Skip to main content

Is Linux faster than Windows ?

Why Is Linux Faster Than Windows?

One question that comes up a lot in discussion is whether Linux is genuinely a faster OS when compared to Windows. Most of the questions direct us to the time it takes for the OSes to boot up and in that parameter, yes, Linux is noticeable faster than Windows. Why then, does it fail the speed test when compared along other parameters ?
Kernel
One big reason why Linux can boot up faster than Windows is the difference in the way their kernels are designed. The nucleus of an OS is very different in these 2 products. Linux has a monolithic kernel – meaning it holds every core functionality needed by the OS such as drivers ,memory management, task scheduler and the file system. Windows on the other hand contains a micro kernel which contains only the basic necessities and the remaining aspects are loaded separately thus making it a little bit slower when compared to Linux.
Backward Compatibility
This is one aspect wherein Windows suffers owing to the decades of software support it provides it’s users. While it may slow down the loading process, there’s no denying that a majority of the world’s computing needs require this compatibility. Linux on the other hand, being a minority shareholder in the computing world can afford to forgo backward compatibility.
While discussing this, we also need to note that Microsoft can afford for Windows to be slower for the simple reason that a potential user will not be dissuaded from purchasing a Windows license just because it works a little bit slower. Windows being a propriety OS has a limited number of developers and thus a finite number of man hours they can commit. Therefore, the development activities need to be market driven for Microsoft. Optimization is not as high a priority for Windows compared to other requirements.
Linux on the other hand outperforms Windows in many areas because it is essential for its existence.
Explanation From Tech-savvy Reddit user logicalkitten 
  • One of the more hidden benefits to linux is that applications share files better than windows. So instead of DLLs like in windows, linux uses .so files, or “shared objects”. There are also .ko files, which are kernel objects, somewhat like drivers in windows.
  • A Windows application might depend on a very specific version of a DLL. The person who writes the application doesn’t know what version of windows you will be installing it on and if that particular DLL will be present in your system. So the easiest solution is to just include the correct DLL with the application. Effect: installers are much larger, C drive is fuller, and more ram is used.
  • Linux does it differently. When you ask to install Midori web browser for instance, apt-get (or the software center front end) checks the package for a list of dependencies. Instead of including all the files, Midori just says what it depends on.
  • So apt-get checks the system and sees that fileX.so.1 is already installed, which is one of the dependencies, so it doesn’t need to fetch it from the central software repository. It then notices that Midori needs another file, which is not installed yet, so it checks the software repository for a version that matches, or one that is newer. It installs that. And so on. Once the dependencies are satisfied, it installs the application itself. Result: Software can be installed very quickly and doesn’t take up as much space or ram.
  • The apt-get system also keeps track of how many applications need fileX.so.1, so that if you remove Midori, it doesn’t remove fileX.so.1, unless nobody else is using it. So Linux has pretty good house keeping skills.
How many of the ardent Linux supporters would stick around if the OS starts having problems ?

Comments

Popular posts from this blog

Top 20 Tools for hacking 2018

What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution. In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks 1)  Netsparker Netsparker  is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution. Features Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology. Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages. REST API for seamless integration with the SDLC, bug tracking systems etc. Fully scalable solution.

EMBEDDED BACKDOOR WITH IMAGE USING FAKE IMAGE EXPLOITER

In this article we are introducing a newly launched hacking tool “ Fake Image Exploiter ”. It is design so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with hidden malicious .bat/.exe file inside it. Let’s start! Open the terminal inside your kali Linux and type following command to download it from github. Git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git Once it gets downloaded then opens the folder and selects the file “ settings ” for configuration before running the program as shown the given screenshot. Now made some changes inside setting file as shown the screenshot: Here you have to declare the type of payload extension you will use to hide it inside the image. You can set any exetension among these four : ps1, bat, txt, exe.  I had set  PAYLOAD_EXETNSION=bat  similarly set  BYPASS_RH=NO   and scroll down for next configration. In same way set these two values also as show

Wifi Post Exploitation on Remote PC

Hello readers! Today you will be learning about different ways to get basic service sets information of remote user’s Wi-Fi as well as current network connection information, and how to extract saved Wireless LAN profiles of remote pc after that you will be disconnecting target user’s Wi-Fi too. First Hack the Victim PC Using Metasploit ( tutorial how to hack remote pc ) after that get admin access through Bypassuac ( click here ), once you have victim’s meterpreter session run given below post exploit  one-by-one.  Get BSS information of a remote user’s Wi-Fi connection This module gathers information about the wireless Basic Service Sets available to the victim machine. e.g. this will give you SSID and other important  information regarding wireless connection. msf > use post/windows/wlan/wlan_bss_list msf post( wlan_bss_list ) > set session 5 msf post( wlan_bss_list ) > exploit From given below image you can observe that here it has found “5 networks” suc