5.Operating Systems with Windows NT 2000

Total Page:16

File Type:pdf, Size:1020Kb

5.Operating Systems with Windows NT 2000 Operating Systems with Windows NT2000 Course Designer and Acquisition Editor Centre for Information Technology and Engineering Manonmaniam Sundaranar University Tirunelveli Contents CONTENTS Lecture Introduction to Networks 1 Introduction to Networks About PC Network Concept of Networking Benefits of Networks Types of Networks Classification of Networks Lecture 2 Introduction to NT 18 Introduction to NT Networking with Windows NT Server 4.0 Windows NT Server 4.0, the Internet and Intranets What New in Windows NT Server 4.0 Coming Attraction in Windows NT 5.0 Lecture 3 Understanding the Windows NT Operating System 27 Windows NT Operating System Features Windows NT System Architecture Lecture 4 NT Environmental Subsystems 38 Client and Protected subsystems server Lecture 5 Choosing Network Protocol 46 Understand the OSI Seven - Layer Model Comparing Windows NT and OSI Network Layers Networking with Windows NT’s Protocols Supporting a Variety of PC Clients Lecture 6 Network Topologies & Architecture 63 Access Methods Network Topologies Network Architecture Centre for Information Technology and Engineering, Manonmaniam Sundaranar University Operating Systems with Windows NT/2000 Lecture 7 Transmission Media 80 Cable Media Wireless Media Comparisons of different Wireless Media Lecture 8 Network Adapter Card 97 Working of a Network Adapter Card Network Adapter Card Compatibility Configuring Network Adapter Cards Lecture 9 Connectivity Devices and Transfer Mechanism 109 Addressing Modems Repeaters Hubs Bridges Routing Gateways Lecture 10 File systems 123 File System NTFS File System Understanding NTFS Permission Compressing NTFS Files and Folders Lecture 11 Computer Security 143 Security & Windows NT C2 Security Requirements For C2 Security Lecture 12 Windows NT Server Installation 149 System Requirements Compatibility Issues Types of Installation Starting the Basic Installation Repairing the Windows NT Server Operating System Installation Centre for Information Technology and Engineering, Manonmaniam Sundaranar University Contents Lecture 13 Setting up RAID 179 Understanding RAID Levels Creating Windows NT Server Stripe and Mirror sets Recovering a Software RAID 1 or RAID 5 Set Lecture 14 Installing File Backup Systems 189 Backup Types Developing a Backup Strategy Choosing Backup Hardware Windows NT Server 4.0 Backup Application Lecture 15 Windows NT Registry 204 Registry Basics Configuration settings in Registry Registry’s Organization Registry Editor Important Hives & Keys Inspecting Another Computer’s Registry Maintaining Registry Security Lecture 16 Using TCP/IP, WINS and DHCP 224 Role of TCP/IP Installing & Configuration TCP/IP Implementing DHCP Implementing WINS Lecture 17 Working with Domains 225 Win NT- Domain Models Domain Architecture & Security Implementing Domains and Trusts between Domains Lecture 18 Managing User Account 265 Working with User Manger for Domains Managing User accounts & their Properties Administering the Domain Account Policy Centre for Information Technology and Engineering, Manonmaniam Sundaranar University Operating Systems with Windows NT/2000 Lecture 19 Managing Group Accounts 288 Managing User Groups Using Group Management Wizard Managing User Rights Policy Lecture 20 Sharing and Securing Network Resources 300 Sharing & Securing Folders and Files Replication Folders Sharing and Securing Network Printers Lecture 21 Monitoring the Network 321 Performance Monitor Network Monitor Event Viewer and Log Files Lecture 22 Optimizing the Network Server Performance 3440 Optimizing NT File and Print Server Optimizing NT as an Application Server Lecture 23 Troubleshooting 356 Hardware Problems Boot Failure Relating Network Protocols and Troubleshooting Issues Network Problem Using Protocol Analyzers Windows NT Server 4.0’s Primary Troubleshooting tools Lecture 23 Syllabus 374 YZ Centre for Information Technology and Engineering, Manonmaniam Sundaranar University Introduction to Networks Lecture 1 Introduction to Networks Objectives In this Lecture you will learn the following: • Understanding the concept of network and its benefit • Classification Of Networking • Knowing the Types Of Network Centre for Information Technology and Engineering, Manonmaniam Sundaranar University 1 Operating Systems with Windows NT/2000 Coverage Plan Lecture 1 1.1 Snap Shot 1.2 About PC Network 