Jump to content

Comparison of operating systems

From Wikipedia, the free encyclopedia

These tables provide a comparison of operating systems, of computer devices, as listing general and technical information for a number of widely used and currently available PC or handheld (including smartphone and tablet computer) operating systems. The article "Usage share of operating systems" provides a broader, and more general, comparison of operating systems that includes servers, mainframes and supercomputers.

Because of the large number and variety of available Linux distributions, they are all grouped under a single entry; see comparison of Linux distributions for a detailed comparison. There is also a variety of BSD and DOS operating systems, covered in comparison of BSD operating systems and comparison of DOS operating systems.

Nomenclature

[edit]

The nomenclature for operating systems varies among providers and sometimes within providers. For purposes of this article the terms used are;

kernel
In some operating systems, the OS is split into a low level region called the kernel and higher level code that relies on the kernel. Typically the kernel implements processes but its code does not run as part of a process.[disputeddiscuss]
hybrid kernel
monolithic kernel
Nucleus
In some operating systems there is OS code permanently present in a contiguous region of memory addressable by unprivileged code; in IBM systems this is typically referred to as the nucleus. The nucleus typically contains both code that requires special privileges and code that can run in an unprivileged state. Typically some code in the nucleus runs in the context of a dispatching unit, e.g., address space, process, task, thread, while other code runs independent of any dispatching unit. In contemporary operating systems unprivileged applications cannot alter the nucleus.

License and pricing policies also vary among different systems. The tables below use the following terms:

BSD
BSD licenses are a family of permissive free software licenses, imposing minimal restrictions on the use and distribution of covered software.
bundled
The fee is included in the price of the hardware
bundled initially
The fee is included in the price of the hardware but upgrades require an additional fee.
GPL2
GPL3
Per user
The fee depends on the maximum number of users concurrently logged on.
MSU
The fee depends on the resources consumed by the user
MULC
Measured Usage License Charges
PSLC
Parallel Sysplex Software Pricing

General information

[edit]
  1. ^ a b Most OS distributions include bundled software with various other licenses.
  2. ^ "Hungarian". The Original Macintosh Anecdotes.. Although Lisa OS ran on the same, but a slower variant, microprocessor and was developed by Apple Computer Inc. at the same time as Classic Mac OS, they were developed as different projects, only sharing a similar GUI between them.
  3. ^ Mac OS 7.6 was the first Macintosh system software to be labeled Mac OS. Operating systems before this were named Macintosh System Software through System Software 7.5, and known as System #.# for short.

Technical information

[edit]
  1. ^ a b Operating systems where the GUI is not installed and turned on by default are often bundled with an implementation of the X Window System, installation of which is usually optional.
  2. ^ a b Most operating systems use proprietary APIs in addition to any supported standards.
  3. ^ a b Amiga OS features since OS 2.0 version a standard centralized Install utility called Installer, which could be used by any software house to install programs. It works as a Lisp language interpreter, and install procedures could be listed as simple text. AmigaOS can also benefit from a 3rd party copyrighted library called XAD that is available for all POSIX (Unix, Linux, BSD, and for AmigaOS, MorphOS, etc.). This library is freely distributable and publicly available on Aminet Amiga centralized repository of all Open Source or Free programs and utilities. XAD.Library, complete with GUI Voodoo-X, is based on modules and capable to manage over 300 compression methods and package systems (Voodoo-X GUI supports 80 package systems), including those widely accepted as standards such as .ZIP, .CAB, .LHA, .LZX, .RPM, etc.
  4. ^ a b A standard AmigaOS installation requires usually only few files (typically 3 to 10 files) to be copied in their appropriate directory, and libraries and language files for national localization to be put in their standard OS directories. Any Amiga user with some minimal experience knows where these files should be copied and could perform programs installations by hand.
  5. ^ AmiUpdate can update AmigaOS files and all Amiga programs which are registered to use the same update program that is standard for Amiga. Updating AmigaOS requires only few libraries to be put in standard OS location (for example all libraries are stored in Libs: standard virtual device and absolute path finder for Libs directory, Fonts are all in Fonts: absolute locator, the files for language localization are all stored in Locale: and so on). This leaves Amiga users with a minimal knowledge of the system almost free to perform by hand the update of the system files.
  6. ^ a b c d e f g h i j k l m n o p using Wine
  7. ^ a b NetBSD and OpenBSD include the X Window System as base install sets, managed in their respective main source repository, including local modifications. Packages are also provided for more up-to-date versions which may be less tested.
  8. ^ a b "BrandZ (Community Group brandz.WebHome) - XWiki". Opensolaris.org. October 26, 2009. Archived from the original on September 29, 2009. Retrieved December 18, 2011.
  9. ^ only i686 CPU
  10. ^ a b Windows can read and write with Ext2 and Ext3 file systems only when a driver from FS-driver or Ext2Fsd is installed. However, using Explore2fs, Windows can read from, but not write to, Ext2 and Ext3 file systems. Windows can also access ReiserFS through rfstool and related programs.

Security

[edit]
Name Resource
access
control
Subsystem
isolation
mechanisms
Integrated
firewall
Encrypted
file
systems
No execute (NX)
page flag
Manufacturer acknowledged unpatched vulnerabilities (by severity)[s 1]
Secunia Security-
Focus
Hardware
Emulation
Extremely critical
(number / oldest)
Highly
critical
(number / oldest)
Moderately critical
(number / oldest)
Less
critical
(number / oldest)
Not
critical
(number / oldest)
Total
(number / oldest)
AIX 7.1 POSIX, ACLs, MAC, Trusted AIX - MLS, RBAC chroot IPFilter, IPsec VPNs, basic IDS Yes Yes[s 2] Un­known 0
FreeBSD 10.1 POSIX, ACLs, MAC chroot, Jails, MAC partitions, multilevel security, Biba Model, BSD file flags set using chflags, Capsicum Capability-based security IPFW2, IPFilter, PF, IPsec Yes Yes Yes[s 3] 0 0 0 0 0 >0
GhostBSD 3.1 POSIX, ACLs, MAC chroot, jail, MAC partitions, BSD file flags set using chflags IPFW2, IPFilter, PF Yes Yes Yes 0 0 0 0 0 >0
Genode Hierarchal,[22] least privilege capability-based security Virtual switch and NAPT controls in user-space No kernel dependent No Un­known
HP-UX 11.31 POSIX, ACLs chroot IPFilter Yes ? ? 0 0 3
June 30, 2004;
21 years ago
 (2004-06-30)
2
December 12, 2002;
22 years ago
 (2002-12-12)
0 >0
Inferno POSIX Namespaces,[23] capability-based security, no superuser or setuid bit ? ? No No Un­known >0
Linux-based 2.6.39 POSIX, ACLs,[s 4] MAC chroot,[s 5] seccomp, Namespaces, SELinux, AppArmor Netfilter, varied by distribution Yes Yes Yes 0 0 0 6
June 24, 2004;
21 years ago
 (2004-06-24)
11
April 4, 2005;
20 years ago
 (2005-04-04)
>0
Mac OS 9.2.2 No No No No No No 0 0 0 0 0 >0
OS X 10.10.5 POSIX, ACLs[s 6] chroot, BSD file flags set using chflags ipfw Yes Yes (as of 10.5, X64 only) Yes (Intel only) 0 0 1
April 14, 2009;
16 years ago
 (2009-04-14)
2
January 8, 2007;
18 years ago
 (2007-01-08)
5
November 22, 2006;
18 years ago
 (2006-11-22)
>0
NetBSD 6.1.2 POSIX, Veriexec, PaX, kauth chroot, kauth, BSD file flags set using chflags IPFilter, NPF, PF Yes Yes No Un­known >0
NetWare 6.5 SP8 Directory-enabled ACLs Protected address spaces IPFLT.NLM Yes Yes No 0 0 1
August 31, 2010;
14 years ago
 (2010-08-31)
2
October 30, 2003;
21 years ago
 (2003-10-30)
0 0
OES-Linux Directory-enabled ACLs chroot IPFilter Yes Yes No Un­known >0
OpenBSD 4.8 POSIX chroot, systrace, BSD file flags set using chflags PF Yes Yes Yes Un­known >0
OpenVMS 9.2 ACLs, privileges logical name tables ? ? Yes ? 0 0 0 0 0 Unknown
OS/2, eComStation, ArcaOS ACLs[s 7] No IPFilter No ? ? 0 0 0 0 0 0
TrueOS 8.1 POSIX, ACLs, MAC chroot, jail, MAC partitions IPFW2, IPFilter, PF Yes[s 8] ? ? 0 0 0 0 0 >0
Plan 9 POSIX ? Namespaces,[23] capability-based security, no superuser or setuid bit ipmux Yes No No Un­known >0
QNX 6.5.0 POSIX ? PF, from NetBSD ? ? ? 0 0 0 5
November 20, 2002;
22 years ago
 (2002-11-20)
1
November 7, 2002;
22 years ago
 (2002-11-07)
Unknown
RISC OS No No IPFilter No No No Un­known
Solaris 10 POSIX, RBAC, ACLs, least privilege, Trusted Extensions chroot, Containers,[s 9] Logical Domains IPFilter Yes[s 10] Yes No 0 2
