The Importance Of File Management

Decent Essays
Register to read the introduction… Disk clean up removes unused file fragments, and files left on the Hard drive. Finally back up which can be done on a physical object like a CD or DVD to online servers, which they now call the cloud.
Now there are a few things that define file management, they are as follows:

1) To Check the validity of a file
2) I/O support for devices
3) Minimize / eliminate potential lost / destroyed data
4) I/O support for multiple users
5) Provide standard routines for file transfer , I/O work

Now the needs covered by file management for users are as follows:

1) Each user needs to access to create, delete, read, write, and modify a file.
2) Each user must have limited to no access to others files.
3) Each user must be able to control what others can do with their files.
4) Each user must have the ability to transfer data between each other.
5) Each user must be able to back up and recover their files.
6) Each user must be able to access their files by name, not the hidden numerical
…show more content…
Knowing the memory address of such critical files allowed malicious access at the kernel level and allowed unscrupulous program writes to take advantage of the known locations. Microsoft has implemented new memory access technology that includes Dynamic Allocation of Kernel Virtual Address Space (including paged and non-paged pools), kernel-mode stack jumping, and Address Space Layout Randomization. These changes reduce the ability of malicious program developers to take advantage of known address …show more content…
“Memory management services in Linux are built on a programming foundation that includes a peripheral device called Memory Management Unit (MMU). MMU translates physical memory addresses to linear addresses used by the operating system, and requests a page fault interrupt, when the CPU tries to access memory that it is not entitled to”. (www.codeproject.com) In Linux you can use the subsystem of allocating and releasing memory. The subsystem consist of 3 layers of which are the Slab Allocator, the zone Allocator and the buddy allocator. In Linux, you can also use Heap manager or create your own heap manager on top of the Kernel system calls. One thing I do like over the windows program is the Out-of-memory killer, or OOM Killer. The OOM killer has the task to try and free some memory for the user, killing other processes and releasing their memory or it will kill your process if the system feels your process is not a priority at the time. This can save a lot of headache Vs. having to use a Task manager to kill background processes just to complete another. This OOM killer is a highly valuable tool to have if you are in a memory crunch and need the available space freed up, but if you do have a process that you wouldn’t want to lose data on, it’s best to close it yourself

Related Documents

  • Decent Essays

    UUIDs fit the bill here, so each device was identified by a UUID (Leach, Mealling, & Salz, 2005). The value in the dictionary had to be customized to store data for a client. Therefore, I created a class that could hold a variety of information regarding the client. The next step was to create the handlers for each command. I created a “connect” URL that clients visited the first time they connected to the botnet, a “checkin” URL that they check in to every 30 seconds, and a “fileupload” URL where the client sends a file and metadata to the server.…

    • 2049 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    So if you have several computers on a subnet you can prioritize the applications as well as the devices. 9. (5 points) How does HTTP use TCP and DNS use UDP? The computer will open a HTTP session by opening a TCP connection to the HTTP server. The computer will then send a request to the server, the server responds and sends the data to the HTTP server.…

    • 766 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Explain how C-I-A can be achieved down to the folder and data file access level for departments and its user’s using Active Directory and Windows Server 2008 R2 access control configurations. Configuring unique access controls for different user types is an example of what kind of access controls? Data access controls insure that the data itself is restricted to certain users being able to read or write it. These controls are examples of data access administration, and offer unique user access controls on a user by user basis. Any access of this data can be limited and traced to whom is accessing it.…

    • 1422 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Ubuntu Computer Case Study

    • 2099 Words
    • 9 Pages

    What it does is moves the thread handling focus, so it can use specific application to separate the jobs using cores, and cleans up the unused memory which was used by inactive and get maximum performance. File Management For Ubuntu Server, the default file manager is Nautilus which is also known as GNOME Files. What it does is, it helps to search for the local file system by using GVFS system. On the icon of the file, is shows the containing information and with the help of GIO library, it can track the local files which is modified to refresh the display manually so it eliminates the need of the manual refreshing. For Mac OS X Server, it uses HFS Plus which was developed by Apple.…

    • 2099 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Midori Case Study

    • 1833 Words
    • 7 Pages

    DESIGN METHODOLOGY This section contains Midori overall design methodology. Midori operating system design is based on some important modules like: • Microkernel architecture • Software Isolated Processes (SIPs) • Contract Based Channels • Metadata Infrastructure A. Kernel It is important part of the system. It acts as a bridge between programs and hardware of the system. Its Primary Purpose is to manage the computer’s resources along other programs to run use these resources. The kernel takes responsibilities for deciding at any time which of the running programs should be allocated to the processor and is responsible for deciding that which memory each process can use, determining what to do when not enough memory is available.…

    • 1833 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    1) What is the difference between a virus and other types of malicious code? A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts.…

    • 1458 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The purpose of an operating system is to run applications, such as Microsoft word, PowerPoint, adobe flash and Firefox browser. It manages devices by detecting if they are not working and telling you to remove the device and replace it with a new deice. It manages the processor by making sure that each application and process receives enough of the processors time. The operating system manages files by allowing you to save files and to allow you to make the files. It also allows you to sort them into folders.…

    • 2321 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    This would consist SAP, PeopleSoft, Oracle, etc. 4. Data management and storage: all the data acquired must also be stored and this is taken care by the organisation’s storage devices such as SANs, which connect multiple storage devices on dedicated high-speed networks. Storage devices may include online servers, CDs, tape, flash drive, etc. 5.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Django Case Study

    • 1057 Words
    • 5 Pages

    Answer: The session framework facilitates you to store and retrieve arbitrary data on a per-site visitor basis. It stores data on the server side and abstracts the receiving and sending of cookies. Session can be implemented through a piece of middleware. Question: What are the usage of middlewares in Django? Answer: Below are the usage of middlewares in Django: • Session management • Cross-site request forgery protection • Use authentication • Content Gzipping Question: What are the roles of receiver and sender in signals?…

    • 1057 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays