A secure and open source operating system. All communications that reasonably can be will be encrypted. It will also have fined-tuned firewall capabilities, with a default policy of deny all inbound except HTTP HTTPS and SSH. Web browser will be sand boxed from other parts of the OS. In order to access saved passwords, cache, cookies, ect in web browser, username/password are required. Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base

Features

  • firewall
  • access control
  • encryption
  • multi-user
  • secure

Project Activity

See All Activity >

License

Other License, Creative Commons Attribution ShareAlike License V3.0

Follow USE secure operating system

USE secure operating system Web Site

You Might Also Like
Simplify Purchasing For Your Business Icon
Simplify Purchasing For Your Business

Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of USE secure operating system!