October 31, 2007;
17 years ago
 (2007-10-31)
5
October 23, 2007;
17 years ago
 (2007-10-23)
3
September 10, 2009;
15 years ago
 (2009-09-10)
2
November 6, 2006;
18 years ago
 (2006-11-06)
>0
OpenSolaris 2009.06 POSIX, RBAC, ACLs, least privilege, Trusted Extensions chroot, Containers,[s 9] Logical Domains IPFilter Yes[s 10] Yes No 0 0 0 0 0 >0
Windows Server 2012 ACLs, privileges, RBAC Win32 WindowStation, desktop, job objects Windows Firewall Yes Yes Yes 0 0 0 0 0 [Unknown]
Windows 8.1 ACLs, privileges, RBAC Win32 WindowStation, desktop, job objects Windows Firewall Yes Yes Yes 0 0 0 0 1
May 30, 2014;
11 years ago
 (2014-05-30)
[Unknown]
ZETA POSIX[s 11] No No No No No Un­known
STOP 6, XTS-400[s 12] POSIX, multilevel security, Biba Model mandatory integrity, ACLs, privileges, subtype mechanism Multilevel security, Biba Model, subtype mechanism No No No No Un­known
z/OS 1.11 RACF RACF, low storage protection, page protection, storage protect key, execution key, subspace group facility, APF, ACR (alternate CPU recovery), more z/OS IPSecurity Optional Yes (storage protect key, execution key, APF, more) Yes 0 0 0 0 0 Unknown
Name Resource
access
control
Subsystem
isolation
mechanisms
Integrated
firewall
Encrypted
file
systems
Hardware
Emulation
Extremely critical
(number / oldest)
Highly
critical
(number / oldest)
Moderately critical
(number / oldest)
Less
critical
(number / oldest)
Not
critical
(number / oldest)
Total
(number / oldest)
No execute (NX)
page flag
Secunia Security-
Focus
Known unpatched vulnerabilities (severity is accounted for)[s 1]
  1. ^ a b Comparison of known unpatched vulnerabilities based on Secunia & SecurityFocus reports with severity of Not critical & above. Update lists manually with oldest published date(s).
  2. ^ AIX use the PowerPC architecture which offer page-level protection mechanism. Since AIX version 5300-03 (5.3), this feature can be activated using the sedmgr command.
  3. ^ The GCC stack protection (a.k.a. ProPolice stack-smashing protector) has been enabled in base system since FreeBSD 8.0-release.
  4. ^ Support for the 1997 withdrawn POSIX ACL draft is included in Linux 2.6, but requires a file system able to store them (such as ext3, XFS or ReiserFS).
  5. ^ A jail mechanism is available separately in the Linux-VServer project, but is not integrated into any mainline Linux kernel.
  6. ^ ACLs were added to Mac OS X starting with version 10.4.
  7. ^ ACLs are available only in OS/2 Server versions with HPFS386 filesystem.
  8. ^ Additionally swap space may be encrypted during installation, uses memory based tmp file storage by default.
  9. ^ a b "Solaris Containers" (including "Zones") are a jail-type mechanism introduced with Solaris 10.
  10. ^ a b Through ZFS
  11. ^ Zeta has full Unix file permissions, but the OS is single user, and users always run as superuser.
  12. ^ STOP 6 is certified under Common Criteria at EAL5+.

Commands

[edit]

For POSIX compliant (or partly compliant) systems like FreeBSD, Linux, macOS or Solaris, the basic commands are the same because they are standardized.

NOTE: Linux systems may vary by distribution which specific program, or even 'command' is called, via the POSIX alias function. For example, if you wanted to use the DOS dir to give you a directory listing with one detailed file listing per line you could use alias dir='ls -lahF' (e.g. in a session configuration file).

  1. ^ May be omitted. Simply entering the directory name will change to it.
  2. ^ This feature is still in development, see [1].
  3. ^ The nice command utilizes the setpriority() system call, which affects I/O priority, see OS X man page .

See also

[edit]

Operating system comparisons

[edit]

References

[edit]
  1. ^ Pogue, David (January 1997). MacWorld Macintosh Secrets 4th edition - Chapter 6: The System Software Museum (PDF). p. 225. Archived (PDF) from the original on October 17, 2017. Retrieved October 18, 2017.
  2. ^ "Release 25.05". May 28, 2025. Retrieved June 15, 2025.
  3. ^ "GhostBSD 21.05.11 ISO now available". Retrieved June 25, 2021.
  4. ^ Greg Kroah-Hartman (August 23, 2025). "Linux 6.16.3". Retrieved August 26, 2025.
  5. ^ "'[9fans] Transfer of Plan 9 to the Plan 9 Foundation' - MARC".
  6. ^ Revill, Steve (October 24, 2020). "RISC OS 5.28 now available". RISC OS Open. Retrieved October 24, 2020.
  7. ^ "Oracle Solaris OTN License". Oracle.com. Retrieved October 4, 2013.
  8. ^ "Introducing IBM z/VM 7.4". August 6, 2024.
  9. ^ "The Chromium (Google Chrome) Open Source Project on Open Hub". openhub.net.
  10. ^ Arno Wagner (December 11, 2009). "(S)LOC Count Evolution for Selected OSS Projects" (PDF). data for 2009, fig 1.
  11. ^ "Release notes for the Genode OS Framework 18.11".
  12. ^ Ryan Paul (April 4, 2012). "Linux kernel in 2011: 15 million total lines of code and Microsoft is a top contributor". arstechnica.com. Retrieved August 21, 2012.
  13. ^ Amit (November 5, 2022). "HarmonyOS 3.1: Huawei written 239.6 million lines of code and 16000 own APIs". Huawei Update. Retrieved November 5, 2022.
  14. ^ Hellard, Bobby. "What is HarmonyOS? A guide to Huawei's operating system". IT PRO. IT PRO. Retrieved August 27, 2022.
  15. ^ Jobs, Steve (August 7, 2006). "Live from WWDC 2006: Steve Jobs Keynote". Retrieved February 16, 2007. 86 million lines of source code that was ported to run on an entirely new architecture with zero hiccups.
  16. ^ Tanenbaum, Andrew S. (2015). Modern Operating Systems: Global Edition. Pearson Education Limited. ISBN 9781292061955.
  17. ^ Benjamin. "OPENHARMONY HOLDS A TECHNICAL CONFERENCE IN CALIFORNIA, USA". HarmonyOSHub. HarmonyOSHub. Retrieved July 1, 2024.
  18. ^ "ReactOS Change Log". Archived from the original on May 18, 2015. Retrieved May 8, 2015.
  19. ^ "RISC OS Memory Protection - Drobe.co.uk archives". drobe.co.uk. Archived from the original on March 31, 2014. Retrieved March 4, 2013.
  20. ^ find usr/src -type f -exec wc -l {} + | grep total | awk '{ sum += $1 } END {print sum }' on [2] results in 18793105
  21. ^ Ben Liblit; Andrew Begel; Eve Sweetser. "Cognitive Perspectives on the Role of Naming in Computer Programs" (PDF). Retrieved December 26, 2007.
  22. ^ "Genode organizational structure".
  23. ^ a b Rob Pike; Dave Presotto; Ken Thompson; Howard Trickey; Phil Winterbottom. "The Use of Name Spaces in Plan 9".
[edit]