Indeed the worst feature of all is the inability after th e event to prove what really happened.June 2007 Authors: Idongesit Efaemiode Eteng 4.83 University of Calabar Felix Ukpai Ogban 5.18 University of Calabar H.
Operating System Design And Implementation Solution Download Citation CopyBASSEY Download full-text PDF Read full-text Download full-text PDF Read full-text Download citation Copy link Link copied Read full-text Download citation Copy link Link copied References (18) Figures (2) Abstract and Figures In this paper, the UNIX file system is analyzed, the security weaknesses are x-rayed, an improved on-time password authentication technique is presented, and the underlying model used for the design is described.
Moreover, a password authentication program was designed which implements an improvement of the general one-time password technique. Passwords, which are individually selected by users from a code-book are now randomly selected by the system for the user in the improved program. ![]() Shell between the user and the resident Operating System Simulation model of the one-time password aging with an improved authentication technique Figures - uploaded by Idongesit Efaemiode Eteng Author content All figure content in this area was uploaded by Idongesit Efaemiode Eteng Content may be subject to copyright. Operating System Design And Implementation Solution Free Public FullDiscover the worlds research 19 million members 135 million publications 700k research projects Join for free Public Full-text 1 Content uploaded by Idongesit Efaemiode Eteng Author content All content in this area was uploaded by Idongesit Efaemiode Eteng on Oct 05, 2016 Content may be subject to copyright. INTRODUCTION An operating system presents the computer user with an equivalent of an extended m achine or virtual machine that makes it a lot easier to programme and make general use o f the computer. This set of manual and automatic procedures also enable a group of people to share a computer installation efficiently. ![]() ![]() The simultaneous presence of data and programmes belonging to different users requires that an operating system protect users against each other. Operating System Design And Implementation Solution Portable Operating SystemThe UNIX operating system is a multitasking, multi-user and highly portable operating system that provides a powerful and hospitable program development environment. It controls the computer resources and provides a base upon which the application program runs. The UNIX operating system uses a hierarchical f ile system that is organi zed as a tree with the root node called T he Root and represented by a single (slash). The hierarchical file system has the root file system at the top o f the hierarc hy of files and this file system is the key to the UNIX operating system. File systems often contain information that is high ly valuable to their users. Therefore protecting this information against unauth orized usage is a major concern of all file systems with UNIX inclusive. One of the most important security fe atures used today are passwords. However secure and unguessable the password may seem, it is pertinen t to have in place a system that can authenticate the password whenever it is being used to log on the system. However, the problem with passwords is that they are easily transferable with the owners connivance and most times unfortunately, without owners permission. Therefore, though passwords have been and are used widely in the computer world, it is the easiest to compromise. However, the real problem with th e use of passwords is that they are transferable and substantially static. Users with or without agreements can end up transferring the password to a third party who can then pretend to be the genuine user.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |