The Importance Of File Management

Superior Essays
Register to read the introduction… Disk clean up removes unused file fragments, and files left on the Hard drive. Finally back up which can be done on a physical object like a CD or DVD to online servers, which they now call the cloud.
Now there are a few things that define file management, they are as follows:

1) To Check the validity of a file
2) I/O support for devices
3) Minimize / eliminate potential lost / destroyed data
4) I/O support for multiple users
5) Provide standard routines for file transfer , I/O work

Now the needs covered by file management for users are as follows:

1) Each user needs to access to create, delete, read, write, and modify a file.
2) Each user must have limited to no access to others files.
3) Each user must be able to control what others can do with their files.
4) Each user must have the ability to transfer data between each other.
5) Each user must be able to back up and recover their files.
6) Each user must be able to access their files by name, not the hidden numerical
…show more content…
Knowing the memory address of such critical files allowed malicious access at the kernel level and allowed unscrupulous program writes to take advantage of the known locations. Microsoft has implemented new memory access technology that includes Dynamic Allocation of Kernel Virtual Address Space (including paged and non-paged pools), kernel-mode stack jumping, and Address Space Layout Randomization. These changes reduce the ability of malicious program developers to take advantage of known address …show more content…
“Memory management services in Linux are built on a programming foundation that includes a peripheral device called Memory Management Unit (MMU). MMU translates physical memory addresses to linear addresses used by the operating system, and requests a page fault interrupt, when the CPU tries to access memory that it is not entitled to”. (www.codeproject.com) In Linux you can use the subsystem of allocating and releasing memory. The subsystem consist of 3 layers of which are the Slab Allocator, the zone Allocator and the buddy allocator. In Linux, you can also use Heap manager or create your own heap manager on top of the Kernel system calls. One thing I do like over the windows program is the Out-of-memory killer, or OOM Killer. The OOM killer has the task to try and free some memory for the user, killing other processes and releasing their memory or it will kill your process if the system feels your process is not a priority at the time. This can save a lot of headache Vs. having to use a Task manager to kill background processes just to complete another. This OOM killer is a highly valuable tool to have if you are in a memory crunch and need the available space freed up, but if you do have a process that you wouldn’t want to lose data on, it’s best to close it yourself

Related Documents

  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Lab #5: Introduction to Metasploit on Kali Linux Team: CRYPTERS 1 d. Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search. It is always a good practice on any operating system to run your applications on a user level and leave the administrative tasks to the root user, and only on a per-need basis. Applications are meant to be run by users with non-administrative privileges.(Power December 4, 2010)…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Paper

    • 521 Words
    • 3 Pages

    A Distributed File System (DFS) is being used as it will provide a centralize location for the data as well as its ability to be expanded easily as more files and folder are created. The Distributed File System (DFS) will also provide the mechanisms for replicating the data as well…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1-What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? keeping a track of round trip response time, regular checkups of major routers, firewalls and switches, identifying sources and destinations of network traffic, analyzing its direction and balancing the data travel between source and destination are the some important factors. Documentation should be done for Data stores and traffic flows, the number of stations, average time a station is idle between sending frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    What different people will use the system for 5. Recourses needed Everything is done by hand and there is a poor filing system, therefore there is a great likelihood that important documents will end up accidently misplaced, disregarded or out of date. Basic tasks take much longer than they should and customers have to wait in long queues. A lot of money gets thrown away unnecessarily, for example, on paper and printer ink.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    · Memory: This is any computer component that has the ability to storing information or data temporary or permanently, e.g. Read And Write Memory (RAM) and Not Volatile Read And Write Memory (NVRAM). · CPU: This is the brain of the computer and is the central process unit, and it received command/instruction from the computer software and sends the instruction to the right hardware to execute the instruction, and also received the feedback from the hardware and forwards it to the software. · Storage: This is the part of the computer where information or data have been kept temporary or permanently.…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Central Processing Unit (CPU) which is made up of three major components, the arithmetic/logic unit (ALU), the control unit (CU) and memory by combining the ALU and CU together you get the CPU), (Englander, I. 2014). The arithmetic/logic unit holds data temporary and where calculation are processed the control units controls and deciphers the execution command and follow the instruction that goes with the sequence of actions. The control unit determines the particular instruction to be executed by reading the program counter (PC) (Englander, I. 2014). Primary memory holds program instructions and data and interacts directly with the CPU during program execution. The control unit also reads and interprets instructions from memory and transforms them into a series of signals to activate other parts of the computer.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Software Management, Linux on Your System #2 This week’s critical thinking assignment explores the software and process management capabilities incorporated in the current release of the Fedora operating system. To do this, multiple commands will be used such as rpm, yum, and wget, along with documentation of the install process. Finally, the kill and ps commands will also be used to view and manage running processes on the server.…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HIPAA Compliance

    • 1020 Words
    • 5 Pages

    With more medicinal experts utilizing individual cell phones to discuss and work together on patient concerns, it is imperative that human services associations address the utilization of innovation and HIPAA consistence. Numerous types of much of the time utilized correspondence are not HIPAA agreeable. Unsecure channels of correspondence by and large incorporate SMS, Skype and email since duplicates of messages are left on administration suppliers' servers over which a social insurance association has no control. List of technology that works with HIPAA: -Any…

    • 1020 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Automation could be employed to move critical files to an alternate location for safe storage. The alternate location could then be backed up to tape or some other type of long term storage media. Effective file management must include a definition of what is critical to be backed up, and what is not (Needleman, 2015). Conclusion File management is one of the most important aspects of an information technology function within a business.…

    • 1077 Words
    • 5 Pages
    Superior Essays