SlideShare a Scribd company logo
UNIX OPERATING
SYSTEM
SUBMITTED BY
TEAM MEMBERS CLASS ROLL. NUMBER
NISHANT MISHRA IT 2A 1803013059
PIYUSH BANSAL IT 2A 1803013059
MAYANK BANSAL IT 2A 1803013059
ISHA GOEL IT 2A 1803013059
In-order to introduce
concept of UNIX O.S we should go
through certain topics :
1 > COMPONENTS OF COMPUTER SYSTEM.
2 > WHAT IS AN OPERATING SYSTEM ?
End
User
Programmer
Operating-
System
Designer
Computer Hardware
Operating-System
Utilities
Application
Programs
Hardware – provides basic computing resources (CPU, memory, I/O
devices).
Operating system – controls and coordinates the use of the hardware
among the various application programs for the various users.
Utilities – Programs that assist in system management and software
development.
Applications programs – define the ways in which the system
resources are used to solve the computing problems of the users
(compilers, database systems, video games, business programs).
An Operating System is a program that acts as an
interface between the user of a computer and the
computer hardware.
Operating system goals:
* Control/execute application programs.
* Make the computer system convenient to use.
* Make solving user problems easier.
* Use the computer hardware in an efficient manner.
The Unix operating system found its beginnings in MULTICS
which stands for Multiplexed Operating and Computing
system.
The MULTICS project began in the mid 1960s as a joint effort
by General Electric, Massachusetts Institute for
Technology and Bell Laboratories.
In 1969 Bell Laboratories pulled out of the project.
One of Bell Laboratories people
involved in the project
was “Ken Thompson”.
He liked the potential MULTICS had, but felt it was too
complex and that the same thing could be done in simpler
way.
IN 1969 he wrote first version of UNIX called as UNIC.
UNICS stood for “UNI-PLEXED” operating system
And eventually shortened to UNIX.
Unix case-study
Kernel: The kernel is the heart of the operating system. It interacts
with hardware and most of the tasks .
Shell: The shell is the utility that processes your requests. When you
type in a command at your terminal, the shell interprets the command
and calls the program that you want.
Commands and Utilities: There are various command and
utilities which you would use in your day to day activities. cp,
mv, cat and grep.
Files and Directories: All data in UNIX is organized into files. All
files are organized into directories. These directories are organized
into a tree-like structure called the file system.
1. Multi-user system : Multi-user capability of UNIX allows several usersto
use the same computer to perform theirtasks.
2.Multi-tasking : Multitasking is the capability of the operating systemto
perform various task simultaneously, i.e. a user can run multiple tasks
concurrently.
3.Programming Facility : UNIX is highly programmable, the UNIX shell
has all the necessary ingredients like conditional and control structures, etc.
4. Security : UNIX allows sharing of data; every user must have a single
login name and password. So, accessing another user’s data is impossible
without his permission.
5. Portability : UNIX is portable because it is written in a high level
language. So , UNIX can be run on different computers.
RAM – 256 MB .
HARD DRIVE – 10 minimum and maximum depends on the user
requirement.
VIDEO– Minimum 800X600.
MOUSE –Any.
REMOVAL MEDIA – Most SCSI.
PRINTER – Almost any parallel or serial port.
MODEM– Most serial, if DOS can use it, Unix can too……..
NIC – 3Com, Novell, HP, Intel - Clones are NOT recommended.
 UNIX is a multitasking system.
 Multiple programs can be executed at the same time.
 Ultimately, a program needs to be executed by a CPU.
 If there is only one CPU, how multiple programs can be executed
at the same time?
By time sharing
 That is, all programs are claimed to be executing. In fact, most of
them are waiting for the CPU.
 A program that is claimed to be executing is called aprocess.
 For a multitasking system, a process has at least the following three
states:
 Ready state
 All processes that are ready to execute but without the CPU are
at the ready state
 If there is only 1 CPU in the system, all processes except one
are at the ready state
 Running state
 The process that actually possesses the CPU is at the running
state
 If there is only 1 CPU in the system, at most there is only one
process is at the running state
 Sleeping state
 The process that is waiting for other resources, e.g. I/O, is at the
sleeping state
 Processes will alternatively get into the CPU one after the other
(called the round robin scheme)
 A process will be “in” a CPU for a very short time (quantum)
 For Linux, each quantum is about 100msec
 At the time that a process is selected to be “in” the CPU
 It goes from ready state to running state
 After that, it will be swapped out
 It goes from running state back to ready state
 Or it may due to the waiting of an I/O device, e.g. mouse
 It goes from running state to sleeping state
 When obtaining the required resource
 It goes from sleeping state to ready state
WHAT IS MEMORY ?
Primary memory is a precious resource that frequently cannot contain all
active processes in the system.
WHAT IS MEMORY MANAGEMENT ?
The memory management system decides which processes should reside
(at least partially) in main memory
It monitors the amount of available primary memory and may periodically
write processes to a secondary device called the swap device to provide
more space in primary memory.
FIG : Typical internal memory layout for single user-
memory part UNIX
MEMORY MANAGEMENT CONCEPTS OF UNIX
1.SWAPPING .
The swap device is a block device in a configurable section of a disk
Kernel allocates contiguous space on the swap device without
fragmentation
It maintains free space of the swap device in an in-core table, called
map
The kernel treats each unit of the swap map as group of disk blocks
As kernel allocates and frees resources, it updates the map
accordingly
2. DEMAND PAGING.
Not all page of process resides in memory locality.
When a process accesses a page that is not part of its working set, it incurs a page
fault.
The kernel suspends the execution of the process until it reads the page into memory
and makes it accessible to the process.
OTHER TECHNIQUES USED ARE AS FOLLOWS
1.Allocating swap space .
2.Free space swap.
3.Page table entry.
4.Disk block description..
A file system is a logical collection of files on a partition or disk.
A partition is a container for information and can span an entire hard drive if desired.
Everything in Unix is considered to be a file, including physical devices such as DVD-ROMs,
USB devices, floppy drives, and so forth.
Unix uses a hierarchical file system structure, much like an upside-
down tree, with root (/) at the base of the file system
and all other directories spreading from there.
It has a root directory (/) that contains other files and directories.
Each file or directory is uniquely identified by its name, the
directory in which it resides, and a unique identifier ,typically called
an inode.
It is self contained. There are no dependencies between one file
system and any other.
The directories have specific purposes and generally hold the
same types of information for easily locating files.
Following are the directories that exist on the major versions of
Unix:
 The directories have specific purposes and generally
hold the same types of information for easily locating
files.
 It has a root directory (/) that contains other files and
directories.
 The inode type field distinguishes between plain files and
directories
 Directory entries are of variable length; each entry
contains first the length of the entry, then the file name
and the inode number
(/mnt) Used to mount other temporary file systems, such as cd rom and
floppy for the CD-ROM drive and floppy disks
(/proc) Contains all processes marked as a file by process number or
other information that is dynamic tot he system.
(/tmp)
(/usr)
(/var )
(/sbin)
Holds temporary files used between system boots.
Used for miscellaneous purposes, or can be used by many users.
Includes administrative commands, shared files , library files.
Typically contains variable-length files such as log and print
files any other type of file that may contain a variable amount of
Contains binary (executable) files, usually for system
administration. For example f-disk and if-config utilities.
(/kernel)Contains kernel files
Being a multi-user system - UNIX have a tremendous amount of
security to offer; many being open source, which can be validated and
modified to meet anyone’s needs.
UNIX system security can be divided into three main areas of concern.
Two of these areas, account security , file system security,
Network security.
Before , any advanced system we should provide physical security to system by keeping it ina
secure and protected area to avoid unauthorizedaccess.
ACCOUNT SECRITY:
using authorized (UID) & UNIX user community haves no. of user who are given acces to system
(GID).
 The access codes (passwords) to (UID) & (GID) are stored in system
as stored in encrypted format SALTED PASSWORDS to avoid cracking
of pswd.
EX:
UID : syslog 56
Password :**********
The same information is stored in system files in followingformat:
UID:SaltID:Saltedhash:EncrypedPassword:UserID:GroupID:Complete_Name:home_dir:shell_bin
FILE SYSTEM SECURITY.
 File system security is about making sure your users can only do what you want them
to be able to do. This means that you want system programs to be secure and users
to only be able to write where you want them to be able to.
 To impliment this uses tecn. OF ACLs PERMISSIONS.
only Almost modern files systems, include ACLs to give unprivileged access to
certain users.

