Belarmino Chrisilda Roa - Arch Linux

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Vision: A leading State University in Technological and Professional

EASTERN VISAYAS STATE UNIVERISTY Education


BURAUEN CAMPUS Mission: Develop A Strong, Technologically, Professionally-Skilled As
Well As Productive Human Resource Imbued With Positive Values
Needed To Propel Sustainable Development.

I. Course Code / Title : IT 443L Linux OS


II. Program : Bachelor of Science in Information Technology
III. Credit Units : 3 units
IV. No. of Hours : 90 hours (3 hours Laboratory / 2 hours Lecture)
V. Pre-requisite Subjects : IT 363L Operating System
VI. Course Description :

Arch Linux: A Case Study

Abstract

We have been focusing our attention on the Ubuntu version of Linux. But

there are other Linux distributions.

One such distribution is Arch Linux, which is focused on simplicity and gives a

lot of control to the user. We will take a closer look at this distribution, and it

differences from Ubuntu.

I. Introduction

The great thing about Linux distro is that theres one for every skill

level. If youre new to Linux and want something that works right out of

the box (or rather, the ISO file), then either Ubuntu or Linux Mint is a good

choice. On the other hand, if youre comfortable with Linux and Unix and

you like to customize things a little (or perhaps, a lot), then you might

want to give Arch Linux a try.

IT 443L Linux Operating


Sytem
1
OpenSuse: A Case
Study StudyStudy
Vision: A leading State University in Technological and Professional
EASTERN VISAYAS STATE UNIVERISTY Education
BURAUEN CAMPUS Mission: Develop A Strong, Technologically, Professionally-Skilled As
Well As Productive Human Resource Imbued With Positive Values
Needed To Propel Sustainable Development.

Arch is a distro thats been around for about a decade, and tries to adhere

to a keep it simple stupid policy. Simplicity, however, means something

different to the Arch community than it does to the Ubuntu user base.

The early years

Judd Vinet, a Canadian programmer and occasional guitarist, began developing

Arch Linux in early 2001. Its first formal release, Arch Linux 0.1, was on March

11, 2002. Inspired by the elegant simplicity of Slack ware, BSD, PLD Linux, and

CRUX, and yet disappointed with their lack of package management at the

time; Vinet built his own distribution on similar principles as those distro. But, he

also wrote a package management program called pacman, to automatically

handle package installation, removal, and Arch Wiki.

Arch Linux (or Arch /rt/) [3] is a Linux distribution for computers based on IA-

32 and x86-64 architectures [4][b][c] It is composed predominantly of free and

open-source software,[5] and supports community involvement.[6]The design

approach of the development team follows the KISS principle ("keep it simple,

stupid") as the general guideline, and focuses on elegance, code correctness,

minimalism and simplicity, and expects the user to be willing to make some

effort to understand the system's operation.[7] A package manager written

specifically for Arch Linux, pacman, is used to install, remove and update

software packages.

IT 443L Linux Operating


Sytem
2
OpenSuse: A Case
Study StudyStudy
Vision: A leading State University in Technological and Professional
EASTERN VISAYAS STATE UNIVERISTY Education
BURAUEN CAMPUS Mission: Develop A Strong, Technologically, Professionally-Skilled As
Well As Productive Human Resource Imbued With Positive Values
Needed To Propel Sustainable Development.

Arch Linux uses a rolling release model, such that a regular system update is all

that is needed to obtain the latest Arch software; the installation images

released by the Arch team are simply up-to-date snapshots of the main system

components. Arch Linux has comprehensive documentation in the form of a

community wiki, called the Arch Wiki.

II. Process Management

This article provides information on prioritizing process threads in

real time, as opposed to at start up only. It shows how you can control

CPU, memory, and other resource utilization of individual processes, or all

processes run by a particular group.


While many recent processors are powerful enough to play a dozen video

or audio streams simultaneously, it is still possible that another thread

hijacks the processor for half a second to complete another task. This

results in short interrupts in audio or video streams. It is also possible that

video/audio streams get out of sync. While this is annoying for a casual

music listener; for a content producer, composer or video editor this issue

is much more serious as it interrupts their workflow.


