Operating System and Max File/volume Size Essays

716 WordsApr 8, 20133 Pages
Compare HFS+, Ext3fs, and NTFS. Choose the most reliable file system and justify your answers. (SLO 15) HFS+ Ext3fs NTFS Introduced in 1998 Introduced in 1999 Introduced in 1993 Apple Linux Microsoft Unlimited characters No limit defined 32,767 Unicode characters with each path component (directory or filename) commonly up to 255 characters long HFS+ is file system developed by apple to replace their Hierarchical file system as the primary file system used in Mac computers It is also used by IPod and it is referred to as Mac OS extended. Ext3fs or third extended file system is a journaled file system that is commonly used by the Linux Kernel. It is the default file system for many Linux distributions. NTFS is a Windows op and file…show more content…
Do these numbers seem excessive? (SLO 22 & 23) It does seem a bit excessive, but I would still do it, better safe than sorry I would say. Many people are under the impression that hard drives need to be wiped with multiple passes to prevent recovery of data. This is simply untrue with modern hard drives. According to the National Institute for Standards and Technology, “Studies have shown that most of today’s media can be effectively cleared by one overwrite” (Max, 2009). Reference Max. (2009). Disk Wiping One Pass is Enough. Retrieved from, https://www.anti-forensics.com/disk-wiping-one-pass-is-enough/ Discuss whether steganography is a good solution for image and movie piracy. Discuss how steganography can relate to digital rights management (DRM) solutions. (SLO 22) Steganography in the context of digital content piracy serves primarily as a method to track where digital assets are moving or who is receiving them. It can be a good solution for distribution of a small number of copies but becomes less effective when distributing on a wide basis. In order for it to be effective a content provider needs to recover the content by means of the unauthorized channel and examine the indicator marked on the copy. This is cumbersome for wide distribution but can be used on a broad basis such as by region. Region coding is used with many DVD releases for example but can also be considered a type of DRM (Andrew,
Open Document