 Permissions are separated by owner, group, and others. On UNIX systems
permissions are displayed as rwxrwxrwx
 With a few more special settings, Desktop environments also provide GUI settings for
easy modifying
NETWORK SECURITY
 Once you put a computer on a network, you allow many more people
potential access to the machine. The key to network security is to allow only
those functions that the users actually need. By disabling non-used
functions, you have much less monitoring/securing.
 Telnet Security:
Using SSH (secure shell). SSH provides encrypted traffic to prevent
snooping.
 FTP Security:
As with other services, if you do not need this functionality, turn it off.
You can turn off incoming FTP or simply certain users. If you need
full FTP functionality, be certain to enable logging and monitor
syslog.
TO GET A CONCLUSION TO OUR PRESENTATION WEARE PUTTING
FORWARD A COMAPRISON OF WINDOWS OS & UNIX OS.
1.As far as operating systems go, to some it would seem as if UNIX has a
clear advantage over Windows. UNIX offers greater flexibility than Windows
operating systems and it is more stable .
FEW AREAS OF COMPARISON :-
 BETTER MULTIUSERAPPROACH.
 BETTER PROCESS HEIRARCHY.
 USE OF DAEMONS.
 BETTER PROGRAMMING ENVIORMENT.
OTHER PRACTICAL COMPARISON WOULD BE :
 Cost
 User
 Security
 Processors
 Multiprocessing
 Open source
 File system supported
So we can say UNIX far more better
Than WINDOWS .
Unix case-study

