Here is the synopsis of our sample research paper on Implementation: Windows UNIX vs. LINUX. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
If there is no living without networking, there is no living without network security, and this growing threat makes it wise to consider other options to the Windows OS. Two operating systems, UNIX and LINUX, are possibilities. They are compared in terms of implementing network security. Considering what is at stake, LINUX proves the better system. Bibliography lists 6 sources. jvOSimpl.rtf
Page Count:
10 pages (~225 words per page)
File: D0_jvOSimpl.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
For many years after Bill Gates wrote DOS and marketed it to computer designers so effectively, there seemed to be only one real choice, the Windows operating system (OS). But
Windows has become the target of most hackers because its security is so easy to breach. This is true of other operating systems, but so far, not of LINUX.
If there is no living without networking, there is no living without network security, and this growing threat makes it wise to consider other
options to the Windows OS in order to have secure networks, but which are also compatible with the Windows personal production environment. Two
operating systems, UNIX and LINUX, are both possibilities. They are compared below in terms of implementing network security to protect against both insider and outsider system abuse. Considering what is
at stake, LINUX proves the better system for network security. UNIX AusCERT (http://www.auscert.org.au/render.html?cid=1920) offers the
most comprehensive view of how to maintain security on a UNIX system. Some of the issues involved include the following: understanding the security threat, installing patches, configuring network services (and
all other services), packet filtering, file system security, and security monitoring. Each of these topics is addressed below. Know the Threat
In contrast to the LINUX, UNIX suffers from vulnerability to attacks. The particular vulnerabilities of UNIX are outlined in detail in several documents offered
by att.research.com. Another host of papers and instructions for resolving UNIX vulnerabilities can be found via Matt Deters Unix Security Page (http://www.deter.com/unix/).
...