1.Ubuntu Create directory Command format: mkdir [options] directory ... Command features: The mkdir command enables you to create a directory named with the specified name at the specified location. The user who created the directory must have write permissions to the pa
Why is Kerberos and LDAP
LDAP is very effective for storing and retrieving user attributes for AIX users, but using LDAP for authentication still requires the user to provide an AIX password and an AD password. Kerberos supports AIX using the local AD protocol to authenticate users by referencing their Microsoft Windows passwords.
Active
The meaning of directory and file permissions in Linux
The meaning of file permission
R: You can read the specific contents of this document;
W: You can edit the contents of this file, including adding the details of the deleted file;
X: The file has executable permissions-------Note: Here and window is not the same, in win, the file executable
AIX side:Stop NFS Related Services# stopsrc-g NFS0513-044 the Biod Subsystem is requested to stop.0513-044 the RPC.STATD Subsystem is requested to stop.0513-044 the RPC.LOCKD Subsystem is requested to stop.0513-044 the NFSD Subsystem is requested to stop.0513-044 the Rpc.mountd Subsystem is requested to stop.# stopsrc-s Portmap0513-044 the Portmap Subsystem is requested to stop.Add a Linux host address and host name to the /etc/hosts file# vi/etc/host
1. File type
Normal file
Including the user and system of various text files, code files, program files and data files and so on.
Directory
Includes file and subdirectory information, the directory is inverted tree structure.
Special files
Represents physical or logical devices that are stored under the/dev directory.
2, File and
When using the tar command to decompress a non-tar file (in the form of. tgz or tar.gz), the following error is reported:tar:0511-169 A Directory checksum error on media; 0 equal to 64391.Here's how to fix it:Law I,1. First convert the tgz compressed file to tar formatGunzip-s tgz file.tgz = generate File.tar file after execution completes2. Unzip again with the TAR commandTAR-XVF File.tarLaw II,1. Using gzipgzip-d file.tgz = Generate File.tar file af
The purpose of this article is to decide which directory space occupies the most files when disk space is full, so as to analyze the reasons for the lack of space
1, to Xshell or other terminal software through SSH or Telnet login to see the system host
2, through DF-HL (Linux) or Df-g (AIX) to view the overall space occupancy, the most location of the director
-folder Apache permissions Keep/test-folder's Apache permissions Chown-r Www/test-folderchmod 775-r/test-folderassigning groups of test catalogs to developmentChgrp-r Dev/test-folderHere, User1,user2 can only access Test-folder cannot access Product-folderThe following is a list of the actions of users and Groups on Linux1linux Modifying the user and group to which the file belongsUse the Chown command
What ls-al/tmp see today is RWXRWXRWT is surprised what this t is, how is it not X or-? Search for the following discovery:
This t represents the so-called sticky bit.
Sticky bit: This bit can be understood as an anti-delete bit. Whether a file can be deleted by a user depends primarily on whether the group to which the file belongs has write access to the user. Without write permissions, all files in this
[[email protected] bin]# ls-l ls6 -RWXR-XR--. 1 root root 109208 November lsYou can see the command on line 5th, the execution succeeds,You can see whether the file can be executed depending on the X permission of the file.2. Permissions for the Directory2.1 x PermissionsDirectory execution permissions, that is, whether the user CD into the directory, that is,
Tags: pictures of file files Learn notes use Group Ls-ld src httpThe Chmodchmod command is used to modify the permissions of a file or folder.Have studied beforels -l, the first one--has been studied before, and substituting refers to this is a textThe following rw-r--r--is the file's permissionsThe first three bits of rw-are the permissions of the file ownerIntermediate three-bit r--is the permission of th
the group in which the file resides by using the CHGRP group name file name.Use: Ls-ahl | MoreModify the group in which the directory resides: Chgrp root mysrc can change the group in which the directory resides.Now I've changed the group GZ where the MYSRC directory is located to root
Other groups
Except for the owner of the file and the user in t
installation package file.
Iv. the basis of file permissionsIn the Linux file permissions, there are 10 bits in total, the No. 0 bit represents the file type, and the latter 9 bits represent the file permissions.1, about the interpretation of each part of the authority:The first part (第1-3位): A sovereign limit (user permission bit) for the owner (own) to use.Part II (第4-6位): A group of permission bit
definition allows directory browsing, the Web site's folder and file name structure is exposed to hackers. Directory browsing also allows hackers to browse files and master server configuration information, so specifying this permission often poses a security risk. Unless you have sufficient reason to use directory browsing, you should disable it.(2) Set the ins
This lesson mainly explains the permissions of Linux files and directories and how to give permissions, hoping to help everyone understand the Linux rights managementHow to see the video is not clear, you can go to http://www.tudou.com/programs/view/6c6WEsKJz7s/ fullscreen viewing or to http://yunpan.cn/cVSrHAk8ExAd9 access password Aa19 Download the course or visit the official website:www.xinxinedu.orgMob
RWX (1) rwx (2) rwx (3)1: Owner 2: Owning Group 3: other usersR: ReadW: WriteX: ExecuteTable of Contents: R (can see how many things are in the directory) W (can add, remove, and modify the familiar contents of the directory) x (Open Directory)File: R (can view the specific contents of the file) W (can add, delete, and modify the contents of the file, but cannot
1, User and user group concept:1. File owner2. User groups3. UserAfter you log on to Linux as root, execute ls-al and see information about the properties of the file-rw-r--r--, The 1th character indicates that the file is "directory, file or link file, etc.", [d] represents the directory, [-] represents the file, [l] is the connection file. The next character 3 groups represents the
In a Linux system, you can use Setfacl to create files or subdirectories under the directory and inherit permissions from the parent directory.The following root with the ordinary user user1. Under directory/mnt[[emailprotected]mnt]#setfacl-mu:user1:rwxshare //add ower=user1nbsp to the directory, and give rwx the right
The following shows that Tomcat made an error when deleting owner's own document, prompting permission denied.This is because user Tomcat does not have W permissions in the document's parent directory permissions. Although Tomcat is the owner of the document, the deletion of the document is also a modification to the parent d
] vsftpd]#/bin/systemctl restart Vsftpd.service7. Create a group to hold the FTP userGroupadd ftpgroups8. Create an FTP user, and join the Ftpgroups group,/HOME/FTP is the directory you built, does not exist to create auseradd-d/home/ftp/ftptest-g ftpgroups ftptestSet Passwordpasswd ftptestsetting is not allowed for user logonUsermod-s/sbin/nologin FtptestYou can see it's been built.ls/home/ftpFTPN ftptest Restart the VSFTPD service at this moment/bi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.