More Related Content

PDF
Operating systems system structures
PPTX
UNIX Operating System
PPTX
System call
PDF
OS Memory Management
PPT
OPERATING SYSTEM SERVICES, OPERATING SYSTEM STRUCTURES
PPTX
Operating system - Process and its concepts
PPTX
Structure of operating system
Operating systems system structures
UNIX Operating System
System call
OS Memory Management
OPERATING SYSTEM SERVICES, OPERATING SYSTEM STRUCTURES
Operating system - Process and its concepts
Structure of operating system

What's hot (20)

PPTX
Memory management ppt
PPTX
Memory Management in OS
PDF
OS - Process Concepts
PPTX
DeadLock in Operating-Systems
PPTX
Paging and segmentation
PPT
Operating system services 9
PDF
Memory management
PPTX
Context model
PPT
Memory management
PPTX
Operating system memory management
PPT
Case study windows
PPTX
Deadlock ppt
PDF
operating system structure
PPTX
Process synchronization in Operating Systems
PPT
multiprocessors and multicomputers
PPTX
Distributed operating system
PPTX
System calls
PPTX
Distributed computing
Memory management ppt
Memory Management in OS
OS - Process Concepts
DeadLock in Operating-Systems
Paging and segmentation
Operating system services 9
Memory management
Context model
Memory management
Operating system memory management
Case study windows
Deadlock ppt
operating system structure
Process synchronization in Operating Systems
multiprocessors and multicomputers
Distributed operating system
System calls
Distributed computing
Ad

Similar to Unix case-study (20)

