Research paper topics, free example research papers

Free research papers and essays on topics related to: linux

  • 29 results found, view research papers on page:
  • 1
  • 2
  • Linux And Windows Nt - 925 words
    Linux And Windows NT Forget the browser wars. This year's big nerd battle is the server shootout between Linux and Windows NT - and it's not just a bunch of geeks nit-picking. While both offer more affordable platforms for Web service than in the past, Linux and NT are polar opposites on almost every other level. They look different, run differently, support different software, and cost money in different places. So far though, most press coverage of the Linux-NT debate has focused on the competing business models, and there's been little helpful information for deciding which OS to use. At the other end of the coverage spectrum, technical comparisons usually stick to performance tests, chur ...
    Related: linux, windows, solving problems, internet information, director
  • Linux Networking Capabilities - 620 words
    Linux Networking Capabilities Linux is a Unix clone written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. It aims towards POSIX compliance. It has all the features expected in a modern fully-fledged Unix, including true multitasking, virtual memory, shared libraries, demand loading, shared copy-on-write executables, proper memory management and TCP/IP networking. It runs mainly on 386/486/586-based PCs, using the hardware facilities of the 386-processor family to implement these features. Ports to other architectures are underway. Linux is freely available, and no one is required to register their copies with any central authority, so it i ...
    Related: linux, networking, operating system, computer running, copy
  • Linux Operating Systems - 208 words
    Linux Operating Systems Tired of using Windows 95, or maybe just plan tired of the plainness of their interface. Well my friend there is a solution to all of your ails. A man by the name of Linus Travolds and many other professors, and programmers from around the globe have come up with a free offshoot of the operating system UNIX. What they have done is truly amazing, and has brought a very powerful multitasking operating system to the masses. This solves all of my problems with the computer and has happily been using a distribution of Linux from a company called RedHat for the past year or so. And best of all I received the operating system for free with the purchase of a book that tells m ...
    Related: linux, operating, operating system, operating systems
  • Anal Sex Banned - 718 words
    Anal Sex Banned? Jobs 126-150 of 518 matching your query Select position title for additional information about job listing. 126 - 150 Position Title: Mid-level AIX Unix / IBM RS6000 Admin Skills required: AIX and RS6000 Location: Chicago State: IL Pay Rate: Salary commensurate with experience Area: 773 Length: Temp Term: CON W2 Position Title: Software Engineer: Permanent, full time only Skills required: C++ UNIX and telecommunications experience Location: Chicago State: IL Pay Rate: $80K annual salary Area: 312 Length: Permanent, Full time Term: FULLTIME Position Title: Tibco Architect Skills required: TIB RV/RD MB HAWK JAVA TCP/UDP UNIX Sun Solaris Location: Chicago State: IL Pay Rate: Op ...
    Related: banned, data warehouse, system administrator, consultant, manager
  • Dos And Unix - 1,800 words
    ... commands. The rest of MS-DOS consists of a number of utility programs. Although DOS had cornered the PC market, UNIX was still dominant on the larger workstations. The birth of UNIX in 1969 provided the world with its first modern operating system. An interactive multi-user operating system, UNIX was initially developed by programmers for their own use. Working for Bell Laboratories, Ken Thompson and Dennis Ritchie created UNIX as an operating system for the PDP-7 computer. Designed as a simplification of an operating system named Multics, UNIX was developed in Assembly language, a primitive computer language specific to one type of machine (Osiris, 1). However, Thompson developed a new ...
    Related: unix, unix operating system, operating system, online accessed, incorporate
  • File Sharing Systems - 4,172 words
    ... ie Zahl der User, die nur Dateien downloaden ohne selbst welche anzubieten, explosiv ansteigt und somit die Napster Groupnets zu eigentlichen Musikbibliotheken degradiert werden. 2.2.2. Technische Aspekte Benutzung Im Gegensatz zu seinen weiterentwickelten Klonen verfgt Napster ber einen zentralen Server (www.napster.com), auf dem die Napster Software auf den eigenen PC zur Installation heruntergeladen werden kann. Nach erfolgter Installation wird der Windows Desktop um ein entsprechendes Icon ergnzt, welches bei Online Verbindung aktiviert werden kann. Das folgend erscheinende Benutzerinterface ermglicht die nach verschiedenen Begriffen geordnete Suche nach dem gewnschten Musikstck. G ...
