5 hours 56 minutes
Hey, welcome back to the course. So in the last video, we talked about the different boot processes. So we talked about Windows, Mackey and Lennox again, we just took a very, very, very, very high level overview of those particular boot processes.
So this video, where to start or discussing on the different file systems? So we're gonna talk about fat versus and he f s.
So as I mentioned, we have fat and anti fso fat 16 fat 32 also ante F s. So we're gonna talk about each one of these just a little bit again. This is another kind of 10,000 foot overview of these file systems.
So fat 16 or as fat stands for you as you may or may not already know file allocation table. So this fat 16 was designed for smaller disk and then also simple folder structures, right? So nothing complex at all. You call me, find this to release. You used to find this commonly, like digital cameras or even like flash garage, etcetera.
The files or start also started the start of the volume
and then came along, came along a fat 32. So this one is a little more efficient on space. Usual ization on dhe, mostly because it uses smaller clusters. And there's also no restrictions on entries into the root folder.
And then we have NT f s. Right, So this is kind of the more common one that you'll see nowadays, for the most part, so new technology file system. One thing to keep in mind for your examination that the bit map file keeps track, have used an unused clusters s. So just keep that in mind
then. Also, it offers compression, auditing, et cetera. It also supports raid, which is very important to know as well is that it supports journaling. So just keep that in mind as well as your studying for the exam that NT if S supports Journal E
So we have different Lennox file system, So e x t e x t to t x t three and t e 64 now e X t is a very, very old one, so that may you may not actually see that out. In the real world, a lot of lyrics platforms are built on E X t to. However, you'll start to see more commonly
the more common things. Probably out there are 62 63
with, you know, 64 being
more adopters. Well,
so e x t So again, as I mentioned, this was kind of the early 12 step first file system for Lennox way back in 1992 is kind of the estimate There. The extent of file system is what the E X t stands for, and then the meta data structure is similar to the U. F S
or UNIX file system.
E x t to S o. Again. As I mentioned, this one's seen commonly many links distributions superblock in its stores, information about the size and shape of the extinct, too. So that's something you definitely want to make sure you know, for the ch EF eye exam. Uh then also, the data stored on blocks are stored in blocks of the same length.
We have E x, t. Three. The key thing that note here is that it offers journaling, right? So again, make sure he just memorize that for the exam and then the max single file sizes, two terabytes.
And then we have the extra four. So here the max single file size of 16 terabytes. So you see that we go up significantly there and then also this one has better scale and reliability specifically more so than like e x t e n e x t too.
And then, as I mentioned this one, you know, with the with the increase with reliability that's due to increase performance and then also reducing the fragmentation over the other e x e options.
So just one quick post assessment question here, so NT f s is a file system for Lennox. Is that true or false?
All right, so we obviously knew that was false, Right, Auntie? Offenses for wind is a type of Windows file system. So again, that answer was false.
So in this video would just kind of went over at it again of river high level of fat and T. F s and also the Lenox extended file systems.
In the next video, we're gonna talk about H f s H F s plus both for Mac as well as we're gonna talk about the raid levels. So again, the radio level is there something you'll definitely want to know for the examination
Computer Hacking and Forensics
Love the idea of digital forensics investigation? That is what computer forensics is all about. You will learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless attacks.