X Window JianJing Cao (ID #98284). Content Introduction X Window System Function Window Principle How X Window Works Security.

Slides:



Advertisements
Similar presentations
What is a Computer Program? For a computer to be able to do anything (multiply, play a song, run a word processor), it must be given the instructions.
Advertisements

Operating-System Structures
Introduction to Linux X-Windows, Desktop Environments Other commonly used programs.
Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
An Overview of the Computer System
Operating-System Structures
Chapter One The Essence of UNIX.
SYSTEM ADMINISTRATION Chapter 19
Chapter 5 Input/Output Clocks User Interfaces: Keyboard, Mouse Power.
UNIX Chapter 01 Overview of Operating Systems Mr. Mohammad A. Smirat.
Internet Applications: Telnet, Ping and Traceroute.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Guide To UNIX Using Linux Third Edition
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
Operating System.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
CSC 142 A 1 CSC 142 Introduction to Java [Reading: chapter 0]
Server System. Introduction A server system is a computer, or series of computers, that link other computers or electronic devices together. They often.
Lesson 6 Operating Systems and Software
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
UNIX SVR4 COSC513 Zhaohui Chen Jiefei Huang. UNIX SVR4 UNIX system V release 4 is a major new release of the UNIX operating system, developed by AT&T.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
Module 7: Fundamentals of Administering Windows Server 2008.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Computer Programming A program is a set of instructions a computer follows in order to perform a task. solve a problem Collectively, these instructions.
Chapter 11 An Introduction to Visual Basic 2008 Why Windows and Why Visual Basic How You Develop a Visual Basic Application The Different Versions of Visual.
C H A P T E R T E N Event-Driven Programming Programming Languages – Principles and Paradigms by Allen Tucker, Robert Noonan.
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
CH 25-Remote Login (TELNET,Rlogin)
X-WindowsP.K.K.Thambi The X Window System Module 5.
J ava P rogramming: From Problem Analysis to Program Design, From Problem Analysis to Program Design, Second Edition Second Edition D.S. Malik D.S. Malik.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
CSCI 1101 INTRODUCTION TO COMPUTERS 5. Basic Computer Architecture.
Chapter 28 - Remote Login and Remote Desktops(TELNET) Introduction Early Computers Used Textual Interfaces A Timesharing System Requires User Identification.
1 Lecture 6 Introduction to Process Management COP 3353 Introduction to UNIX.
An operating system is the software that makes everything in the computer work together smoothly and efficiently. What is an Operating System?
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
SCSC 455 Computer Security Chapter 3 User Security.
System Design for Home Automaton. Design Goals Performance Criteria – Server prioritizes client requests to provide quick response time to critical requests.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
X Window System
2. OPERATING SYSTEM 2.1 Operating System Function
Virtual Network Computing
Module 4 Remote Login.
Chapter 2: System Structures
Introduction to Operating System (OS)
Prepared by: Ms. Amira al-Ghanem Prepared for: Ms. Omarine
An Overview of the Computer System
Outline Overview Development Tools
X Windows.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Windows desktop sharing
February 16th, 2004 Class Meeting 5
Lecture 6 Introduction to Process Management
Presentation transcript:

X Window JianJing Cao (ID #98284)

Content Introduction X Window System Function Window Principle How X Window Works Security

Introduction X window, a window system for UNIX was developed at M.I.T when graphics terminals came into existence The X Window system is device independent -- it can run on most common computer platforms. It includes workstations from companies such as Sun Microsystems Inc, and Silicon Graphics Inc.

Introduction X window is a portable, network- transparent window system which runs on many different computers. It is frequently used in conjunction with the UNIX operating system X window is a client-server model

X Window System

X Window system

Function X Window provides a consistent means of graphical user interaction for UNIX workstations. Motif (one of toolkit) uses X window provides an introduction to graphic user interface (GUI) programming base on Unix operating system.

Function With X the programmer can write a single application in a single language and run this program on different machines with little or no modification. Moreover, applications can actually run programs on one computer and have the results displayed on another (or several) computer's terminal.

X Window Principle All forms of displaying of information in X are bit-mapped X, like most other windowing systems, divides the screen into various parts that control input and output. Each part is called a window Not all applications need to consist of a single window.

X Window Principle There is one special window, the background or root window. All other windows are children of the root.

How X window Works It runs on a machine with a display, keyboard, and a mouse All a client program needs to do to use the X display is to open up a connection with the server and then send Protocol requests to it.

How X window works There are 4 types of messages passing between the client and server;  Requests - the client can ask the server to draw something, or ask for information.  Replies - the server can reply.  Events - the server can supervise the client with something  Errors - the server can report an error

Security Problem Solution

Damage Possible By Attacker  destroy any (or all) of your windows  open new windows on your screen  view the contents of your screen remotely  log all keystrokes, including passwords, typed while in X

Damage Possible By Attacker generate spurious X events causing arbitrary instructions to be executed (this risk is particularly great if you use Emacs)

Solution Host Authentication Token Authentication

Host Authentication Using xhost (display,add,move) Benfit: The xhost access control mechanism is certainly easy to use. A single program with a simple syntax is required Drawbacks: 1.Many environments, where numerous users are allowed access to a particular host. 2. NCD servers, SGI systems, and Mac X for the Macintosh come with access control disable by default.

Token Authentication xauth Program: The xauth program is used for editing and displaying the user's magic cookie authorization information The X Display Manager: xdm, is a client which provides login screens for multiple X Servers

Benefits: Authorization is now done on a user-by-user basis, not a host-by-host basis. Drawbacks: The xdm and xauth programs are time consuming for both the administrator and the end user to use and maintain. They require a good understanding of the X client-server model on the part of the user. Token Authentication

Reference ndow Structure Computer Organization 4th Edition Andrew S. Tanenbaum