1.3 Concept of Networking 1.4 Benefits Of Networking 1.5 Types Of Networking 1.6 Classification Of Networking 1.6.1 Peer-to-peer-Networks 1.6.1.2 Peer-to-peer Operating Systems 1.6.2 Server-Based Network 1.7 Short Summary 1.8 Brain Storm 2 Centre for Information Technology and Engineering, Manonmaniam Sundaranar University Introduction to Networks 1.1 Snap Shot - What is networking? A Computer network is a communication system, which connects two or more computers and peripheral devices, to allow sharing of resources, information, and services. Users in a network share a common pathway to communicate with each other. Connecting a number of computers (server and workstations), using wired media (cables) or wireless media forms a computer network. Each computer has a network interface card (NIC) installed in it and runs a piece of software (called network software) to achieve connectivity. Definition “A group of computer that are connected together for the purpose of sharing various computer software and hardware resources like input-output devices, memory, storage devices like hard disk etc.” 1.2 About PC Networks Before 1980s, mainframes and minicomputers were popular. These systems were, expensive, bulky, huge in size, and located in special rooms. The programs as well as data were centrally stored on the host (server) and processed centrally by the host. The clients had to work on “dumb’ terminals, which had no processing power. The terminals were connected to the host using a serial cable, supporting a data transfer rate of 9600 bits per second or lower. This type of processing is called centralized processing. It puts an extra burden on the host, as the host not only stores the data but also processes the data for every individual terminal. Though the host is a very high performance server, the centralized processing mechanism easily overloads the host even with the addition of few more users. This drastically reduces the overall network performance. Another disadvantage of mainframe systems was, they were proprietary to vendors, and hence the system expansion was difficult as well as expensive. Centralized Processing In Centralized processing the applications and data are centrally stored on the host and shared by the terminals attached to the host. The important aspect to be noticed here is that, the terminals don’t have any processing power and the data storage as well as processing is done on the host itself. Centre for Information Technology and Engineering, Manonmaniam Sundaranar University 3 Operating Systems with Windows NT/2000 Pros • As the data storage as well as processing is done on the hosts systems, it helps in reducing the cost of hardware for the client systems. Cons • The cost of hardware required for the host is very high as it needs very high capacity hard disk to store the shared applications and user data, and needs large amount of RAM as well. • The host gets loaded with additional number of terminals, as the terminals do not have the processing power of their own. Emergence of PC networks The first half of 1980’s saw the rise of personal computers. The Personal Computers (PCs) were restricted to a single user operating system (DOS) in its early days, and hence did not feature networking. Each PC was required to have its own resources (which could not be shared), and the transfer of data between the PCs was through floppy diskettes. As a first PC networking exercise, the UNIX operating system was ported to PCs, this worked fine. Later many network operating systems were designed, which broke the mainframe and minicomputer users to desktops. Novell’s NetWare operating system gave popularity to PC networks and was the most widely used network operating system until 1996/97. Today Microsoft’s Windows NT is leading the show with the largest market share among all the available operating systems. Except UNIX, the other entire range of network operating system used with PCs (E.g. Novell’s NetWare, Microsoft’s Windows NT, and IBM’s OS/2), feature distributed processing. In distributed processing environment, the programs (may be the data) are centrally stored on the server, but the processing is done individually at each workstation. This means when a user working on his PC (called workstation) requests for the program (or data) the request is sent to the server (usually called a file server.) The server then gives out the requested program (or data) to that workstation. When the user processes