Damn Small Linux ITEC 5321 Dr Edward Crowley Pranitha Koya Pranitha Koya.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

1. Reasons for logging on as a root •Most people are familiar with Windows systems with regard to administrative privileges. Many user running windows.
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
The Penguin Sleuth Kit By Ernest Baca
INSTALLING LINUX.  Identify the proper Hardware  Methods for installing Linux  Determine a purpose for the Linux Machine  Linux File Systems  Linux.
Fedora Linux Fedora: the (somewhat) new Linux distribution on the block. To switch or not to switch? Moreover, why use it at all? And, what is its target?
Internet Research Internet Applications. The Internet is not the Web Because of the great popularity of the World Wide Web, people think the Internet.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
Linux GUI X-Windows System. X-Windows System A stable and extremely powerful GUI system that provides a complete Client/Server framework. The X-org foundation.
Post install; Live CD Chapter II / Part 1I. Post install After install completes, take out the install CD/DVD Reboot Check if boot loader is working properly.
Network Performance Toolkit (NPToolkit) A Knoppix Live-CD Rich Carlson Tools Tutorial 12/4/06.
Welcome Course 20410B Module 0: Introduction Audience
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Abstract: Acknowledgments I thank the instructor of this course, Prof. Crowley for his help with the project, post design and lab instruction. Conclusions.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Developed by Klaus Knopper Linux Consultant. What is Knoppix?  Unix-like operating system  Run directly from CD or DVD  Bootable from USB flash drive.
1 Computer Security: Protect your PC and Protect Yourself.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 5: Multimedia on the Web.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Linux GUI Chapter 5. Graphical User Interface GUI vs. CLI Easier and more intuitive More popular and advanced Needed for graphics, web browsing Linux.
© 2009 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Preload Software – Lenovo Quick Start.
Breathing New Life Into An Old Laptop. Give an Old Laptop New Life with Cheap (or Free) Projects Picture frame Wireless Bridge File Server Printer server.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Boot Diskettes, Bootable USB Keys and Live CDs Used when the computer can't start for some reason, as a diagnostic, repair and recovery tool. Boot diskettes.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
-Electronic mail which allows individuals with an account to send messages to another person with an e- mail account. IRC- internet relay chat was.
Booting Ubuntu Linux Live CSCI 130 – Fall 2008 Action Lab Dr. W. Jones.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Ubuntu (Desktop Edition) Presented by, Barry, Elh Ibrahima ITEC400 Franklin University Professor Robert D’Andrea April 10, 2008 ___________________.
The Future of Windows ComNET 2002 DC David Strom
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Introduction After seeing the pressure of license and proprietary software users where a lot of money is needed to make sure the software is in good condition,
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
CHAPTER 2. Overview 1. Pre-Installation Tasks 2. Installing and Configuring Linux 3. X Server 4. Post Installation Configuration and Tasks.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Kickstart Installation
1 Copyright © 2015 Pexus LLC Patriot PS Personal Server Installing Patriot PS ISO Image on.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Data recovery in 15 minutes or less UsingKnoppix.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Windows Certification Paths OR MCSA Windows Server 2012 Installing and Configuring Windows Server 2012 Exam (20410) Administering Windows Server.
Create a Unix/Linux Live CD/DVD/USB ITSC Create a Fedora USB or Live CD Go to: – Fedora Chapter 3 Making Media site Fedora Chapter 3 Making Media.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
DIT314 ~ Client Operating System & Administration
1 COP 4343 Unix System Administration Unit 1: –Linux OS structure –Distributions –Hardware inventory –Disks and partitions –Installation steps –Boot loader.
Boot Diskettes, Bootable USB Keys and Live CDs Used when the computer can't start for some reason, as a diagnostic, repair and recovery tool. Boot diskettes.
Getting Connected to NGS while on the Road…
Introduction to Barracuda IM Firewall
Connecting Desktops and Laptops to Networks
Module Overview Installing and Configuring a Network Policy Server
3.1 Types of Servers.
Vocabulary 1 Electronic Mail which allows individuals with an account to send messages to another person with an account. IRC: Internet.
OPEN SOURCE SOFTWARE (OSS)
Services Provided by Network Operating Systems
Getting Connected to NGS while on the Road…
CHAPTER Introduction to LANs
© 2009 Prentice-Hall, Inc..
SUSE Linux Enterprise Desktop Administration
Lesson 5: Multimedia on the Web
Presentation transcript:

Damn Small Linux ITEC 5321 Dr Edward Crowley Pranitha Koya Pranitha Koya

What is DSL? DSL is a very versatile 50MB mini desktop oriented Linux distribution. DSL is a very versatile 50MB mini desktop oriented Linux distribution. DSL is based on Knoppix debian GNU Linux Technology. DSL is based on Knoppix debian GNU Linux Technology.

Why is it developed? It is developed as an experiment to see how many usable desktop applications can fit inside a 50MB live CD. It is developed as an experiment to see how many usable desktop applications can fit inside a 50MB live CD.

Different ways to use it Installs to USB pen drives Installs to USB pen drives Extendable via MyDSL Extendable via MyDSL Runs as a guest OS Runs as a guest OS Installs to HD as Debian Installs to HD as Debian

How it looks like?

How will it Boot?

Start DSL? Dillo will help you Dillo will help you

Default Desktop for DSL?

Working in a window

DSL Control Panel

Features Features FluxBox FluxBox Handles styles, colors and window placement. Handles styles, colors and window placement. Browsing for a solution Browsing for a solution FireFox, Dillo browser FireFox, Dillo browser

Features Features Get an Instant message Get an Instant message AOL Instant Messenger (AIM), AOL I Seek You (ICQ), Internet Relay Chat (IRC), and The lily CMC. AOL Instant Messenger (AIM), AOL I Seek You (ICQ), Internet Relay Chat (IRC), and The lily CMC. Media Media PDF viewer (Xpdf), PDF viewer (Xpdf), CD, MP3, MPEG media file support (XMMS) CD, MP3, MPEG media file support (XMMS)

Features Media Media CD burning application  BashBurn CD burning application  BashBurn Color Image editing Tool  Xpaint. Color Image editing Tool  Xpaint. VNCviewer / Rdesktop VNCviewer / Rdesktop Used to control and manage other Windows or Linux operating systems remotely Used to control and manage other Windows or Linux operating systems remotely

Features Networking services Networking services Includes SSH/SCP server and client, FTP, HTTPD, DHCP client, and NFS. Includes SSH/SCP server and client, FTP, HTTPD, DHCP client, and NFS. DSL also supports DSL also supports USB, PCMCIA, and wireless support for some WLAN cards USB, PCMCIA, and wireless support for some WLAN cards

Features DSL also has SQLite DSL also has SQLite A small C library that implements a self-contained, embeddable, zero- configuration SQL database engine. A small C library that implements a self-contained, embeddable, zero- configuration SQL database engine.

Where it safeguards security Availability (NIST ) Availability (NIST ) The security goal that generates the requirements for protection of data. The security goal that generates the requirements for protection of data. Confidentiality (NIST ) Confidentiality (NIST ) The security goal that generates protection from intentional or accidental attempts to perform unauthorized data reads. The security goal that generates protection from intentional or accidental attempts to perform unauthorized data reads.

DSL helps organisations It can retrieve data from a dead box’s hard drive AVAILABILITY It can retrieve data from a dead box’s hard drive AVAILABILITY It provides authentication for each and every directory we create through GUI CONFIDENTIALITY It provides authentication for each and every directory we create through GUI CONFIDENTIALITY

Conclusion The smallest operating system of 50MB which has a GUI. The smallest operating system of 50MB which has a GUI. “Great things are not done by impulse, but by a series of small things brought together”. “Great things are not done by impulse, but by a series of small things brought together”.

Questions??