PPTX
Unix Operating System
PPTX
UNIX Operating System
PDF
unixoperatingsystem-130327073532-phpapp01.pdf
PPTX
Introduction to Unix
PPTX
Unix Operaring System
PPT
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
PPTX
Unix operating system architecture with file structure
PPTX
Unix operating system
DOCX
UNIT II-Programming in Linux
PPTX
Unix and shell programming | Unix File System | Unix File Permission | Blocks
PPTX
Introduction to Unix Concets.pptx
PPTX
Introduction to Unix Concets.pptx
PPT
Spsl unit1
PPTX
UNIX_module1.pptx
PPTX
CHAPTER 1 INTRODUCTION TO UNIX.pptx
PPT
Module1-UNIX architecture; FEATURES OF UNIX OS
PPTX
PPTX
Unix_Introduction_BCA.pptx the very basi
DOC
Unix Quick Learn
Unix Operating System
UNIX Operating System
unixoperatingsystem-130327073532-phpapp01.pdf
Introduction to Unix
Unix Operaring System
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Unix operating system architecture with file structure
Unix operating system
UNIT II-Programming in Linux
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
Spsl unit1
UNIX_module1.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
Module1-UNIX architecture; FEATURES OF UNIX OS
Unix_Introduction_BCA.pptx the very basi
Unix Quick Learn
Ad

Recently uploaded (20)

PPTX
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
TE-AI-Unit VI notes using planning model
PDF
Top 10 read articles In Managing Information Technology.pdf
PDF
Introduction to Data Science: data science process
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
B.Tech (Electrical Engineering ) 2024 syllabus.pdf
PDF
Queuing formulas to evaluate throughputs and servers
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PDF
International Journal of Information Technology Convergence and Services (IJI...
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
PDF
flutter Launcher Icons, Splash Screens & Fonts
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
TE-AI-Unit VI notes using planning model
Top 10 read articles In Managing Information Technology.pdf
Introduction to Data Science: data science process
Lesson 3_Tessellation.pptx finite Mathematics
OOP with Java - Java Introduction (Basics)
Model Code of Practice - Construction Work - 21102022 .pdf
CH1 Production IntroductoryConcepts.pptx
B.Tech (Electrical Engineering ) 2024 syllabus.pdf
Queuing formulas to evaluate throughputs and servers
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
“Next-Gen AI: Trends Reshaping Our World”
International Journal of Information Technology Convergence and Services (IJI...
July 2025: Top 10 Read Articles Advanced Information Technology
flutter Launcher Icons, Splash Screens & Fonts
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf

Unix case-study

  • 2. SUBMITTED BY TEAM MEMBERS CLASS ROLL. NUMBER NISHANT MISHRA IT 2A 1803013059 PIYUSH BANSAL IT 2A 1803013059 MAYANK BANSAL IT 2A 1803013059 ISHA GOEL IT 2A 1803013059
  • 3. In-order to introduce concept of UNIX O.S we should go through certain topics : 1 > COMPONENTS OF COMPUTER SYSTEM. 2 > WHAT IS AN OPERATING SYSTEM ?
  • 5. Hardware – provides basic computing resources (CPU, memory, I/O devices). Operating system – controls and coordinates the use of the hardware among the various application programs for the various users. Utilities – Programs that assist in system management and software development. Applications programs – define the ways in which the system resources are used to solve the computing problems of the users (compilers, database systems, video games, business programs).
  • 6. An Operating System is a program that acts as an interface between the user of a computer and the computer hardware. Operating system goals: * Control/execute application programs. * Make the computer system convenient to use. * Make solving user problems easier. * Use the computer hardware in an efficient manner.
  • 7. The Unix operating system found its beginnings in MULTICS which stands for Multiplexed Operating and Computing system. The MULTICS project began in the mid 1960s as a joint effort by General Electric, Massachusetts Institute for Technology and Bell Laboratories. In 1969 Bell Laboratories pulled out of the project.
  • 8. One of Bell Laboratories people involved in the project was “Ken Thompson”. He liked the potential MULTICS had, but felt it was too complex and that the same thing could be done in simpler way. IN 1969 he wrote first version of UNIX called as UNIC. UNICS stood for “UNI-PLEXED” operating system And eventually shortened to UNIX.
  • 10. Kernel: The kernel is the heart of the operating system. It interacts with hardware and most of the tasks . Shell: The shell is the utility that processes your requests. When you type in a command at your terminal, the shell interprets the command and calls the program that you want. Commands and Utilities: There are various command and utilities which you would use in your day to day activities. cp, mv, cat and grep. Files and Directories: All data in UNIX is organized into files. All files are organized into directories. These directories are organized into a tree-like structure called the file system.
  • 11. 1. Multi-user system : Multi-user capability of UNIX allows several usersto use the same computer to perform theirtasks. 2.Multi-tasking : Multitasking is the capability of the operating systemto perform various task simultaneously, i.e. a user can run multiple tasks concurrently. 3.Programming Facility : UNIX is highly programmable, the UNIX shell has all the necessary ingredients like conditional and control structures, etc.
  • 12. 4. Security : UNIX allows sharing of data; every user must have a single login name and password. So, accessing another user’s data is impossible without his permission. 5. Portability : UNIX is portable because it is written in a high level language. So , UNIX can be run on different computers.
  • 13. RAM – 256 MB . HARD DRIVE – 10 minimum and maximum depends on the user requirement. VIDEO– Minimum 800X600. MOUSE –Any. REMOVAL MEDIA – Most SCSI. PRINTER – Almost any parallel or serial port. MODEM– Most serial, if DOS can use it, Unix can too…….. NIC – 3Com, Novell, HP, Intel - Clones are NOT recommended.
  • 14.  UNIX is a multitasking system.  Multiple programs can be executed at the same time.  Ultimately, a program needs to be executed by a CPU.  If there is only one CPU, how multiple programs can be executed at the same time? By time sharing  That is, all programs are claimed to be executing. In fact, most of them are waiting for the CPU.
  • 15.  A program that is claimed to be executing is called aprocess.  For a multitasking system, a process has at least the following three states:
  • 16.  Ready state  All processes that are ready to execute but without the CPU are at the ready state  If there is only 1 CPU in the system, all processes except one are at the ready state  Running state  The process that actually possesses the CPU is at the running state  If there is only 1 CPU in the system, at most there is only one process is at the running state  Sleeping state  The process that is waiting for other resources, e.g. I/O, is at the sleeping state
  • 17.  Processes will alternatively get into the CPU one after the other (called the round robin scheme)  A process will be “in” a CPU for a very short time (quantum)  For Linux, each quantum is about 100msec  At the time that a process is selected to be “in” the CPU  It goes from ready state to running state  After that, it will be swapped out  It goes from running state back to ready state  Or it may due to the waiting of an I/O device, e.g. mouse  It goes from running state to sleeping state  When obtaining the required resource  It goes from sleeping state to ready state
  • 18. WHAT IS MEMORY ? Primary memory is a precious resource that frequently cannot contain all active processes in the system. WHAT IS MEMORY MANAGEMENT ? The memory management system decides which processes should reside (at least partially) in main memory It monitors the amount of available primary memory and may periodically write processes to a secondary device called the swap device to provide more space in primary memory.
  • 19. FIG : Typical internal memory layout for single user- memory part UNIX
  • 20. MEMORY MANAGEMENT CONCEPTS OF UNIX 1.SWAPPING . The swap device is a block device in a configurable section of a disk Kernel allocates contiguous space on the swap device without fragmentation It maintains free space of the swap device in an in-core table, called map The kernel treats each unit of the swap map as group of disk blocks As kernel allocates and frees resources, it updates the map accordingly
  • 21. 2. DEMAND PAGING. Not all page of process resides in memory locality. When a process accesses a page that is not part of its working set, it incurs a page fault. The kernel suspends the execution of the process until it reads the page into memory and makes it accessible to the process. OTHER TECHNIQUES USED ARE AS FOLLOWS 1.Allocating swap space . 2.Free space swap. 3.Page table entry. 4.Disk block description..
  • 22. A file system is a logical collection of files on a partition or disk. A partition is a container for information and can span an entire hard drive if desired. Everything in Unix is considered to be a file, including physical devices such as DVD-ROMs, USB devices, floppy drives, and so forth.
  • 23. Unix uses a hierarchical file system structure, much like an upside- down tree, with root (/) at the base of the file system and all other directories spreading from there. It has a root directory (/) that contains other files and directories. Each file or directory is uniquely identified by its name, the directory in which it resides, and a unique identifier ,typically called an inode. It is self contained. There are no dependencies between one file system and any other. The directories have specific purposes and generally hold the same types of information for easily locating files. Following are the directories that exist on the major versions of Unix:
  • 24.  The directories have specific purposes and generally hold the same types of information for easily locating files.  It has a root directory (/) that contains other files and directories.  The inode type field distinguishes between plain files and directories  Directory entries are of variable length; each entry contains first the length of the entry, then the file name and the inode number
  • 25. (/mnt) Used to mount other temporary file systems, such as cd rom and floppy for the CD-ROM drive and floppy disks (/proc) Contains all processes marked as a file by process number or other information that is dynamic tot he system. (/tmp) (/usr) (/var ) (/sbin) Holds temporary files used between system boots. Used for miscellaneous purposes, or can be used by many users. Includes administrative commands, shared files , library files. Typically contains variable-length files such as log and print files any other type of file that may contain a variable amount of Contains binary (executable) files, usually for system administration. For example f-disk and if-config utilities. (/kernel)Contains kernel files
  • 26. Being a multi-user system - UNIX have a tremendous amount of security to offer; many being open source, which can be validated and modified to meet anyone’s needs. UNIX system security can be divided into three main areas of concern. Two of these areas, account security , file system security, Network security.
  • 27. Before , any advanced system we should provide physical security to system by keeping it ina secure and protected area to avoid unauthorizedaccess. ACCOUNT SECRITY: using authorized (UID) & UNIX user community haves no. of user who are given acces to system (GID).  The access codes (passwords) to (UID) & (GID) are stored in system as stored in encrypted format SALTED PASSWORDS to avoid cracking of pswd. EX: UID : syslog 56 Password :********** The same information is stored in system files in followingformat: UID:SaltID:Saltedhash:EncrypedPassword:UserID:GroupID:Complete_Name:home_dir:shell_bin
  • 28. FILE SYSTEM SECURITY.  File system security is about making sure your users can only do what you want them to be able to do. This means that you want system programs to be secure and users to only be able to write where you want them to be able to.  To impliment this uses tecn. OF ACLs PERMISSIONS. only Almost modern files systems, include ACLs to give unprivileged access to certain users.   Permissions are separated by owner, group, and others. On UNIX systems permissions are displayed as rwxrwxrwx  With a few more special settings, Desktop environments also provide GUI settings for easy modifying
  • 29. NETWORK SECURITY  Once you put a computer on a network, you allow many more people potential access to the machine. The key to network security is to allow only those functions that the users actually need. By disabling non-used functions, you have much less monitoring/securing.  Telnet Security: Using SSH (secure shell). SSH provides encrypted traffic to prevent snooping.  FTP Security: As with other services, if you do not need this functionality, turn it off. You can turn off incoming FTP or simply certain users. If you need full FTP functionality, be certain to enable logging and monitor syslog.
  • 30. TO GET A CONCLUSION TO OUR PRESENTATION WEARE PUTTING FORWARD A COMAPRISON OF WINDOWS OS & UNIX OS. 1.As far as operating systems go, to some it would seem as if UNIX has a clear advantage over Windows. UNIX offers greater flexibility than Windows operating systems and it is more stable . FEW AREAS OF COMPARISON :-  BETTER MULTIUSERAPPROACH.  BETTER PROCESS HEIRARCHY.  USE OF DAEMONS.  BETTER PROGRAMMING ENVIORMENT.
  • 31. OTHER PRACTICAL COMPARISON WOULD BE :  Cost  User  Security  Processors  Multiprocessing  Open source  File system supported So we can say UNIX far more better Than WINDOWS .