The simple solution is to give the audio and video processes a higher

priority. However, while normal users can set a higher nice value to a

process, which means that its priority is lower, only root can set lower

values and start processes at a lower nice value than 0. This protects the

IT 443L Linux Operating


Sytem
3
OpenSuse: A Case
Study StudyStudy
Vision: A leading State University in Technological and Professional
EASTERN VISAYAS STATE UNIVERISTY Education
BURAUEN CAMPUS Mission: Develop A Strong, Technologically, Professionally-Skilled As
Well As Productive Human Resource Imbued With Positive Values
Needed To Propel Sustainable Development.

normal user from under powering processes which are essential to the

system. This can be especially important on multi-user machines.

III. Memory Management

IV. I/O

V. File System Management

In computing, a file system (or file system) is used to control how data is

stored and retrieved. Without a file system, information placed in a storage

medium would be one large body of data with no way to tell where one piece of

information stops and the next begins. By separating the data into pieces and

giving each piece a name, the information is easily isolated and identified.

Taking its name from the way paper-based information system are named,

each group of data is called a file. The structure and logic rules used to

manage the groups of information and their names is called a file system.

VI. Security

It is possible to tighten the security so much as to make your system

unusable. The trick is to secure it without overdoing it.

There are many other things that can be done to heighten the security, but the

biggest threat is, and will always be, the user. When you think security, you

have to think layers. When one layer is breached, another should stop the

IT 443L Linux Operating


Sytem
4
OpenSuse: A Case
Study StudyStudy
Vision: A leading State University in Technological and Professional
EASTERN VISAYAS STATE UNIVERISTY Education
BURAUEN CAMPUS Mission: Develop A Strong, Technologically, Professionally-Skilled As
Well As Productive Human Resource Imbued With Positive Values
Needed To Propel Sustainable Development.

attack. But you can never make the system 100% secure unless you unplug the

machine from all networks, lock it in a safe and never use it.

Be a little paranoid. It helps. And be suspicious. If anything sounds too good to

be true, it probably is! The principle of least privilege: each part of a system

should only be able to access what is required to use it, and nothing more.

The right choice for a password is something long (8-20 characters, depending

on importance) and seemingly completely random. A good technique for

building secure, seemingly random passwords is to base them on characters

from every word in a sentence. Take for instance the girl is walking down the

rainy street could be translated to t6!WdtR5 or, less simply, t&6!RrlW@dtR,57.

This approach could make it easier to remember a password, but note that the

various letters have very different probabilities of being found at the start of

words.

A better approach is to generate pseudo-random passwords with tools like

pwgen or apg: for memorizing them, one technique (for ones typed often) is to

generate a long password and memorize a minimally secure number of

characters, temporarily writing down the full generated string. Over time,

increase the number of characters typed - until the password is ingrained in

muscle memory and need not be remembered. This technique is more difficult,

but can provide confidence that a password will not turn up in wordlists or

"intelligent" brute force attacks that combine words and substitute characters.

IT 443L Linux Operating


Sytem
5
OpenSuse: A Case
Study StudyStudy
Vision: A leading State University in Technological and Professional
EASTERN VISAYAS STATE UNIVERISTY Education
BURAUEN CAMPUS Mission: Develop A Strong, Technologically, Professionally-Skilled As
Well As Productive Human Resource Imbued With Positive Values
Needed To Propel Sustainable Development.

It is also very effective to combine these two techniques by saving long,

complex random passwords with a password manager, which will be in turn

accessed with a mnemonic password that will have to be used only for that

purpose, especially avoiding to ever transmit it over any kind of network. This

method of course limits the use of the stored passwords to the terminals where

the database is available for reading (which on the other hand could be seen as

an added security feature).

IT 443L Linux Operating


Sytem
6
OpenSuse: A Case
Study StudyStudy

You might also like