this data, the workstation does all the processing. This is different from the centralized processing, in which the data is processed at the host itself (or server) and only the result is displayed on the terminal. Distributed Processing In distributed processing system, each workstation processes its own data, the server does not get loaded easily with the addition of users, as in the case with centralized 4 Centre for Information Technology and Engineering, Manonmaniam Sundaranar University Introduction to Networks processing. However, unlike the cheaper dumb terminals used in centralized environments, the distributed environments require every machine to have the required hardware. • As the data is processed by individual
Recommended publications
  • Curriculum Vitae
    CURRICULUM VITAE Amr El Sayed Abdel Latif PERSONAL DATA Address :The American University in Cairo, Social Research Center, P.O. BOX 2511, Cairo, Egypt. Phone (202) 2763-5157 (Home ) (202) 2615-1405 (Work ) (20100)373-2775 (Mob) Birth date : Nov. 17.1970 Nationality : Egyptian E-mail: [email protected] EDUCATION Oct 1996 Cairo University Oct 1997 Institute of Statistical Studies and Research. Qualifying studies for master degree Oct 1994 Cairo University May 1996 Institute of Statistical Studies and Research. Diploma in demography Sept 1988 Cairo University May 1993 Faculty of Science BS - Mathematical Statistics (Very Good) WORK EXPERIENCE Official Work May 1997 The American University In Cairo To date Social Research Center Officer, Research, Field & Training Amr el sayed 1 July 1993 Cairo Demography Center May 1997 Research Assistant June 1996 Saudi Arabia Sept 1996 Project of planning, Abha Data coordination and analysis Experience I have an intensive experience in working (as data analyst, using the SPSS) with Demographic and Health Survey (DHS) and the Maternal and Child Health Surveys (PAPCHILD) Data files of Egypt and other countries, as well to design data entry programs and worked as data analysis trainer in many workshops. Teaching classes - Teaching SPSS, Stata and Spectrum classes to the participants in the "Research Methods Workshop”, from 2000 till 2017. - Teaching SPSS Classes in the following: - The Social Fund for Development - Yemen, 2006. - Faculty of Economics and Political Sciences - Cairo University, 2010.
    [Show full text]
  • Como Entender As Denúncias De Vigilantismo Global
    PROTEÇÃO DE DADOS A BITCOIN e-SAÚDE na União Europeia pode derrubar os EUA e privacidade no Brasil o instituto nupef é uma organização sem fi ns Uma publicação do Instituto Nupef • outubro / 2013 • www.politics.org.br de lucro dedicada à refl exão, análise, produção de conhecimento e formação, principalmente centradas em questões relacionadas às tecnologias da informação e Comunicação (tiCs) e suas relações políticas com os direitos humanos, a democracia, o desenvolvimen- to sustentável e a justiça social. além de realizar cursos, eventos, desenvolver pesquisas e estudos de caso, o nupef edita a politiCs, a rets (revista do terceiro setor) e mantém o projeto tiwa – provedor de serviços internet voltado exclusivamente para instituições sem fi ns lucrativos – resultado de um trabalho iniciado há 21 anos, com a criação do alternex (o pri- meiro provedor de serviços internet aberto ao público no Brasil). o tiwa é um provedor comprometido prioritariamente com a pri- vacidade e a segurança dos dados das entidades associadas; com a garantia de sua liberdade de expressão; com o uso de software livre e de plataformas abertas não-proprietárias. Tecnologias e pessoas com defi ciência: questão política rua sorocaba 219, 501 | parte | Botafogo | CeP 22271-110 | rio de Janeiro | rJ | Brasil Como entender telefone/fax +55 (21) 3259-0370 | www.nupef.org.br as denúncias de vigilantismo global nº16 EDITOR CARLOS A. AFONSO CAPA, PROJETO GRÁFICO E DIAGRAMAÇÃO MONTE DESIGN DISTRIBUIÇÃO VIVIANE GOMES Índice TRADUÇÕES RICARDO SILVEIRA 02 >Como entender as denúncias Esta é uma publicação do Instituto Nupef. de vigilantismo global Versão digitalizada disponível em www.politics.org.br e no sítio do Nupef - www.nupef.org.br Pedro Antonio Dourado de Rezende Para enviar sugestões, críticas ou outros comentários: [email protected] >10 Rua Sorocaba, 219 | 501 - parte | Botafogo | 22271-110 Sugestões relativas às políticas públicas brasileiras sobre Rio de Janeiro RJ Brasil | telefone +55 21 2527-0294 tecnologias assistivas para pessoas com deficiência visual Apoio: Fernando H.
