NIELIT STUDENTS FORUM
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Part 1 - Awareness

3 posters

Go down

Part 1 - Awareness Empty Part 1 - Awareness

Post by ESSPEE Thu Jan 30, 2014 11:13 pm

I want all users who want to know and learn linux to visit this great tutorial first...
[You must be registered and logged in to see this link.]

Thereafter I will do the fine tuning and recommendations.

I hope, there will be questions .... Question
ESSPEE
ESSPEE
Beginner
Beginner

Posts : 12
Points : 31
Reputation : 7
Join date : 2014-01-15

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by sachinrana135 Thu Jan 30, 2014 11:19 pm

hurray  Very Happy Smile Laughing 
thats I want from this forum.this is really a good iniative by Admin.
thanx Admin,thanx ESSPEE.
sachinrana135
sachinrana135
Senior mentor
Senior mentor

Posts : 35
Points : 117
Reputation : 12
Join date : 2014-01-12

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by sachinrana135 Sun Feb 02, 2014 9:24 pm

I have read out many basic linux command and doing practice on them.
I want to ask,to build a derivative of any like based os(like ubuntu),is it necessary to have deep knowledge of programming language?
if yes,then which language is best?
sachinrana135
sachinrana135
Senior mentor
Senior mentor

Posts : 35
Points : 117
Reputation : 12
Join date : 2014-01-12

Back to top Go down

Part 1 - Awareness Empty Your Own Linux OS

Post by ESSPEE Wed Feb 05, 2014 10:37 pm

Dear friends,

Its not a big deal to make your own Linux OS.

Few essential things to be cosidered:-
1. What is there inside a CD/DVD of any OS (Linux or Windows)
    - A simple answer is a clone of installed OS in a highly compressed file (.wim format in Windows and .squashfs in Linux)
    - A boot image (its not jpg or png) to make your CD/DVD bootable.
    - Few simple scripts to provide guidelines for extractaction.
    .... thats all.

2. Now, next question - How to clone your running OS (If you do not want to build a brand new Linux OS from scratches)
     - There are many ways....
       (a) Complete backup (It will include existing users, passwords, settings)
       (b) Distributable backup (Users will required to create new user, password)
     - Thereafter, these files are to be placed/converted in ISO image format for easy burning on CD/DVD.

3. Thats all.

There are many tools already existing for this purpose. The most common and simple one is "Remastersys" ([You must be registered and logged in to see this link.]). Its a bash script (like a batch file in Windows) which do all tasks as mentioned above. You can customise it as per your choise (Requires some basic knowledge about Linux filesystem and compression)
ESSPEE
ESSPEE
Beginner
Beginner

Posts : 12
Points : 31
Reputation : 7
Join date : 2014-01-15

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by sachinrana135 Thu Feb 06, 2014 12:11 am

I visit your mentioned site,but site is something different from other(like 50$ donation thing that I could not understand).
moreover there is no link to download tool. however there is one link
when I clicked on,it shows me this.
Code:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=gAUJ
-----END PGP PUBLIC KEY BLOCK-----



what is this public key?
one more question
As the link is for only precise and quantal version,but I am using ubuntu 13.04 version,mai i able to use this tool?
sachinrana135
sachinrana135
Senior mentor
Senior mentor

Posts : 35
Points : 117
Reputation : 12
Join date : 2014-01-12

Back to top Go down

Part 1 - Awareness Empty Remastersys Debian Packages for Ubuntu

Post by ESSPEE Mon Feb 10, 2014 10:37 am

You can download the installer package (It is called binary package in Linux) here:-

[You must be registered and logged in to see this link.]
ESSPEE
ESSPEE
Beginner
Beginner

Posts : 12
Points : 31
Reputation : 7
Join date : 2014-01-15

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by ESSPEE Mon Feb 10, 2014 10:50 am

you can use Remastersys version for Ubuntu Precise for Ubuntu 12.04 and further release.

Public Key ......

Its a part of Cryptography and asymmetric key encryption method. Public-key encryption uses two different keys at once -- a combination of a private key and a public key.

The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. Although a message sent from one computer to another won't be secure since the public key used for encryption is published and available to anyone, anyone who picks it up can't read it without the private key. The key pair is based on prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is essentially an infinite number of prime numbers available, meaning there are nearly infinite possibilities for keys.

The Public and Private key pair comprise of two uniquely related cryptographic keys (basically long random numbers). Below is an example of a Public Key:

3048 0241 00C9 18FA CF8D EB2D EFD5 FD37 89B9 E069 EA97 FC20 5E35 F577 EE31 C4FB C6E4 4811 7D86 BC8F BAFA 362F 922B F01B 2F40 C744 2654 C0DD 2881 D673 CA2B 4003 C266 E2CD CB02 0301 0001

The Public Key is what its name suggests - Public. It is made available to everyone via a publicly accessible repository or directory. On the other hand, the Private Key must remain confidential to its respective owner.

Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa.

For example, if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form.

As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Even if someone else gains access to the encrypted data, it will remain confidential as they should not have access to Alice's Private Key.

Public Key Cryptography can therefore achieve Confidentiality. However another important aspect of Public Key Cryptography is its ability to create a Digital Signature.
ESSPEE
ESSPEE
Beginner
Beginner

Posts : 12
Points : 31
Reputation : 7
Join date : 2014-01-15

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by ashu4261 Tue Feb 18, 2014 5:11 pm

nice work for linux learning help to espee........... Very Happy Very Happy Very Happy Very Happy 
ashu4261
ashu4261
Chief mentor
Chief mentor

Posts : 67
Points : 208
Reputation : 4
Join date : 2014-01-15
Age : 33
Location : Lucknow

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by ESSPEE Fri Feb 21, 2014 8:45 pm

A lot of good wished to all, who are appearing for NIELIT exams .....
ESSPEE
ESSPEE
Beginner
Beginner

Posts : 12
Points : 31
Reputation : 7
Join date : 2014-01-15

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by ashu4261 Sat Feb 22, 2014 4:49 pm

thanks..............
ashu4261
ashu4261
Chief mentor
Chief mentor

Posts : 67
Points : 208
Reputation : 4
Join date : 2014-01-15
Age : 33
Location : Lucknow

Back to top Go down

Part 1 - Awareness Empty Re: Part 1 - Awareness

Post by Sponsored content


Sponsored content


Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum