Creating a Hidden Operating System

Most people will wonder why a person need’s a secondary operating system. But if your are sharing a computer with another person nor you are been held up for your valuable information on your computer or laptop that would be a worse case scenario as they might steal nor copy your valuable information.

If your traveling overseas and your laptop need to be search then having a decoy operating system would come in-handy. The truecrypt will create a decoy operating system that will allow you to have two operating system on a single laptop or computer.

The system is plain simple it helps you keep all your important document in another operating system allowing you to have another plain operating system that only has normal document as a decoy and this will be a life saver even your computer is been hacked nor been infected by virus as the operating system is installed on a different patition of the computer.

Not only that it comes with different login and password to access the two operating system. You can use it for multiple boot from any operating system that is available in the market.

What good a secondary operating system does:

– Creates a virtual encrypted disk within a file and mounts it as a real disk.
– Encrypts an entire partition or storage device such as USB flash drive or hard drive.
– Encrypts a partition or drive where Windows is installed (pre-boot authentication).
– Encryption is automatic, real-time (on-the-fly) and transparent.

It provides two levels of plausible deniability, in case an adversary forces you to reveal the password:

1) Hidden volume (steganography) and hidden operating system.

2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
even by searching the hold hard drive.

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk simply by drag-and-drop operations. Files are automatically being decrypted on-the-fly while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly in RAM.

Operating system that is compatible:

Windows 2003
Windows NT
Windows Vista
Windows Xp
Mac OS X

The software is free and it’s a open source.

Find out more on creating hidden operating systems

Understanding Your Computer Operating System

Over the years, computer operating systems have emerged as the most integral know component of every computer system in the world. Without the operating system, you almost won’t be able to use a computer. You don’t need to know any complicated commands settings or codes to be able to use a computer with the aid of a computer operating system.

Right in the first few years of computers, operating systems were not in existence. But after the invention of powerful computers, they were developed. What is known as ‘punch cards’ was being used to enter information’s onto a computer before operating systems came to existence. To get the desired information’s needed on computers, punch card machines where used. But they were not all that efficient.

Computer programmers were able to successfully design the first computer operating systems. They considered the fact that life will be easier if common people like me and you should be able to use a computer without knowing much or even noting about complex computer languages.

With the success of early computer programmers, there are so many computer operating systems these days available in the world of computers today. A lot are also still being developed even as you are reading this now. Virtually most of resent operating systems are designed with the common user in mind. An average computer user can now load most computer programs with a simple use of a mouse and just a few clicks.

Every system has a specific function to perform behind the scenes. The user will not even be able to see or even need to know that they are there. What these operating systems do behind your computer is commonly known as multiple tasking. It makes using a PC much more easily without managing computer resources manually.

Among the main basic functions every computer operating system does perform include:

* Managing your Random Access Memory (RAM)
* Managing your Hard Disc
* Scheduling of various tasks on your computer
* Providing a reasonable level of security to your computer, to prevent any external party to gain access to your PC
* To navigate various programs on your PC whenever you want to open them
* And many more

Microsoft Windows and Apple’s Mac OS are the world’s most famous operating systems today. Other similar computer operating systems do exist also. But they got their technologies from the famous two computer leading giants.

Two other operating systems that are rapidly gaining popularity in the world today are Linux and GNU. But they are mainly focused on the network and system marketing industry.

Operating System – Scheduling and Its Categories

Scheduler is the most critical system of an Operating System. In order to optimize the utilization of processors, several scheduling algorithms are used. When the system has various processes to execute, it must have a capability to make decisions about which process to run at the given time slot. This strategy should keep in view the concepts of maximizing throughput, minimizing latency and also avoiding the process starvation etc. Many scheduling algorithms are widely used nowadays.

Scheduling is the core concept in OS design. In multiprogramming, the processes that are loaded in the main memory strive for the resources i.e. processor time. During the execution of one process, other processes wait for any event to occur or for an I/O operation to be performed. Scheduling regulates the execution of these processes i.e. which process will run and which process will wait. The objectives that must be fulfilled by the scheduling algorithm include effective utilization of the processor time, throughput and turnaround, response time and fairness. OS can be categorically divided into three different types of scheduling i.e. long term scheduling, short term scheduling and medium term scheduling.

Latest multi user systems can run a hundreds of applications concurrently, yet these systems provide some isolation between users. However, absence of isolation may lead some users towards poor performance or intentional or unintentional DoS (Denial of Service). In recent computational clusters, these problems are easily prevented by using the concept of jobs and job schedulers. This postpones the job until resources are available and schedule it after the availability of all the possible resources.


An operating system may be the best known software that we run on our personal computers, it’s what takes proper care of virtually everything on the computer, while nearly all computer systems we have seen are actually one ‘type’ of operating-system carrying out exactly the same functions. OS could be branched into a number of different types too. Inside the broad group, you will find many types of OS which are mainly categorized based on the kinds of computer systems they control and also the kind of programs they support.

Depending upon the nature of domain, OS can be divided into some of the following types.

1. Real Time OS:

A Real Time Operating System (Usually known as RTOS) is specifically designed for serving the real time application requests. The major characteristic of a real time OS is its consistency level that it takes to accept and finish any task of the associated applications.

2. Embedded OS:

The Embedded systems are resource limited systems and commonly response time is an extremely significant requirement. As the most important parts of real-time embedded OS, scheduling algorithms are presented to improve the real-time of the embedded systems. The most existing real-time scheduling algorithms are based on the processes with little consideration about the resources in the systems.

3. Network OS:

The network operating system (NOS) is the software that is installed on a server and allows the server to manage data, groups, users, applications, security, and many other networking tasks. The network OS is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), private network or to other networks.

4. Mobile OS:

A mobile operating system (mobile OS) is designed to control a smartphone, tablet, PDA, or other mobile device. Modern mobile OS combine the features of a personal computer OS with touch screen, cellular, Bluetooth, WiFi, GPS mobile navigation, camera, video camera speech recognition, voice recorder, music player, Near field communication and personal digital assistant (PDA), and many other features.
In 2006, Windows Phone, Android, Bada and iOS were not yet developed and just 64 million smartphones were then sold. Today, nearly 10 times as many smartphones are already sold and the best mobile OS has been promoted as “smartphones” by the market share which includes BlackBerry, Android, Symbian, Apple, iOS, Meego, Bada, and Windows Phone.

5. Distributed OS:

A distributed operating system is the logical aggregation of OS software over a collection of independent networked, connected, communicating, and physically distinct computational nodes. The management components collection and micro-kernel operates together. They provide a support for the system’s aim of integrating numerous resources and processing functionality into an effective and established system.

In this article, a review study of different operating system was performed. The ease of techniques that are used supports the statement that the scheduling algorithms provide user friendly, highly flexible and most optimal solution to any ordinary problem related to job sequencing. This work can be extended by considering, reviewing and evaluating the dynamic scheduling algorithms and job sequencing problems in the particular domain.