    [Show full text]
  • Closed Systems January 1St, 2021
    1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 Enhanced DR-DOS 7.01.07 2005 2006 2007 2008 2009 2010 2011 Enhanced DR-DOS 7.01.08 2012 2013 2014 2015 2016 2017 2018 2019 2020 FreeDOS alpha 0.05 DR-DOS/OpenDOS 7.01.01 march 6, 2005 july 21, 2011 FreeDOS FreeDOS alpha 0.1 FreeDOS alpha 0.2 FreeDOS beta 0.3 FreeDOS beta 0.4 FreeDOS beta 0.5 FreeDOS beta 0.6 FreeDOS beta 0.7 FreeDOS beta 0.8 july 2002 FreeDOS beta 0.9 FreeDOS 1.0 FreeDOS 1.1 january 12, 1998 april 21, 1999 FreeDOS 1.2 DR-DOS 3.41 june 29, 1994 march 25, 1998 october 28, 1998 april 9, 2000 august 10, 2000 march 18, 2001 september 7, 2001 april 7, 2002 september 28, 2004 september 3, 2006 january 2, 2012 december 25, 2016 DOS Plus 1.0 DOS Plus 2.01 DR-DOS 3.31 DR-DOS 5.0 DR-DOS 6.0 Novell DOS 7.0 OpenDOS 7.01 Caldera DR-OpenDOS 7.02 DR-DOS 7.04 DR-DOS 7.05 DR-DOS 8.0 DR-DOS 8.1 1985 may 28, 1988 june 1989 may 1990 december 1993 february 1997 december 1997 Caldera DR-DOS 7.02 DR-DOS 7.03 november 30, 1999 october 2005 september 1991 march 1998 january 6, 1999 august 19, 1999 march 30, 2004 Xbox Xbox Xbox Xbox 360 (announced) Xbox Xbox 360 Xbox One (beta) (announced) november 15, 2001 (announced) march 9, 2000 may 12, 2005 november 22, 2005 november 22, 2013 october 1999 january 6, 2001 Windows Embedded for Point of Service Windows Server 2008 Foundation april 1, 2009 MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 MS-DOS 3.05 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 MS-DOS 4.01 MS-DOS 5.0 MS-DOS 5.0a MS-DOS
    [Show full text]
  • Windows Phone 8.1 Enterprise Device Management Protocol
    Windows Phone 8.1 Enterprise Device Management Protocol Version: Windows Phone 8.1 GDR2 Last updated: February 1, 2016 Proprietary Notice © 2015 Microsoft. All rights reserved. This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. This document is confidential and proprietary to Microsoft. It is disclosed and can be used only pursuant to a non-disclosure agreement. Contents Windows Phone 8.1 Enterprise Device Management Protocol ......................................................................................... 1 Summary .................................................................................................................................................................................................. 1 Connecting to the management infrastructure (enrollment) ............................................................................................. 2 Conceptual flow ................................................................................................................................................................................ 2
    [Show full text]
  • N.S.A. Able to Foil Basic Safeguards of Privacy on Web - Nytimes.Com
    N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryp... HOME PAGE TODAY'S PAPER VIDEO MOST POPULAR U.S. Edition Try a Digital Subscription Log In Register Now Help Search All NYTimes.com U.S. WORLD U.S. N.Y. / REGION BUSINESS TECHNOLOGY SCIENCE HEALTH SPORTS OPINION ARTS STYLE TRAVEL JOBS REAL ESTATE AUTOS POLITICS EDUCATION TEXAS N.S.A. Able to Foil Basic Safeguards of Privacy on Web Log in to see what your friends are sharing Log In With Facebook on nytimes.com. Privacy Policy | What’s By NICOLE PERLROTH , JEFF LARSON and SCOTT SHANE This? Published: September 5, 2013 1466 Comments The National Security Agency is winning its long-running secret war FACEBOOK What’s Popular Now on encryption, using supercomputers, technical trickery, court orders TWITTER On Syria Vote, Doug Stanhope’s and behind-the-scenes persuasion to undermine the major tools Trust, but Verify ‘Beer Hall GOOGLE+ Putsch,’ a protecting the privacy of everyday communications in the Internet Stand-Up Album SAVE age, according to newly disclosed documents. E-MAIL Enlarge This Image The agency has circumvented or SHARE cracked much of the encryption, or MOST E-MAILED MOST VIEWED PRINT digital scrambling, that guards global 1. Harvard Business School Case Study: commerce and banking systems, REPRINTS Gender Equity protects sensitive data like trade secrets and medical records, and automatically secures the 2. 3 Quiet Museums in Rome e-mails, Web searches, Internet chats and phone calls of Associated Press Americans and others around the world, the documents This undated photo released by the show.
    [Show full text]
  • Digital Review of Asia Pacific 2007-2008
    DIGITAL REVIEW of ri LA V i. L I 2007 2008 REPORTS ON 31 ECONOMIES 2 SUB-REGIONAL ASSOCIATIONS ICT4D in Asia Pacific: An Overview of Emerging Issues Mobile and Wireless Technologies for Development in Asia Pacific The Role of ICTs in Risk Communication in Asia Pacific I Localization in Asia Pacific I I Key Policy Issues in I Intellectual Property and Technology in Asia Pacific I State and Evolution of ICTs: A Tale of Two Asias ARCHIV 127081 www.digital-review.org DIGITAL REVIEW of Asia acjfic 2007-2008 I Supplementary news, reports and analyses are available for download at: http ://www. digital-review. org DIGITAL REVIEW of As 2007—2008 <dirAP> CHIEF EDIToR: Felix Librero CONTRIBUTING AUTHORS: ASSOCIATE EDITOR: Patricia B. Arinto Frederick John Abo Salman Malik EDITORIAL BOARD: Musa Abu Hassan Muhammad Aimal Marjan Ilyas Ahmed Jamshed Masood Danny Butt Zorayda Ruth Andam Ram Mohan Claude-Yves Charron Lkhagvasuren Ariunaa Charles Mok Suchit Nanda Batpurev Batchuluun Rapin Mudiardjo Maria Ng Lee Hoon Axel Bruns Frederick Noronha Milagros Rivera Danny Butt Them Oo Rajesh Sreenivasan Donny B.U. Sushil Pandey Knshnamurthy Sriramesh Elizabeth V. Cardoza Adam Peake Jian Yan Wang Claude-Yves Charron Phonpasit Phissamay Kapil Chawla Gopi Pradhan Masoud Davarinejad Ananya Raihan Deng Jianguo Naomi Robinson Massood Saffari Hj Abd Rahim Derus Lorraine Carlos Joâo Câncio Freitas Salazar George Sciadas John Fung Basanta Shrestha Atanu Garai Abhishek Singh Goh Seow Hiong Rajesh Sreenivasan Lelia Green Krishnamurthy Sriramesh Nalaka Gunawardene Tan
    [Show full text]
  • 4,962.533 16/1996 Krueger Et Al...307 Multi-Level Multimedia Security
    USOO5369702A United States Patent 19 11 Patent Number: 5,369,7029 9 Shanton 45 Date of Patent: Nov. 29, 1994 54 DISTRIBUTED CRYPTOGRAPHIC OBJECT 5,204,961 4/1993 Barlow ............................... 380/4X METHOD OTHER PUBLICATIONS 75 Inventor: M. Greg Shanton, Fairfax, Va. Massey, "An Introduction to Contemporary Cryptol 73 Assignee: TECSEC Incorporated, Vienna, Va. ogy,” Proceeding of the IEEE, May 1988, pp. 533-549. a Schneier, “Untangling Public-Key Cryptography,” Dr. 21 Appl. No.: 138,857 Dobb's Journal, May 1992, pp. 16-28. 22 Filed: Oct. 18, 1993 Primary Examiner-Bernarr E. Gregory 51) Int. C. ............................................... H04L 9/00 Attorney, Agent, or Firm-Thomas M. Champagne; Jon 52 U.S. C. ........................................... 380/4; 380/9, L. Roberts 380/21: 380/23;380/56,346/8353.340/825.34 380/25; 380/28; 380/49; 57 ABSTRACT 58 Field of Search ..................... 380/4, 9, 21, 23, 25, A system for increasing the security of a computer 380/28, 30, 43, 49, 50, 340/825.31, 825.34 system, while giving an individual user a large amount 56 Ref Ci of flexibility and power. To give users the most power 56) eferences Cited and flexibility, a standard object that has the capability U.S. PATENT DOCUMENTS to embed objects is used. To allow users even more 4,218,582 8/1980 Hellman et al. ...................... 380/30 flexibility, a standard object tracking mechanism is used 4,405,829 9/1983 Rivest et al. .......................... 380/30 that allows users to distribute multiple encrypted em 4,424,414 1/1984 Hellman et al. ...................... 380/30 bedded objects to other individuals in a single se E.
