Tugasan 5
punitaruben
Thursday, October 13, 2011
Tugasan TTM 309
Tugasan 4
Present about operating system protection and security. Explain and recognize security policy and mechanism, authentic basic also protection concept and access control.
definition of policy in system security is “what is allowed and what is not allowed“. And the respective mechanisms enforces policies. There are three goals of security: to prevent attackers from violating security policies, to detect attackers who are violating security policies, and to recover which stops the violation and repairs damage. The last one also includes the ability to function after being attacked.
There are three types of mechanisms. Secure, Precise, and Broad states. In a secure state mechanism, we allow the reachable states to be within a subset of reachable state. Therefore we provide extra security in this mechanism. In a precise state, we allow reachable states to go to all the secured states. That is to say that a user is allowed to go to all secured state and the number of reachable and secured state is the same, in other words, precise. In a broad state, we allow the user to go to an unsecured state and then a set of secured state. This is the most vulnerable mechanism.
In order to ponder on these issues we take a lot of things into consideration. We should determine the cost benefit of if it is cheaper to recover or to prevent. We should also do a risk-analysisWe should also keep the law and customs in mind, we should know if certain security measures are within the law or not, or would people even use these security measures.
Recognize security policy and mechanism.
· In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
· mechanism for controlling the access of programs, processes, or users the resources defined by the computer system. the protentation mechanism ensures the enforcement of a certain policy.
Elaborate authentic basic
Password
· A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.
Artifact
· In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).
· In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
· In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)
Biometric
· Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
Elaborate protection concept and access control
· For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time.
· Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
· At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system.
· The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.
Tugasan TTM 309
Tugasan 2
INPUT & OUTPUT MANAGEMENT
• Managing input & output in Windows XP involves many operating system componets.
• User-mode processes interact with an enviroment subsystem and not directly with kernel-mode componets.
• The enviroment subsystem pass input & output request to the input & output manager,which interacts with devices drivers to handle such request.
• Sereval device drivers,organized into a driver stack,cooperate to fulfill an input & output request.
• The plug and play manager dynamicaly recognizes when new devices are added to the system and allocates and deallocates resources,such as input & output ports or DMA channels, to them.
• The power manger administers the operating system’s power mangement policy.
• The power policy detemines whether to power down devices to conserve energy or keep them fully powered for high responsiveness.
Elaborate the concept of buffering
• Buffer overflow weakness is one of the many disadvantages of this type of security computer
• Buffer overflow attacks occur when the excessive Attacker provide input on the plan on the run
• Buffee overflow results from the weakness of the programming language c, c + +, fortran, and assembly, which does not automatically check the limit input when the program is executed
• The program is so complex, sehinnga programmers themselves do not know the weaknesses of the program
• Relies on external data to control the program
• Buffer is provided at the memory allocation, such as arrays or pointers in C. in the language C and C + +, there is no automatic restrictions on buffernya, where users can write through the input buffer. For example:
int main () {
int buffer [10];
buffer [20] = 10;
}
• Program in C above is a valid program, and each compiler to compile without error
• A process is a program in execution.
Recognize spooling technique
• In computer science, spooling refers to a process of transferring data by placing it in a temporary working area where another program may access it for processing at a later point in time.
• The normal English verb "spool" can refer to the action of a storage device that incorporates a physical spool or reel, such as a tape drive.
• Spooling refers to copying files in parallel with other work.
• The most common use is in reading files used by a job into or writing them from a buffer on a magnetic tape or a disk.
• Spooling is useful because devices access data at different rates. The buffer provides a waiting station where data can rest while the slower device catches up.
• This temporary working area would normally be a file or storage device.
• The most common spooling application is print spooling: documents formatted for printing are stored onto a buffer (usually an area on a disk) by a fast processor and retrieved and printed by a relatively slower printer at its own rate.
• Spooler or print management software may allow priorities to be assigned to jobs, notify users when they have printed, distribute jobs among several printers, allow stationery to be changed or select it automatically, generate banner pages to identify and separate print jobs, etc.
• The temporary storage area to which E-mail is delivered by a Mail Transfer Agent and in which it waits to be picked up by a Mail User Agent is sometimes called a mail spool.
Tugasan 3..
Also referred to as simply a file system or file system.
• The system that an operating system or program uses to organize and keep track of files.
• For example, a hierarchical file system is one that uses directories to organize files into a tree structure.
• Although the operating system provides its own file management system, you can buy separate file management systems.
• These systems interact smoothly with the operating system but provide more features, such as improved backup procedures and stricter file protection.
File Sharing
• Sharing of files on multi-user systems is desirable
• Sharing may be done through a protection scheme
• On distributed systems, files may be shared across a network
• Network File System (NFS) is a common distributed file-sharing method
Directory Structure
• A collection of nodes containing information about all files.
• Both the directory structure and the files reside on disk.
• Backups of these two structures are kept on tapes
File Mapping
• File mapping is the association of a file's contents with a portion of the virtual address space of a process.
• The system creates a file mapping object (also known as a section object) to maintain this association.
• A file view is the portion of virtual address space that a process uses to access the file's contents.
• File mapping allows the process to use both random input and output (I/O) and sequential I/O.
• It also allows the process to work efficiently with a large data file, such as a database, without having to map the whole file into memory.
• Multiple processes can also use memory-mapped files to share data.
• Processes read from and write to the file view using pointers, just as they would with dynamically allocated memory.
• The use of file mapping improves efficiency because the file resides on disk, but the file view resides in memory.
• Processes can also manipulate the file view with the Virtual Protect function.
Tugasan TTM 309
Tugasan 1
Memory management especially the objectives and memory management concept. Elaborate on virtual memory implementation such as paging and segmentation. Explain memory relocation of paging system
Objectives Memory Management
An operating system is a program that controls the execution of application
programs and acts as an interface between the user of a computer and the
computer hardware. An operating system has three objectives as listed
below:
􀂾 Conveniency: An operating system makes a computer more
convenient to be used.
􀂾 Efficiency: An operating system allows the computer system
resources to be used in an efficient manner
􀂾 Ability to evolve: an operating system is constructed in such a way
as to permit the effective development, testing and introduction of
new system function without at the same time interfering with
service.
Meanwhile the functions of operating system are to:
􀂾 Control the computer resources
􀂾 Program implementation
􀂾 Manage the data and information
virtual memory implementation
virtual memory is a memory management technique developed for multitasking kernels. This technique virtualizes a computer architecture's various hardware memory device (such as RAM modules and disk storage drives), allowing a program to be designed as though:
- · there is only one hardware memory device and this "virtual" device acts like a RAM module.
- · the program has, by default, sole access to this virtual RAM module as the basis for a contiguous working memory.
- When the kernel detects a page fault it will generally adjust the virtual memory range of the program which triggered it, granting it access to the memory requested. This gives the kernel discretionary power over where a particular application's memory is stored, or even whether or not it has actually been allocated yet.
Segmentation
- · Memory-management scheme that supports user view of memory
- · A program is a collection of segments. A segment is a logical unitsuch as:
- - main program,
- -procedure,
- -function,
- -method,
- -object,
- -local variables, global variables,
- -common block,
- -stack,
- -symbol table, arrays
PAGING
- · Logical address space of a process can be noncontiguous; process is allocated physical memory whenever the latter is available
- · Divide physical memory into fixed-sized blocks called frames (size is power of 2, between 512 bytes and 8,192 bytes)
- · Divide logical memory into blocks of same size called pages
- · Keep track of all free frames
- · To run a program of size n pages, need to find n free frames and load program
- · Set up a page table to translate logical to physical addresses
- · Internal fragmentation
Explain memory relocation of paging system
Paging permits a program to be allocated noncontiguous blocks of memory. We divide programs into pages which are blocks of small, fixed size. We then divide the physical memory into frames which are blocks of size equal to page size. We use a page-table to map program pages to memory frames.
The page size (S) is defined by the hardware. Generally it ranges from 512 words/page to 4096 words/page.
The page size (S) is defined by the hardware. Generally it ranges from 512 words/page to 4096 words/page.
Sunday, September 11, 2011
The Indian Food
Indian influence in Malaysian cuisine started in the 19th century when large arrivals of Indian migrants were brought into the country as contract laborers to work in rubber estates and on the railways. Some did take the opportunity to set up trade in the textile and food industry. Indian cuisine can be divided into two mainstreams, Northern and Southern Indian cuisine.
North Indian cuisine boasts of a diet rich in meat and uses spices and ingredients such as yogurt and ghee in dishes that are elaborate without being overly spicy. Here, bread and chapati (wheat-flour pancakes) replaces rice, which is the center of most South Indian meals. Coconut milk, mustard seeds, and chilies are also widely used in the Southern province.
Spices are the heart and soul of Indian cooking. But the quantity and proportions vary with the geographical boundaries. Curry powder is almost never used. Spices are freshly grounded and added in many different combinations. Spices commonly used are coriander, turmeric, cumin, chilies, fennel, and fenugreek. Other fragrant spices added are cardamom, clove, cinnamon and star aniseed.
In Malaysia, there is an abundant of Indian restaurants and food stalls to wet your appetite. They are traditionally served on a thali, a circular metal tray on which a number of small bowls called katori, also made from metal, are placed. Eaten with fingers, rice or bread are placed directly on the thali while curries and other dishes are served in the bowls. For South Indian cuisine, banana leaves are often used as plates where rice is served in the center, followed by various curries and accompaniments around it. These include dried fish, pappadams (lentil wafers), fresh chutneys made from herbs, coconut, and acid fruits among others.
Local Indian hawkers have created unique versions of local dishes, which are not found in India. For example, "mee goreng" is a combination of fresh Chinese yellow noodles, tofu, bean-sprouts, and dried shrimp paste. Malaysia also abounds with shops offering "Nasi Kandar", which is basically a combination of Malay and Indian cuisine - hence very Malaysian - although the taste is more robust. This concept came about when "nasi" (rice) hawkers would previously "kandar" (balance a pole on the shoulder with two huge containers on both ends) their wares.
Bread is the main item in most meals in North Indian cuisine. Therefore, a wide variety of bread is offered at these restaurants. Nann (leavened bread with poppy seeds) is a popular choice. The bread dough is rolled out and then slapped on the inside of the tandoori, near the top where it cooks very quickly in the fierce heat. It is then flavored with onion or garlic. Paratha or it's localized version of Roti Canai, meanwhile, is rich, flaky, and flavored with ghee. It can be eaten as an accompaniment or by itself, filled with potatoes and peas. Chapati is another leavened bread. It resembles flat discs and has a delightful flavor and chewy texture. Murtabak is stuffed Paratha based dough, which has a Meat, vegetables and egg in it.
Tandoori dishes are the most popular main courses in North Indian restaurants. Tandoori chicken is always a favorite, where a whole baby chicken or chicken quarters are roasted in the clay oven for several hours in advance and then finished off on the barbecue.
The Chinese Food
|
Chinese Food and Drinks including Traditional Chinese Cuisine & Drink Recipe
Food Culture
Subscribe to:
Posts (Atom)