Linux File Permission forced bit and adventure bit details
In Linux, apart from reading, writing, and executing file permissions, file permissions also have special permissions for forcible bit and adventure bit.
In Linux, the File Permission is as
Linux File Permission forced bit and adventure bit detailsIn linux, apart from reading, writing, and executing file permissions, file permissions also have special permissions for forcible bit and adventure bit.In linux, the File Permission is as
Installation and configuration of DHCP for Linux machines on VirtualBox
Because the DHCP environment should be simulated on the home machine, but due to the limitations of the home machine and network conditions, I finally thought about whether
Configure point-to-point VPN on CentOS
A Traditional VPN (such as OpenVPN and PPTP) is composed of a VPN Server and one or more clients connected to this server. When any two VPN clients communicate with each other, the VPN Server needs to relay the
The chattr and lsattr commands explain the functions of the chattr commands. Some of the functions are supported by the Linux kernel version. If the Linux kernel version is earlier than 2.2, many www.2cto.com functions cannot be implemented.
Redis Research (13)-security and communication protocols, redis research communication protocols
I. Security
Salvatore Sanfilippo, author of Redis, once published the Redis declaration, which mentions Redis to be concise and beautiful. Redis does
Resolving Oracle listener startup errors
1, TNS-12547:
TNS-12547: TNS: lost contactTNS-12560: TNS: protocol adapter errorTNS-00517: Lost contactLinux Error: 104: Connection reset by peer
No 127.0.0.1 localhost is found in/etc/hosts.
Modify/etc/hosts
Chattr usage, chattr
[Root @ localhost tmp] # umask0022
I. chattr usage
1. Create an empty file attrtest and delete it. A message is displayed, indicating that the file cannot be deleted because the hidden file exists.
[Root @ localhost tmp] #
Linux permission management differs greatly from Windows, which is difficult for many Linux users to understand. The importance of permissions is self-evident. This article uses case-based step-by-step explanations to help readers and friends. In
Linux error code list
17:22:22
Category:Linux
# Define eperm 1/* operation not permitted */
# Define enoent 2/* no such file or directory */
# Define esrch 3/* no such process */
# Define eintr 4/* interrupted system call */
#
During Linux security, we made the following steps:
4. Password File
The chattr command adds unchangeable attributes to the following files to prevent unauthorized users from obtaining permissions.
# Chattr + I/etc/passwd# Chattr + I/etc/shadow#
S permission for tcpdump installation and files
Category: Linux Shell356 people read comments (0) collect reportsLinuxPathNetworkSocketUser
1. Install tcpdump. Use the root user to install tcpdump.
Yum install-y tcpdump
Install it in the/usr/sbin
[Original post address: Success. First, take a look at the description of ltrace and strace: ltrace-a library call tracerstrace-trace system CILS and signals below I use a simple example of C and C ++ to demonstrate their usage, using C and C ++ at
Mobile phone dialing * #2846579 # *, enter projectmenu-background settings-log switch-on, you can also set the level, and then restart.
Perform the above steps and execute commands
1. Root permission required (not required for some rom)2. Open
These two commands are used to view and change the file and directory attributes. Compared with the CHMOD command, chmod only changes the read/write and execute permissions of the file, the underlying property control is changed by chattr.
Usage of
Installation and configuration of DHCP for Linux machines on VirtualBox, virtualboxdhcp
Because the DHCP environment should be simulated on the home machine, but due to the limitations of the home machine and network conditions, I finally thought
Linux sticky bit and stickybit
Only the root or owner can delete or rename the file when setting the stick position.
Example:
The default apple group is fruit.
[Root @ titan ~] # Id apple
Uid = 1001 (apple) gid = 1001 (fruit) group = 1001 (fruit)
Accumulate common linux commands and common linux commandsAccumulate common linux commands
Record problems encountered in daily life:
Linux files contain ^ M The shell command tr can be used for removal. The specific command is as follows:
cat -
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.