    [Show full text]
  • Copyrighted Material
    74593bindex.fm Page 335 Friday, January 11, 2008 9:25 AM Index A overview of, 69–70 ABOUT_command, PowerShell, 188 policies and system management. See policies, access management, new features, 205 Active Directory ACLs (access control lists) read-only domain controllers, 81–82 Active Directory auditing, 73 restartable AD Domain Service, 87–88 iSCSI using, 64 roles, 79–84 security settings for, 218 TS Remote App deployment using, 275 system ACLs, 73, 204 Windows Deployment Services requiring, ACPI (Advanced Configuration and Power 49–51 Interface) 2.0, 11 AD CS (Active Directory Certificate Services), 80, ACT (Application Compatibility Toolkit) 5.0 82–83 deployment with, 41 AD DS (Active Directory Domain Service) overview of, 36–38 creating domain controller, 76–77 using shimming engines, 311 integrated authorization with, 79–80 actions, specifying Task Scheduler, 174–175 restartable, 87–88 Activate Server wizard, 287–288 TS Web Access with, 281 Active Directory. See AD (Active Directory) AD DS Installation wizard, 76–79 Active Directory Application Mode (ADAM), 84 AD FS (Active Directory Federation Services), 82 Active Directory Certificate Services (AD CS), 82 AD RMS (Active Directory Rights Management Active Directory Domain Services detail panel, Services), 223–224 Server Manager, 157–158 ADAM (Active Directory Application Mode), 81 Active Directory Federation Services (AD FS), 82 Add Features wizard, 241, 247–249 Active Directory Rights Management Services (AD Add Print Driver wizard, 233 RMS), 223–224 Add Printer wizard, 230 Active
    [Show full text]
  • PDF Download Microsoft Windows 7 1St Edition Pdf Free Download
    MICROSOFT WINDOWS 7 1ST EDITION PDF, EPUB, EBOOK Gary B Shelly | 9781439081075 | | | | | Microsoft Windows 7 1st edition PDF Book Have more questions? Touch, type, click, or pen—choose whatever fits your style. Microsoft Windows family. Archived from the original on February 9, Windows Vista was released on November 30, to business customers - consumer versions followed on January 30, One of the more notable new features was the addition of Internet Connection Sharing , a form of network address translation , allowing several machines on a LAN Local Area Network to share a single Internet connection. Follow Microsoft Windows. Windows Server Blog. Please select an option. PCs originally built with Windows 7 are running year-old technology. Windows Server R2, an update of Windows Server , was released to manufacturing on December 6, This book will serve as a reference and guide for those who want to utilize Windows 7. One major difference between Vista and earlier versions of Windows, Windows 95 and later, is that the original start button was replaced with the Windows icon in a circle called the Start Orb. Back up your files and photos Save your personal files and photos to OneDrive or to an external hard drive. Here's our review of the OS". On October 26, , Microsoft released Windows 8 to the public. You are connected as. The Win32 API had three levels of implementation: the complete one for Windows NT, a subset for Chicago originally called Win32c missing features primarily of interest to enterprise customers at the time such as security and Unicode support, and a more limited subset called Win32s which could be used on Windows 3.
    [Show full text]
  • Closed Systems January 1St, 2021
    1980 1981 QDOS 0.1 86-DOS 0.3 86-DOS 1.0 PC-DOS 1.00 august 1980 december 1980 april 1981 august 12, 1981 Interface Manager (development) september 1981 Closed Systems January 1st, 2021 Éric Lévénez 2000-2021 <http://www.levenez.com/windows/> 1982 1983 MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 june 1982 july 1982 may 1983 december 1983 MS-DOS 2.12 1983 PC-DOS 1.10 PC-DOS 2.0 PC-DOS 2.10 june 1982 march 1983 october 1983 Windows (announced) november 10, 1983 1984 1985 DOS Plus 1.0 1985 MS-DOS 3.05 november 1984 PC-DOS 3.0 PC-DOS 3.10 august 1984 november 1984 Windows 1.0 Windows 1.01 november 20, 1985 1985 1986 1987 DOS Plus 2.01 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 (announced) august 1987 