard routines for file transfer , I/O work

Now the needs covered by file management for users are as follows:

1) Each user needs to access to create, delete, read, write, and modify a file.
2) Each user must have limited to no access to others files.
3) Each user must be able to control what others can do with their files.
4) Each user must have the ability to transfer data between each other.
5) Each user must be able to back up and recover their files.
6) Each user must be able to access their files by name, not the hidden numerical
…show more content…
Knowing the memory address of such critical files allowed malicious access at the kernel level and allowed unscrupulous program writes to take advantage of the known locations. Microsoft has implemented new memory access technology that includes Dynamic Allocation of Kernel Virtual Address Space (including paged and non-paged pools), kernel-mode stack jumping, and Address Space Layout Randomization. These changes reduce the ability of malicious program developers to take advantage of known address …show more content…
“Memory management services in Linux are built on a programming foundation that includes a peripheral device called Memory Management Unit (MMU). MMU translates physical memory addresses to linear addresses used by the operating system, and requests a page fault interrupt, when the CPU tries to access memory that it is not entitled to”. (www.codeproject.com) In Linux you can use the subsystem of allocating and releasing memory. The subsystem consist of 3 layers of which are the Slab Allocator, the zone Allocator and the buddy allocator. In Linux, you can also use Heap manager or create your own heap manager on top of the Kernel system calls. One thing I do like over the windows program is the Out-of-memory killer, or OOM Killer. The OOM killer has the task to try and free some memory for the user, killing other processes and releasing their memory or it will kill your process if the system feels your process is not a priority at the time. This can save a lot of headache Vs. having to use a Task manager to kill background processes just to complete another. This OOM killer is a highly valuable tool to have if you are in a memory crunch and need the available space freed up, but if you do have a process that you wouldn’t want to lose data on, it’s best to close it yourself

Related Documents

  • Improved Essays

    Certain policies and procedures are put in place to control access to confidential information, for example, any personal information on individuals, such as their age, address, medical history and details of personal relationships or problems. Or financial information about individuals, including how much they earn or how much money they owe. These are things that a person would want kept private and therefore would have to be stored somewhere secure, whether that be a paper filing system or saved electronically, in places that not just anyone would have access to.…

    • 931 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    A user who wants the best protection will need to keep the choice of operating system in mind.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 33 M3

    • 481 Words
    • 2 Pages

    Share your files with the users by allowing them to access the files with the option to edit if needed.…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    3-Why should you characterize the logical structure of an internetwork and not just the physical structure?…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    · Storage: This is the part of the computer where information or data have been kept temporary or permanently. This consist primary storage and secondary storage, e.g. Hard disk, Universal Serial Bus (USB) and Floppy Disk etc.…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The control unit determines the particular instruction to be executed by reading the program counter (PC) (Englander, I. 2014). Primary memory holds program instructions and data and interacts directly with the CPU during program execution. The control unit also reads and interprets instructions from memory and transforms them into a series of signals to activate other parts of the computer. The control unit…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The labs are named Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; every PC lab will have the closet. Every lab will have 32 PCs: 30 students PC, 1 educator PC, and 1 server in the server room for instructional utilization. Also, there will be a Student Computer Lab that will give PC access to students to get their work done. There will be 50 PCs in this lab and a server in the storage room. To permit student’s access to library assets, the library will have 10 PCs for students and 5 PCs for library staff. At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are:…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    HIPAA Compliance

    • 1020 Words
    • 5 Pages

    Approved clients get to the system by means of secure messaging applications that can be downloaded onto any cell phone or desktop PC independent of their working framework. The applications associated approved clients with each other and backing the sharing of pictures, records and recordings.…

    • 1020 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Course Project

    • 296 Words
    • 2 Pages

    [3] is one of the work which introduces the idea of a Memory Management Unit. “MMU allows multiple tasks to concurrently use external RAM banks.”…

    • 296 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    It is a concept that is used to describe different ways in which a computer handles information.…

    • 364 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Personal data shall be adequate, relevant and not excessive, this can be achieved by weeding the files on a regular bases and deleting information no longer required.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays