Email id Test cases

Monday, 11 August 2014
Hi All

 Hope all doing good,the following were the general email id testcases with respective to the project :
the email id 's validation would be of two types :

a) with respective to format 
b) with respective to domain

With respective to domain ,the email should be verified,it can be done even with windows command prompt or the services of email accounts .

you could check with these command prompt of windows :

telnet 25
mail from: <>
rcpt to: <>
550-5.1.1 The email account that you tried to reach does not exist. Please try
550-5.1.1 double-checking the recipient's email address for typos or
550-5.1.1 unnecessary spaces. Learn more at
550 5.1.1
Upon success, and on servers that cannot or do not want to tell if an address is valid, the last command would yield:
250 2.1.5 OK
One could then simply invoke quit without sending any email at all. Still, when trying many addresses, this might also get you blocked.
(Gmail does not support the vrfy command. On the website, it also has a "check availability" button when signing up for a new Gmail account. That could also give you some information, but old addresses will be unavailable for some time.)

With respective to format follow these standards

from microsoft blog

Valid Email addressReason
email@domain.comValid email
firstname.lastname@domain.comEmail contains dot in the address field
email@subdomain.domain.comEmail contains dot with subdomain
firstname+lastname@domain.comPlus sign is considered valid character
email@ is valid IP address
email@[]Square bracket around IP address is considered valid
"email"@domain.comQuotes around email is considered valid
1234567890@domain.comDigits in address are valid
email@domain-one.comDash in domain name is valid
_______@domain.comUnderscore in the address field is valid is valid Top Level Domain name in Top Level Domain name also considered valid (use as example here)
firstname-lastname@domain.comDash in address field is valid

Invalid Email addressReason
plainaddressMissing @ sign and domain
@domain.comMissing username
Joe Smith <>Encoded html within email is invalid
email.domain.comMissing @
email@domain@domain.comTwo @ sign
.email@domain.comLeading dot in address is not allowed
email.@domain.comTrailing dot in address is not allowed dots
あいうえお@domain.comUnicode char as address (Joe Smith)Text followed email is not allowed
email@domainMissing top level domain (.com/.net/.org/etc)
email@-domain.comLeading dash in front of domain is invalid
email@domain.web.web is not a valid top level domain
email@111.222.333.44444Invalid IP format
email@domain..comMultiple dot in the domain portion is invalid

Read more ...

Security Testing Checklist For Web Applications

Wednesday, 29 January 2014
HI All

  Hope the past year went well,this is my first post at this year,thanks for the support,In this post i will share some of the best resources and checklist for security testing of web applications. Have a look on it and share your comments.

Some resources for it :

Web resources
Sysinternals Suite – Bunch of awesome utilities for testing activity – Google it and download the zip
file from Microsoft website.
Some of the security testing checklist mind-map by Darren McMillan -
Books suggested
The Art of Deception by Kevin Mitnick ( – It’s available)
Hacking for Dummies by Kevin Beaver (e-book available at – Search it there)
Web Services Hacking by Sreeraj Shah (Web Services Testing Book)
Learning to hack on these websites
There are different levels here and it gets more and more difficult over the duration after you
complete the exercise. Please do not look into solutions or google for it or else it is fun destroyer.
Things to do once back to desk
1. Install add-ons which can help you to perform security testing
2. Install Burp Suite, WebScarab
3. Subscribe to some of the hacking news and just read the headlines whenever you get time
4. Have passion for hacking / security testing / penetration testing

  • For All web pages which carry confidential data like password, Secret answer for security question should be submitted via HTTPS(SSL).
  • Password & security answer needs to be masked with input type = password.
  • Server Side Validation for form. Use “Firebug” and “TamperData” to perform this test (You can tamper for minimum length of password, set only new password without old password >> You got to remove the old password element from Firebug from the client-side and then submit it )
  • Check for SQL Injection for any page in your application that accepts user-supplied information to access a database.
    • A login form, signup form, or “forgot password” form is a good start.
    • A dynamic page that uses URL variables such as ID (product information pages are good for this).
    • Check for XSS by searching application for a page that takes user input and outputs it directly to a webpage. Common examples: Forums, Comments, Wikis, Review. Also, check for CSRF.