november 1987 april 2, 1987 PC-DOS 3.20 PC-DOS 3.30 january 1986 april 1987 Windows 2.0 Windows 1.03 Windows 2.0 1986 (announced) april 2, 1987 december 9, 1987 Windows /386 Windows /386 2.0 (announced) december 9, 1987 april 2, 1987 PC-MOS 1.02 PC-MOS/386 5.01 1987 february 1987 MS OS/2 1.0 (CP/DOS) april 2, 1987 1988 1989 DR-DOS 3.31 DR-DOS 3.41 may 28, 1988 june 1989 MS-DOS 4.01 december 1988 MS-DOS 4.1 1988 PC-DOS 4.0 august 1988 Windows /286 2.1 june 28, 1988 Windows /386 2.1 june 28, 1988 Windows Windows N-Ten Windows NT (alpha) (alpha) (alpha) november 1988 january 1989 april 1989 OS/2 1.1 SE OS/2 1.1 EE OS/2 1.2 (Trimaran) 1989 (Sloop) october 31, 1988 october 1989 1990 1991 DR-DOS 5.0 DR-DOS 6.0 may 1990 september 1991 MS-DOS 5.0 june 1991 Windows 3.0 Windows 3.0 (+ Multimedia Extensions) may 22, 1990 october 20, 1991 Windows NT (announced)
    [Show full text]
  • Microsoft Windows Cairo Product Planning
    Microsoft® Windows Cairo Product Planning Product Requirements Ao’vanced Systems Bus:wess Unit Program Ma/zagement Version 7 March S, 1993 Distribution: L~m~ted to Microsoft Advanced Systems © Copyr~ht Microsoft ~ion, 1993 All Rights Reserved Microsoft Confidential Note: This is a product p~annlng clocument for a software system tha! is st~ll in development. Some of the intom~atiofl in this ~ument~n may be inaccurate or may not be an accurate representatio~ of the functionality of the final retail product. Microsoft assumes no responsibility for any damages that nught occur either directly or indirectly from these inaccuracies. MS 004281 rPlaintiff,s Exhibit-~ CONFIDENTIAL 5542 Comes V. Microsoft Contents I. ProductCa~’s Ove~w~w ~mon . Gres LobdeL!................................................................................................................... ................................................................................................ I I T~ge~ ~ ..................................................................................................................... U~ ~ ~ B~fi~ ...........................................................................................2 ~ A~ ..........................................................................................................6 S~ .........................................................................................................................? ~ P~ ..........................................................................................................8 ~
    [Show full text]
  • Closed Systems February 8, 2003
    QDOS 0.1 86-DOS 0.3 86-DOS 1.0 PC-DOS 1.00 august 1980 december 1980 april 1981 august 12, 1981 Interface Manager (development) september 1981 Closed Systems february 8, 2003 Éric Lévénez 2000-2003 <http://www.levenez.com/windows/> MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 june 1982 july 1982 may 1983 december 1983 MS-DOS 2.12 1983 PC-DOS 1.10 PC-DOS 2.0 PC-DOS 2.10 june 1982 march 1983 october 1983 Windows (announced) november 10, 1983 MS-DOS 3.05 november 1984 PC-DOS 3.0 PC-DOS 3.10 august 1984 november 1984 Windows 1.0 Windows 1.01 november 20, 1985 1985 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 (announced) august 1987 november 1987 april 2, 1987 PC-DOS 3.20 PC-DOS 3.30 january 1986 april 1987 Windows 2.0 Windows 1.03 Windows 2.0 1986 (announced) april 2, 1987 december 9, 1987 Windows /386 Windows /386 2.0 (announced) december 9, 1987 april 2, 1987 MS OS/2 1.0 april 2, 1987 MS-DOS 4.01 december 1988 PC-DOS 4.0 august 1988 Windows /286 2.1 june 28, 1988 Windows /386 2.1 june 28, 1988 OS/2 1.1 october 31, 1988 MS-DOS 5.0 june 1991 Windows 3.0 Windows 3.0 (+ Multimedia Extensions) may 22, 1990 october 20, 1991 Windows NT (announced) october 1991 MS-DOS 5.0a MS-DOS 6.0 MS-DOS 6.2 1992 march 30, 1993 november 1993 PC-DOS 5.02 PC-DOS 6.00 august 1992 1993 Windows 4 Chicago Windows 3.1 Windows 3.11 april 6, 1992 (announced) july 4, 1992 Windows for Windows for Workgroups 3.1 Workgroups 3.11 october 27, 1992 november 8, 1993 Windows NT (beta) Windows NT 3.1 november 11, 1992 july 27, 1993 OS/2 2.0 march 1992 MS-DOS 6.21 MS-DOS 6.22 MS-DOS 7.0
    [Show full text]