Linux Systems-User management-Concepts and principlesA related concept1/etc/passwd file Format: User name: Password bit: User identification number: Group identification number: Comment and other related description: Host directory: Default shell,
Process vs ProgramProgram: Binary Program Files + library files + profiles + Help filesStaticProcess: A copy of a program, an instance of program executionDynamic (with life cycle)User RightsUser group: User container and can associate permission
Chapter IIFirst, the Linux file system1. Basic ConceptsThe Linux file system is a single tree structure, with the root "/", the file name is case sensitive, except "/" are available characters, the file name with "." Starts as a hidden file.2.
User and file permissionsUser:User root is the Super administrator of the system, and what really makes him an administrator is notUser name "root", but its UID number.UID: Each user has a corresponding UID number, just like our ID numberSuper User :
Linux is a system with a very strict user rights management, Ubuntu as the most popular desktop distribution, provides a simple and easy-to-use graphical interface tools to manage users, but command-line tools are often more powerful, the use of
Classification of Linux usersDepending on the location of the account: local account, remote account. Ldap,nisBased on the function of the account: Superuser (Root) uid:0Normal User:System User UID: (RHEL7) 1-999 (rhel6 1-499)Local user UID: (RHEL7)
Unit V########################## User Action command #################(i) use of IDID user name # # View user InformationId-u # # # user uid(userid)-G # # user gid(initial group ID, only one) -A # # user All information -G # # User ID for all
We know when we use the mouse to click, or enter a command, the system will play to help us complete a task, then when we click on a link, the system is how to know to complete the corresponding operation? This is done through the shell.So what is a
Permission model:
User
UID:/ETC/PASSWD.Password:/etc/shadow.User Category:Administrator:ID number is 0. Normal User:ID number is 1-65535. System User: ID number is 1-499.General User: ID number is 500-60000.
User groups
Configuration fileUser Information file:/etc/passwdOne line with 7 messages man 5 passwdRoot:x:0:0:root:/root:/bin/bashUser name: Password bit: User uid: Default group GID: Description information: default directory after user login: command
User-managed configuration files
User Information file:/etc/passwd
Password file:/etc/shadow
User group file:/etc/group
User group password file:/etc/gshadow
User profile:
/etc/login.defs
/etc/default/useradd
New user information
SQLite is a cross-platform relational small database, very convenient, suitable for embedded devices, for the SQLite database, This database is formed in the form of a file (such as data.db); a database is made up of tables, where multiple tables
I. Establishment of users and permissionsSU user name Switch user, if the root user switch other users, do not need to enter a password. exit to switch back to the previous userWhat are the types of Linux operating system users? administrator: Root
The third Lesson IV speaking 03_04_linux user and authority detailed1. Libraries and processes are siblings. Process can get CPU time, memory address, call various files2. Permissions: Defines the access capabilities of computer resources and
1. File or Directory PropertiesThe properties of a Linux file or directory include: The file or directory's node, kind, permission mode, number of links, the user and user group to which it belongs, the time recently accessed or modified, and so on.
The Linux operating system is a multi-user operating system that allows multiple users to log on to the system and use resources at the same time. Each user's files, processes, tasks, and work environment are differentiated according to the account,
I. Account Overview 1, account the real Linux operating system is a multi-user operating system, which allows multiple users to log on to the system at the same time, using system resources. The system differentiates each user's files, processes,
The content originates from the people's post and Telecommunications press "Linux command Application big dictionary"tell 729 commands, 1935 examplesLearn about the Linux system's reference books, desk book, encountered the command or command not
Unit Five########################## User Action command #################(i) use of IDID User name # # View user Information ID - u # # user uid(userid) - G # # user gid(initial group ID, only one) -A # # users All information - G # # # User IDs
This article describes the PHP Sina Weibo login interface usage. Share to everyone for your reference. The specific analysis is as follows:
Before doing microblogging landing is required to apply to the app KEY and app Secret, this application
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.