    Related: file, file sharing, sharing, information services, search engine
  • Hackers - 2,008 words
    Hackers gescannt von: BITLES new- Jo Hallo erstmal! Ich hab heute fr euch Hacker's Black Book gescannt (kostet normal 30 DM)! In diesem 20 Seiten langen Buch gibt es andeutungen darauf wie man hackt, genaures findet man dann schon selber raus! ****Vorwort zum Scannen!!!**** Ich habe das Buch ja mit Texterkennung gescannt, da kann`s natrlich vorkommen, das statt einem U ein oder umgekehrt erkannt wird, oder das statt rn einfach ein m erkannt wird. Beispiel: pornsite = pomsite Hacker's Black Book Dieser Report ist in zweierlei Hinsicht hilfreich. Er soll Menschen, die ihr Passwort verloren haben, die Mglichkeit geben, es durch Anwendung einfacher Techniken ohne lange Wartezeiten zurckzubekomm ...
    Related: john miller, john smith, credit card, linux, wizard
  • Hackers - 2,055 words
    ... okolliert, herausfinden, wer ihn betrogen hat bzw. es versucht hat. Dazu braucht er lediglich Ihren Zugangsprovider zu kontaktieren und ihm die IP-Adresse mitzuteilen. Die Provider fhren i.d.R. ber die letzten 80 Tage ein Protokoll, wann wer mit welcher IP-Adresse online war. Login-Name Checker Manche Pay-Sites geben mglichen neuen Mitgliedern whrend der Anmeldungsprozedur bereits vor der eigentlichen Zahlung die Mglichkeit, einen Mitgliedsnamen zu whlen. Ist der gewnschte Name bereits vergeben, wird dies mitgeteilt und man soll einen anderen Namen whlen. Gibt man beispielsweise „John als Mitgliedsnamen ein, so sagt der Server meistens, da der Name bereits vergeben ist. Das ist nat ...
    Related: secure sockets layer, filename, user, layer
  • Hackers - 1,437 words
    ... ntinued oppression of East Timor. The attack was online for about 3 hours from 7.00 PM to10.00 PM (Portuguese Time) at the web site of the Department of Foreign Affairs,Republic of Indonesia. The hackers did not delete or change anything. The said "We justhack pages". Another major hack that occurred was on April 1 1981 by a single user.This hacker who was situated in an east coast brokage house was interested in the stockmarket. SO he purchased $100,000 worth of shares in the stock market. Then hehacked into the stock markets main computers and stole $80 million dollars. The hackerwas eventually caught although $53 million dollars was not recovered. On Wednesday,March 5 1997 The home pa ...
    Related: corporate america, operating system, high school, psychology, bias
  • Hacking - 1,173 words
    Hacking Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to check it out. This is what a so-called "hacker" faces. Just imagine that you saw an injured person on the side of the road. In this analogy you are not allowed to help the injured person. A hacker is not allowed to explore like everyone else in the world. A hacker is not allowed to help fix potential security holes. The term hacker can have many meanings. The most visible to the public is the person pirating software, and breaking into corporate networks and destroying information. This is the public misconception of a hacker. Ba ...
    Related: hacking, companies make, computer crime, high school, criminal
  • Hacking For Money - 1,955 words
    Hacking For Money Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference material such as computerized databases or CD-Rom encyclopedias are commercial products like any other, but the media of their transmission makes them different in at least one aspect: it is possible to copy them freely, or at least extremely cheaply. A compact disc of Elvis Costello and the Attractions is different from, say, a ham and swiss sandwich in many ways, but beyond the obvious is one reason that makes the nature of the two items and their production and purchase very different indeed: I can only eat the ham and ...
    Related: hacking, visual arts, state university, electronic media, disc
  • Hacking For Money - 1,941 words
    ... sign my own operating system from the ground up when I can take the work done by Linus Torvalds and the hundreds of other skilled programmers around the world, and bend it to my whim? This is a much more flexible system than one in which I must depend on Microsoft to provide me with every convenience I desire. How does this apply to the arts, though? Software is almost universally the kind of thing that is constantly being altered, updated, and optimized. Art is generally considered a thing that is made once and finished afterwards. I don't plan on remixing or modifying my Elvis Costello and the Attractions CDs. But should our copyright and licensing laws necessarily prohibit those who w ...
    Related: hacking, world wide web, marshall mcluhan, hard drive, advertising
  • Hewlettpackard Strategy - 4,132 words
    ... services, and server/workstation sales, and the corporate realignment. These steps to counteract the recent setback are positive, and will help prepare HP for the new millenium. Section 7 Internal Analysis Strengths ?Diversification ?Brand awareness ?R & D ?new product development/improvement ?Alliances ?Creation of Agilent Tech ?International Sales Diversification: Nearly 85% of HP뭩 revenue comes from its computer and related products/services. This leaves almost 15% of revenue to come from Agilent, where sales come from testing and measurement equipment and medical equipment. Brand awareness: HP, established in 1966, has a long-standing reputation and good 밷rand awareness ...
