Security, Security And Usability Of Windows And Linux

Improved Essays
An operating system (OS) is the main component of computer software and acts as the intermediary between the hardware of the computer and the software programs. Windows is an operating system used by many personal computers and businesses and is familiar to most computer users. Linux is not often found on a store-bought PC and is mainly used as a server’s OS or to host online services. Both are marketed toward two very diverse groups of computer users, but can give their users a similar feeling of freedom and accessibility. Security, compatibility, and usability of Windows and Linux share various components from one another, but are unique between each operating system. Security is a principle component of any OS, and although both Windows …show more content…
Windows has great stability and is widely used around the world, but due to its extensive range of software capabilities, it is often more prone to viruses than Linux. In comparison, both offer a similar degree of protection, but Linux is not targeted as harshly as Windows because of their popularity difference. When the Windows OS is initially installed onto the preferred hardware, it automatically gives the user administrator controls and full access to all software programs. This ease of access provides a way for viruses and other forms of malicious software to use the administrator permissions and manipulate the operating system. Unlike Windows, Linux does not give the initial user any administrator permissions, or root access, after installation to avoid any complications with malware from the start of the system. Since Linux is open source and the code is accessible to anyone, any code flaws are usually found and resolved quickly by a member of the OS distribution community. Windows is privatized and does not leave their system openly sourced, so any …show more content…
Most popular programs are compatible with Windows, due to its high popularity with most personal computers. Linux is not a usual OS found on PCs, but it has a large variety of downloadable programs in its own repositories of application files. Linux users usually do not have the luxury of accessing as many programs as Windows users, but many program developers build their projects for multiple operating systems. Although Linux lacks the variety of downloadable programs that Windows has, it is easily compatible with various kinds of hardware. Windows is only limited to computers, servers, and some phones, while Linux can be installed on computers, servers, phones, consoles, mainframes, and supercomputers. Both operating systems share some software and hardware compatibility, but due to how diversely the systems work, there are some

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    It is software free, so it can run on all operating systems…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Interrupts are most important as they give user the better control over the computer. Without interrupts, a user have to wait for a given task to complete in a specific time management with the higher priotity. This ensures that the CPU will charge the process immediately. 2. What is a trap?…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Lab #5: Introduction to Metasploit on Kali Linux Team: CRYPTERS 1 d. Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search. It is always a good practice on any operating system to run your applications on a user level and leave the administrative tasks to the root user, and only on a per-need basis. Applications are meant to be run by users with non-administrative privileges.(Power December 4, 2010)…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 1 Study

    • 419 Words
    • 2 Pages

    Different versions of Windows or Linux can run as a host OS. The guest OS runs in a virtual machine. Many operating systems existing on Intel chips can run as guest operating systems. In fact, even DOS is support in this mode. VMware GSX Server manages virtual machines to be remotely, routinely provisioned, and standardized on a secure, uniform platform.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Software Management, Linux on Your System #2 This week’s critical thinking assignment explores the software and process management capabilities incorporated in the current release of the Fedora operating system. To do this, multiple commands will be used such as rpm, yum, and wget, along with documentation of the install process. Finally, the kill and ps commands will also be used to view and manage running processes on the server.…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Also, the correct internet browsing security configuration setting should be implemented on the end users laptop to allow first party cookies, and blocking the third party cookies from other websites to protect from tracking and advertisements. By hardening it means that “Protection is provided in various layers and is often referred to as defense in depth. Protecting in layers means to protect at the host level, the application level, the operating system level, the user level, the physical level and all the sublevels in between” [1]. The best practices recommends that the antivirus program should be scheduled periodically to monitor any…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Canonical can help you prioritize the areas of your business that will benefit the most, so you can see a faster return on your investment. Ubuntu works well with Windows on workstations as…

    • 1782 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    Nt1310 Unit 1 Lab 2 Essay

    • 2411 Words
    • 10 Pages

    Objective As future computer professionals, students of CIT 17600 need a basic understanding of the location and abilities of a variety of tools on Microsoft environments. The Windows Lab 2 was designed to provide a glimpse into these tools. The Microsoft environment that was researched was Windows 7.…

    • 2411 Words
    • 10 Pages
    Superior Essays
  • Superior Essays

    Riding The Bear Analysis

    • 1544 Words
    • 7 Pages

    The movie “ Triumph of the Nerds: Riding the Bear” may sounded funny when you first heard it, but in fact it is a documentary about how Microsoft rise as a major company that produces Operating System (OS) that is used worldwide until this day. The key of Microsoft success can be seen from the title “Riding the Bear”, where at that time Microsoft was still a small company that has a very smart business strategy. The business strategy that Microsoft employed is the utilization of a powerful company called the IBM, and in a way they rose to the top by using them. Another important part of the movie is the fact that this is the initial introduction to the world of Personal Computer (PC), whereas at that time the idea of a small size plastic boxes…

    • 1544 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    These threats can come in many forms, users can get viruses on their computer or an actual person can hack into the user’s account. A user who wants the best protection will need to keep the choice of operating system in mind.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A router's job is to connect to networks together, a router at home is connecting your computers network to your internet provider, there are two types of routers, wired and wireless. Most wireless routers also come with sockets for ethernet cables so it doubles as a wired router. For online gaming we want to the fastest and most secure connection possible. Some routers may only be able to function at a maximum speed so we want to get one that can match or exceed the speed of internet that we will be getting from our internet provider. We will use ethernet cables as they offer a more secure connection than wireless, we also want to make sure our ethernet cable is not holding back our internet's speed.…

    • 359 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Technology is a really interesting sector. The way how each technology works; how they differ, how they common with each other is really interesting. I find it quirky and astonishing. It is so complex that not everyone can use it easily thus it is challenging. This could be one of the reasons why I would like to study cyber security.…

    • 768 Words
    • 4 Pages
    Improved Essays