  • Set of rules for setting a password should be same across all the modules like Registration form, Change password, and Forgot password. If these rules differ than hacker might exploit it through brute force method. Example: If the registration form does not validate for password minimum length as 8 chars but while changing password from user profile it validates for minimum length or vice versa. Now, as registration form accepts password which are less than 8 chars it becomes easy for hacker to apply brute-force method.
  • Password enforcement of alphabets + numeric + special characters should be used in order to protect the account to a greater extent against brute force attack mechanisms.

Forgot your password
  • There need to be a restriction on number of forgot password requests sent per day or in “X” hours interval or have a captcha so that automated requests are not sent (To automate the requests  you could use “ReloadEvery” add-on which is to be used on
  • The URL has to expire on one use after being used to set new password.
  • The token associated with the URL should not be guessable or there should be any pattern which could be easily cracked.
  • If the URL is not used within “X” hours then it has to expire (Example: Once the URL is generated, if it is not used then it has to expire after “72 hours”)
  • When new token is generated the old ones should expire even if they are not used.
  • should not send the password via e-mails by resetting automatically. There has to be URL which should be used by end-user to set new password of his / her choice.
  • While typing secret answer in Forgot Password the secret answer needs to be masked (Secret Answer is also part of authentication which is similar to password, shoulder surfing or auto-complete stuff could be dangerous here compromising the end-user account).
  • Once the password is set, you might want to take end-user to logged in state or requesting him / her to login now with the hyperlink (I, personally would recommend taking to login page and requesting him / her to login with new password)

Registration Form
  • There needs to be a CAPTCHA so that spam bots do not register and spam in discussion forums with illicit content which could be frustrating for your genuine end-users.
  • Tamper with the mandatory fields by trying to register without mandatory fields – This is a server-side validation (Add-on on Mozilla Firefox – Tamper Data) Example: Can anyone bypass acceptance of terms of conditions and proceed with registration? This could be applied for all the forms and this test idea will not be repeated in other forms.

Change Password
  • Once the password is changed successfully. User should not be able to login again with his old password but, with his new (changed) password.
  • Login using the credentials on Mozilla Firefox | Login with the same credentials on Google Chrome | Now, change password for the account in Google Chrome | After this, refresh or try to navigate to some webpage which are allowed to be navigated only by logged in end-users | Result: The end-user in Mozilla Firefox web browser has to log out as he / she is in the session which has old password

Security Questions & Secret answer
  • Frame the security question in such a fashion that they are not obvious to be known (What’s your pet’s name? >> Now, is that secret and no wonder we see such questions in famous web applications). It would be good if user is provided with option of choosing customized security question.
  • Secret / security answers should be stored in database as hashes and not plain text.

Session Management
  • User whose activity is idle for some time should be automatically logged out by expiring his session. (Example: User has gone out to fresh room or to have some snacks without logging out. Now, anyone can come to his system & see the user account open & exploit user account.
  • No confidential details like password should be saved in cookie.
  • Check what information cookie carries & try to tamper with it using Mozilla add-on Tamper Data.

  • Captcha characters should not be displayed in cyclic fashion.
  • Captcha images should not be allowed to download at one time using add-on like “DownThemAll”
  • Use to see if captcha could be deciphered.
  • Every refresh of a webpage should display new captcha every time.
  • Do not show the absolute path names of the captcha that is being displayed because it is easy to put assertions identifying the URL and then entering the according characters to pass the captcha.
  • I personally insist on using Google reCaptcha for your web application because it has not been cracked till date. There are many captcha third party services out there but, I do not recommend those.
  • Usage of question and answers type of captcha in textual format is good but, not good enough.
Hope it helps ..

Read more ...

How to play with a user whom access your wifi illegally

Tuesday, 5 November 2013
Our motive

My neighbors are stealing my wireless internet access. I could encrypt it or alternately I could have fun.

Split the network

I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses.


ddns-updates off;
ddns-update-style interim;

shared-network local {

        subnet *.*.*.* netmask {
                range *.*.*.* *.*.*.*;
                option routers *.*.*.*;
                option subnet-mask;
                option domain-name "XXXXX";
                option domain-name-servers *.*.*.*;
                deny unknown-clients;

                host trusted1 {
                        hardware ethernet *:*:*:*:*:*;
                        fixed-address *.*.*.*;

        subnet netmask {
                option routers;
                option subnet-mask;
                option domain-name-servers;
                allow unknown-clients;


IPtables is Fun!

Suddenly everything is kittens! It's kitten net.
/sbin/iptables -A PREROUTING -s -p tcp -j DNAT --to-destination
For the uninitiated, this redirects all traffic to kittenwar.
For more fun, we set iptables to forward everything to a transparent squid proxy running on port 80 on the machine.
/sbin/iptables -A PREROUTING -s -p tcp -m tcp --dport 80 -j DNAT --to-destination
That machine runs squid with a trivial redirector that downloads images, uses mogrify to turn them upside down and serves them out of its local webserver.

The redirection script

$count = 0;
$pid = $$;
while (<>) {
        chomp $_;
        if ($_ =~ /(.*\.jpg)/i) {
                $url = $1;
                system("/usr/bin/wget", "-q", "-O","/space/WebPages/images/$pid-$count.jpg", "$url");
                system("/usr/bin/mogrify", "-flip","/space/WebPages/images/$pid-$count.jpg");
                print "$pid-$count.jpg\n";
        elsif ($_ =~ /(.*\.gif)/i) {
                $url = $1;
                system("/usr/bin/wget", "-q", "-O","/space/WebPages/images/$pid-$count.gif", "$url");
                system("/usr/bin/mogrify", "-flip","/space/WebPages/images/$pid-$count.gif");
                print "$pid-$count.gif\n";

        else {
                print "$_\n";;
Then the internet looks like this!
And if you replace flip with -blur 4 you get the blurry-net

Funny is it :P crap the users whom illegally use your wifi...Hope this helps

Source :

Read more ...

Google recurit process

Saturday, 21 September 2013

The following info graphic helps you to know how Google recruit their workers

Some Useful resources which can be used during preparation were :

Great websites for Coding / Quant / Puzzle-based Interviews

CareerCup This is a very important site for software engineering interviews. It has tons of questions categorized by companies. The community is very active and you will definitely find the most recently asked questions for top companies like Google, Microsoft, Facebook etc.

GeeksforGeeks An awesome website which contains very good articles on various CS concepts and also interview experiences of major CS companies.

CSE Blog Very useful for cracking Quant Finance interviews.

TechInterview Contains the most commonly asked puzzles. Make sure that you glance through all the puzzles on this one, you might get lucky!

Gurmeet Manku's Blog Another one containing many general puzzles and CS puzzles.

Leetcode Has some great problems and it's solutions. Also has a list of commonly asked coding questions.

Hacking a Google Interview This is a course designed at MIT specially focused on cracking coding interviews of top CS companies like Google, Facebook, Apple. The content is basic but very neat and to the point.
Read more ...

NTLDR is missing error

Wednesday, 11 September 2013
Hi Dear visitor 

  Recently i came across one problem while installing the xp ,let me illustrate how i got fixed it :

1. Symptoms of the problem

When computer is powered up, an error message "NTLDR is missing
Press Ctrl+Alt+Del to restart" appears (white-on-black letters in text mode and blinking cursor):
Boot Problem - NTLDR is missing

2. Normal boot sequence

Normally Windows XP boots as shown below:
Normal boot sequence of Windows XP
  1. BIOS loads 1st sector from HDD (Master Boot Record), verifies 55 AA signature and transfers control to Master Boot Record.
  2. Master Boot Record scans partition table for active partition, then it loads 1st sector from active partition, verifies 55 AA signature, and transfers control to Boot Sector.
  3. Boot Sector loads 15 additional sectors from the beginning of disk (Volume Boot Record) and transfers control to first additional sector of VBR.
  4. Volume Boot Record loads NTLDR file from root directory of boot partition into the memory and transfers control to it.
  5. NTLDR loads Boot.ini text file and displays boot menu. NTLDR is able to set safe mode boot flag per explicit user request. But normally, it loads ntoskrnl.exe, hal.dll and drivers according to list in the registry (normal boot) or hiberfil.sys (resume from hibernation). Then control is transferred to ntoskrnl.exe or resume point in the memory dump.

3. Defect in the boot sequence which leads to NTLDR is missing error

Defect in the boot sequence which is a reason for 'NTLDR is missing' error is shown below:
Reason for NTLDR is missing error
  1. BIOS loads 1st sector from HDD (Master Boot Record), verifies 55 AA signature and transfers control to Master Boot Record.
  2. Master Boot Record scans partition table for active partition. There is one active partition, so Master Boot Record loads 1st sector from active partition (Boot Sector), and transfers control to it.
  3. Boot Sector loads the rest of Volume Boot Record and VBR tries to find NTLDR at the root directory of boot partition but fails because "NTLDR" file does not exist or not readable.
  4. The rest of usual boot events does not happen.

4. How to fix NTLDR is missing error

1) Download EBCD and burn it to CD/DVD according to the instructions, then set up your BIOS to boot from CD. You need full EBCD version to actually write changes to the disk, but it's recommended to try demo version first to make sure  there are no hardware incompatibilities.
2) Boot EBCD:
Fix NTLDR is missing with EBCD - Main Menu
3) Run File Manager from the main menu:
Fix NTLDR is missing with EBCD - File Manager Started
4) Press Alt+F1 and choose your system disk with installed Windows XP from the menu (use UP and DOWN arrow keys and ENTER):
Fix NTLDR is missing with EBCD - Choosing Windows XP system disk
5) In this example, NTLDR file is missing from system disk. If it exists in your environment, delete it (set cursor to the file using arrow keys UP and DOWN and then press F8). If NTLDR file is not deleteable, then rename it (for example, to NTLDR.OLD by pressing F6 key):
Fix NTLDR is missing with EBCD - Checking non-existence of NTLDR file
6) Insert Windows XP installation CD to your CD/DVD drive and press Alt+F2. Choose your CD/DVD drive from the menu using UP and DOWN arrow keys:
Fix NTLDR is missing with EBCD - Choosing Windows XP installation disk
7) Press ENTER:
Fix NTLDR is missing with EBCD - Reading Windows XP installation disk
8) Press TAB key to switch input focus to the right panel and navigate to I386 folder using UP and DOWN arrow keys, then press ENTER to enter that folder:
Fix NTLDR is missing with EBCD - Navigating to I386 folder
9) Using PAGE UP, PAGE DOWN keys and arrow keys (UP and DOWN) please navigate to the NTLDR file:
Fix NTLDR is missing with EBCD - Searching for NTLDR in I386 folder
10) Press F5 to copy NTLDR to the left panel. Confirm with ENTER key:
Fix NTLDR is missing with EBCD - Restoring NTLDR on the system disk
11) NTLDR should appear on the left panel. Make sure it is there and press F10, ENTER to exit EBCD File Manager:
Fix NTLDR is missing with EBCD - Verifying NTLDR is restored on the system disk
12) Choose Mount & Boot Center in the main menu:
Fix NTLDR is missing with EBCD - Running Mount and Boot Center from EBCD main menu
13) Wait:
Fix NTLDR is missing with EBCD - Waiting for Mount and Boot center to initialize
14) Please make sure that radio button "called by BIOS" is selected for your the bootloader of your main OS. Then click the OK button:
Fix NTLDR is missing with EBCD - Verifying NTLDR is called by BIOS
15) "NTLDR is missing" boot problem should be fixed now. Choose 'Reboot' in the EBCD main menu:
Fix NTLDR is missing with EBCD - NTLDR is missing problem is fixed, rebooting
Please note: Mount & Boot Center verifies entire boot path from BIOS to the OS boot loader, so other boot problems may be automatically fixed at this point.

Read more ...

Some Unix Distros which we are not aware

Wednesday, 4 September 2013

Many of us were aware of Unix distros but check out whether you have heard about this ?

Unix is the operating system upon which the Internet was invented.  Development of Unix originated in the late 1960s and early 1970s as a joint venture between General Electric, AT&T Bell Laboratories, and the Massachusetts Institute of Technology.  Since then, the popularity of Unix grew significantly due to support from the University of California Berkeley and other universities, and continues to gain popularity today due to its long history of flexibility coupled with solid reliability.
Although pure Unix is centred around the command line interface (also commonly referred as "the shell"), GUI (Graphical User Interface) overlays (such as Xwindows and NextStep) are becomming increasingly common as more software designers are catering to end-user demands.
We hope to include links to all Unix flavours (and very commonly with "flavour" mis-spelled as in "Unix flavors" or "flavors of Unix") in alphabetical order, along with a short summary of what sets them apart from the others.

[AIX logo]AIX (IBM)
AIX is an open, standards-based operating system that conforms to The Open Group's Single UNIX Specification Version 3.  It provides fully integrated support for 32-bit and 64-bit applications, and is backed by IBM who have broad experience in providing solutions to businesses of every size, in every industry, in every corner of the world, for which IBM has an excellent reputation for service and support.

[Amoeba logo]Amoeba
Amoeba is a powerful microkernel-based system that turns a collection of workstations or single-board computers into a transparent distributed system.  It has been in use in academia, industry, and government since the early 2000s, and runs on the SPARC (Sun4c and Sun4m), the 386/486, 68030, and Sun 3/50 and Sun 3/60 architectures.  With networking, it is often used to form a powerful processor pool for research in distributed and parallel operating systems, runtime systems, languages, and applications.

[Aros mascot]Aros
The AROS Research Operating System is a lightweight, efficient and flexible desktop operating system, designed to help you make the most of your computer.  It's an independent, portable and free project, aiming at being compatible with AmigaOS at the API level (like Wine, unlike UAE), while improving on it in many areas.  The source code is available under an open source license, which allows anyone to freely improve upon it.

[AS/400 logo]AS/400 (IBM)
In 1988 IBM introduced the AS/400 Operating System which was designed to run on accompanying AS/400 mini-mainframe hardware.  Some notable features were 128-bit address pointers and TIMI, a CPU-neutral instruction set that is very similar in concept to byte codes in modern Java Virtual Machine technology.

[DesktopBSD logo]DesktopBSD
DesktopBSD aims at being a stable and powerful operating system for desktop users.  It combines the stability of FreeBSD, the usability and functionality of KDE, and the simplicity of specially developed software to provide a system that's easy to install and use.

[DragonFlyBSD logo]DragonFlyBSD
DragonFlyBSD is a free Unix-like operating system created as a fork of FreeBSD v4.8.  It was started with the belief that the methods and techniques being adopted for threading and symmetric multiprocessing in FreeBSD v5.x would lead to a poorly performing system that would be very difficult to maintain.

[FreeBSD logo]FreeBSD
FreeBSD is a free, advanced operating system for x86 compatible, Alpha/AXP, IA-64, PC-98 and UltraSPARC architectures.  It is derived from BSD, the version of UNIX developed at the University of California, Berkeley.  It is developed and maintained by a large team of individuals.  Additional platforms are in various stages of development.

[HP logo]HP-UX
HP-UX is Hewlett-Packard's implementation of Unix that runs on their PA-RISC range of processors as well as Intel's Itanium processor.  Earlier versions also ran on the HP 9000 Series 200, 300, and 400 computer systems based on the Motorola 68000 series of processors, as well as the HP 9000 Series 500 computers based on HP's proprietary FOCUS processor architecture.

[Inferno logo]Inferno
Inferno® is a compact operating system designed for building distributed and networked systems on a wide variety of devices and platforms.  With many advanced and unique features, Inferno puts an unrivalled set of tools into your hands.  The 4th edition is available as Free Software, on similar license terms to that of xBSD. Inferno can run as a user application on top of an existing operating system, as a web browser plug-in, or as a stand alone operating system.  Each Inferno system presents an identical environment to the applications, irrespective of the underlying host OS or architecture, allowing the developer to work with a truly homogeneous environment across multiple different platforms.

[Irix logo]Irix (SGI)
The IRIX operating system is the leading technical high-performance 64-bit operating system based on industry-standard UNIX.  Since the 1980s SGI has been designing scalable platforms based on the IRIX operating system to connect technical and creative professionals to a world of innovation and discovery.

[LUnix logo]LUnix:  Little Unix for the Commodore 64
LUnix is an experimental operating system for the Commodore 64 and Commodore 128 without additional hardware.  The Commodore 64 has 64 kB of RAM and an 8-Bit CPU running at 1MHz.  The main features of LUnix are its UNIX-like environment and command shell, multi-tasking, and multi-session capabilities.  LUnix is free software. [Commodore 64 logo]The Commodore 64 was the first mainstream personal computer (promoted as a "home computer" in the early 1980s) which reached an international level of sales that, to date (year 2009), no other single model of personal computer has ever come close to achieving (this accomplishment deserves special mention because this computer was of excellent quality in both its design and its massive manufacturing processes).

[MicroBSD logo]MicroBSD
MicroBSD is currently developed by individuals from Bulgaria.  This new distro will get some of the ideas from the old MicroBSD project and will add specific Bulgarian localization.  We will add improvment in several areas security, user interface and easy setup.

[MidnightBSD logo]MidnightBSD
MidnightBSD is a new BSD-derived operating system developed with desktop users in mind.  It includes all the software you'd expect for your daily tasks - eMail, web browsing, word processing, gaming, and much more. With a small community of dedicated developers, MidnightBSD strives to create an easy-to-use operating system everyone can use, freely.  Available for Intel x86, AMD64, SPARC, and as Virtual Machines.

[Minix mascot]Minix
MINIX 3 is a new open-source operating system designed to be highly reliable, flexible, and secure.  It is loosely based somewhat on previous versions of MINIX, but is fundamentally different in many key ways.  MINIX 1 and 2 were intended as teaching tools; MINIX 3 added the new goal of being usable as a serious system on resource-limited and embedded computers and for applications requiring high reliability. The Linux kernel was based on MINIX, hence it is said that Linux has its roots here.

[MirOS logo]MirOS
MirOS BSD is a secure operating system from the BSD family for 32-bit i386 and sparc systems.  It is based on 4.4BSD-Lite (mostly OpenBSD, some NetBSD).  The MirPorts Framework is a portable ports tree to facilitate the installation of additional software.  The project also releases some portable software.

[NetBSD logo]NetBSD
NetBSD is a free, secure, and highly portable Unix-like Open Source operating system, developed and supported by a large and vivid international community who make it available for many platforms, from 64-bit Opteron machines and desktop systems to handheld and embedded devices.  Its clean design and advanced features make it excellent in both production and research environments, and it is user-supported with complete source code.  Many well-known applications are included in The NetBSD Packages Collection, which greatly simplifies the installation and management of major and minor open source software.

[OpenBSD mascot]OpenBSD
OpenBSD is a free, multi-platform BSD-based UNIX-like operating system created as a fork of NetBSD.  Emphasis is in portability, standardization, correctness, proactive security, and integrated cryptography.  OpenBSD supports binary emulation of most programs from SVR4 (Solaris), FreeBSD, Linux, BSD/OS, SunOS, and HP-UX.

[OpenSolaris logo]OpenSolaris (Sun)
OpenSolaris is an open source Unix-like platform, poised for the development of your next generation applications due to their focus on reliability, all backed by world class support from Sun.  OpenSolaris also includes unique features like the TimeSlider, ZFS as the default filesystem, enhanced Image Packaging System (IPS), COMSTAR, DTrace enabled packages for extreme observability and performance tuning, D-Light, and many more.

PC-BSD is a free operating system that was designed with ease-of-use in mind.  Like any modern operating system, you can listen to your favorite music, watch your movies, work with office documents, and install your favorite applications with a setup wizard and just a few clicks of the mouse.

[Plan 9 mascot (Glenda)]Plan 9 (Bell Labs)
Plan 9 from Bell Labs is a research system developed at Bell Labs starting in the late 1980s.  Its original designers and authors were Ken Thompson, Rob Pike, Dave Presotto, and Phil Winterbottom.  They were joined by many others as development continued throughout the 1990s to the present.

[Plurix logo]Plurix
Plurix is a native high-speed Operating System for PC clusters.  Its DSM storage can directly support network computing, intranets, and multimedia tele-co-operation.  An optimistic transaction scheme coupled with restartable transactions automatically guarantees consistency of shared data structures, relieving application programs from this responsibility. Java objects are kept in DSM (Distributed Shared Memory) and are easily accessible from authorized workstations.  Combining object-oriented methodology, restartable transactions, and DSM, we gain ease of use and simplicity without sacrificing speed.

[PureDarwin logo]PureDarwin (Apple)
PureDarwin is the Open Source POSIX-compliant operating system from Apple that forms the basis for MacOS X, released by Apple Inc. in 2000.  It is composed of code developed by Apple, as well as code derived from NEXTSTEP, FreeBSD, and other free software projects.  Darwin forms the core set of components upon which Mac OS X and iPhone OS are based, and is compatible with the Single UNIX Specification version 3 (SUSv3) and POSIX UNIX applications and utilities.

[QNX logo]QNX Neutrino RTOS
The QNX real-time OS technology focuses on mission-critical applications -- everything from medical instruments and internet routers to telematics devices, 9-1-1 emergency call centers, process control applications, and air traffic control systems.

[RMoX logo]RMoX
RMoX is an experimental process oriented operating system for Pentium based hardware, written in the occam-pi programming language.  It is intended to be used as a Scalable, Compositional Operating-System for Commodity Platforms.

[RoFreeSBIE logo]RoFreeSBIE
RoFreeSBIE is a Live DVD/CD installable on hark disk.  Its goal is to promote FreeBSD and make it an educational tool and a mobile desktop too.

[SkyOS logo]SkyOS
The Sky Operating System, or SkyOS, is an Operating System written for x86-based personal computers.  SkyOS was created in 1996 by Robert Szeleney as a small Boot Loader, then over the next 8 years SkyOS evolved into a full-featured, modern operating system, with a goal to be the easiest to use desktop operating system available for the average computer user. Although this project was halted for a while due to concerns with the increasing challenges of keeping up with the latest advances in hardware (which is a massive undertaking for any Operating System), it appears that SkyOS has been continued with NetBSD as a drop-in kernel (and the possibility of also using other Unix flavours or Linux distributions as drop-in kernels), which easily addresses the challenge of supporting current hardware.

[Solaris logo]Solaris (Sun)
Solaris is Sun's UNIX operating system, known long ago as SunOS (which had its roots in BSD).  The newer versions are far more SYS-V based with some SVR4 features, along with OpenWindows 3.0.

[Stratus VOS logo]Stratus OpenVOS
Stratus servers running the OpenVOS operating system (which was recently known as VOS) have long been valued for their ability to deliver industry-leading uptime due to Stratus fault-tolerant architecture, which was designed to provide maximum availability and performance even in the face of failure and reconfiguration.  VOS is POSIX-compliant and provides industry standard development tools including gcc, g++, gdb, bash shell, Perl, and many others, which are beneficial to Unix/Linux programmers because it means they can be productive immediately. The previous product, Stratus VOS (, seems to have disappared although many references still remain on their FTP host via HTTP:

[UnixWare logo]UnixWare (SCO)
UnixWare is a Unix operating system, originally released by Univel, a jointly owned venture of AT&T's Unix System Laboratories (USL) and Novell Inc., is now maintained by The SCO Group (SCO).  UnixWare is primarily marketed as a reliable, scalable, secure Unix server.

[WindRiver logo]WindRiver VxWorks
Built on a highly scalable, deterministic, hard real-time kernel, backed by a 25-year track record, VxWorks enables companies to scale and optimize their run-time environment using only the specific technologies required by their device.  From the smallest footprint requirement to the highest performance level, WindRiver VxWorks gives developers the flexibility to build their optimal solution quickly and easily while meeting cost, quality, and functionality requirements.

[z/OS logo]z/OS (IBM)
IBM's z/OS is a highly secure, scalable, high-performance enterprise operating system on which to build and deploy Internet and Java-enabled applications, providing a comprehensive and diverse application execution environment.
Read more ...