    Related: business level strategy, corporate level strategy, level strategy, price strategy, strategy
  • Hewlettpackard Strategy - 4,166 words
    ... back are positive, and will help prepare HP for the new millenium. Section 7 Internal Analysis Strengths Diversification Brand awareness R & D new product development/improvement Alliances Creation of Agilent Tech International Sales Diversification: Nearly 85% of HPs revenue comes from its computer and related products/services. This leaves almost 15% of revenue to come from Agilent, where sales come from testing and measurement equipment and medical equipment. Brand awareness: HP, established in 1966, has a long-standing reputation and good brand awareness in the computer industry. R & D: HP spent $3.4 billion in R&D during 1998 and placed on the market 24 new products company w ...
    Related: business level strategy, corporate level strategy, level strategy, price strategy, strategy
  • Java 2 - 563 words
    Java 2 December 1999 Sun Microsystems publicly released a series of eighty mini-programs known as Java 2 Enterprise Edition (J2EE) which are designed to enhance large corporate servers. This two-year project had been undertaken by numerous programmers from dozens of companies, working together on what they believed to be an open-source project to enhance the Web-wise Java language created by Sun. Many of these companies now feel betrayed because Sun Microsystems is attempting to levy a royalty against the new release. This decision has especially elicited an angry response from IBM -- Sun's biggest Java partner which developed 80% of the new release. IBM has taken the lead in its refusal to ...
    Related: java, open source, microsoft windows, sun microsystems, counter
  • Micro Soft The Split Of An Empire - 2,374 words
    ... rosoft has proposed that all of the above restrictions remain in place for four years instead of the ten as requested by the government, stating that nothing in the record would justify such a long term for relief. In their filings made with the U.S. District Court with their own proposals, Microsoft asserted that Judge Jackson's previous findings did not warrant the extreme measure of dividing the company in two. In stark contrast to the relief sought in its complaint, the government seeks to rip apart the company that until recently had the largest market capitalization in the world - an extreme remedy not even hinted at in the government's complaint, stated one of Microsoft's last fil ...
    Related: empire, micro, soft, split, saddle river
  • Microsoft Monopoly - 638 words
    Microsoft Monopoly By now everyone is familiar with the case U.S. vs. Microsoft. What is all this about? According to my two articles, Microsoft, the world's leading software company, is being sued by the Justice Department joined by 19 states. As we all know, Microsoft dominates the personal computer's operating system. Almost every computer in schools, libraries, offices, and home is equipped with either Windows 3.X, Windows 95, or 98. As far as browsing the web, there are three major browsers: AOL, Netscape and Microsoft's Internet Explorer. When Windows 98 came out, it already had Microsoft's Internet Explorer installed, compared to Netscape which users had to pay $50 for the program bef ...
    Related: microsoft, microsoft word, monopoly, using microsoft, appeals court
  • Monopoly Or Is It Just Phony - 647 words
    Monopoly Or Is It Just Phony Many people, with the government are trying to label Microsoft as a monopoly. Why is there any delay going around doing that? There is no reason to brand Microsoft as a monopoly. There is part of monopolistic competition and supply-demand acting on this case. The whole trial is about the free internet browser, Internet Explorer, that Microsoft gives out free and includes with its Operating system, Windows. Netscape does the same marketing of its product except that it does not have any operating system to sell with. Netscape is a relatively older browser and prior to Internet Explorer, there was only one browser, Netscape. There have been innumerous upgrades and ...
    Related: monopoly, internet browser, operating system, operating systems, park
  • Networking - 1,636 words
    Networking For my independent study, I have created a network in my house. A network by definition are more than one computer that are linked together electronically via a protocol (common language) so the computers can communicate and share resources. This network improves the day-to-day life by adding value and usefulness to the computers. The processes and ideas that I have learned thru this experience can be applied directly into today's rich electronic business environment. Identifying the needs of the user is the first step for building a well-designed Network. A professional installation was needed to maintain the aesthetics of the rental house. Most of the wires are run in the attic ...
    Related: networking, adding value, different levels, college students, transmitted
  • Operating Systems - 1,739 words
    Operating Systems Purpose The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a personal computer system, with monitor and printer that I could use to do Web-based research. The research will be done out of my house. It will be primarily based on comparing different start-up companies to determine investments for the future. Since I determined that all my research was going to be over the Internet, it was important to find a system that would be fast in downloading different sites and capturing information. I will be running my new system off a cable modem with Internet service provided by Time Warners Ro ...
    Related: based systems, computer system, operating, operating system, operating systems, windows operating system
  • 29 results found, view research papers on page:
  • 1
  • 2