CentOS command to change the user group (chgrp) to which the file folder belongs
Change the user group to which the chgrp belongs.
It is easy to change the user group of a file. Use chgrp directly. This command is short for change
user identity is through this number, 0 is root, that is, you can modify the test user uid is 0, then the system will consider root and test for the same account. Usually the value range of the UID is 0~65535,0 is the root identification number, 1~499 reserved by the system, as a management account, the ordinary user identification number starting from 500, if w
References:
Http://www.ibm.com/developerworks/cn/aix/library/au-aixuseradmin/
Http://blog.csdn.net/victor1220/article/details/5338331
The user (Group) management method in AIX is the same as that in rhel. It maintains several text files. Compared with commands and parameters, I prefer to modify files.Several files used
/Etc/passwd stores user information.
/Etc/se
The information of the user group in the system is recorded in Etc/group, with: As delimiter, the first column is the group name of the user group, the second column is the user
In the management of Linux, account management is an important part, it is an important component of the Authority control. It is also a very basic part of the Administrator's management of the entire Linux.One, user and group-related configuration files/ETC/PASSWD: User's account information/etc/shadow: User password and associated account settings/etc/
Change the user group to which the chgrp belongs.
It is easy to change the user group of a file. Use chgrp directly. This command is short for Change Group. This makes it easy to remember. However, remember that the name of the user
Excerpt from: http://www.apelearn.com/bbs/forum.php?mod=viewthreadtid=7595extra=page%3D1%26filter%3Dtypeid% 26typeid%3d361./etc/passwdSeparated into 7 fields by:(1) User name rules: uppercase and lowercase letters, numbers, minus signs (not appearing in the first place), dots, and underscores, other characters are illegal(2) x put the password and put it on the/etc/shadow for security reasons.(3) UID (0-4294967294=2^32-2) root uid=0 1-499 system reser
order to avoid the user's actions beyond their rights, called Audits (Accounting).Linux system through authentication, authorization, audit of the user's behavior reasonable management.2. User Management2.1. How the user identifies2.1.1 Computer is easy to recognize is the number, the user of the computer is easy to use a meaningful string, when users log in to
return value of program outputStandard output return value: 0Standard error Output return value: 1-255echo $? To get the return value/dev/null: Device data (data black hole)Can output useless information to/dev/null such as Ls/var >/dev/nullSet-c: Prompt the user before overwritingUsers Groups: Core elements to achieve resource allocationGroups: Containers for users and permissions, easy to manage users with the same permissionsCategories of users:Ad
It is easy to change the user group of a file. use chgrp directly. This command is the abbreviation of changegroup (change user group. This makes it easy to remember. However, remember that the name of the user group to be changed
User group management is divided into two categoriesIf you assign to a group what permissions, then the members will have what permissions1. Private GroupsWhen you create a new user, you specify the group for the user. If not spec
the total number of subdirectories or files in the next level of/var directory.
~]# Find/var-type F wc-l
8. Remove the name of the 10 group with the smallest value in the third field in the/etc/group file.
~]# sort-t ":"-k3/etc/group | head-10 | Cut-d ":"-f1
9. Merge the contents of the/etc/fstab and/etc/issue files into the same content and save them to the
Users, Groups, permissionsPermissions: R, W, XFile:
R: Readable, you can use similar commands such as cat to view the contents of the file;
W: writable, can edit or delete this file;
X: Executable, exacutable, can be at the command prompt as a command to submit to the kernel to run;
Directory:
R: You can perform LS on this directory to list all internal files;
W: Files can be created in this directory;
X: You can switch to this directory using a CD, or you
Introduction to user and group management commands in Linux
Configuration files for users and groups in Linux mainly include passwd, shadow, group, and gshadow. The passwd user saves the user's account information and is readable to any user; The shadow detachment root
passwd file format650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/85/70/wKiom1ejRwfQRV4tAAAQ5srJbQU500.png "title=" 11.png "alt=" Wkiom1ejrwfqrv4taaaq5srjbqu500.png "/>Separated by a colon, divided into 7 segments:Login Name: Login name (WANG)passwd: Password (x)UID: User identification Number (1000)GID: Login Default group number (1000)GECOS: User's full name or commentHome directory: Household
Tags: connection server access Overview UI change modification time red Shel problemI. OverviewLinux is a multi-user, multi-tasking operating system, for Linux systems, because of different roles, the permissions and the tasks completed are different. The user's role is identified by UID and GID, the UID of the user is equivalent to our ID card, the user name is
User Category:Admin: 0System users: 1-499Ordinary users: the researcherGroup Category:Administrators group: 0System Group: 1-499General Group: ResearcherLinux files related to users and groups:/ETC/PASSWD: User's account information/etc/shadow: User password and related acco
The liunx command chown is used to change the owner of a specified file to the specified user or group chown. the user can be a user name or user ID; A group can be a group name or
1.Linux users are divided into ordinary user accounts and Superuser user accounts.
The 2.Linux group accounts are divided into private groups and standard groups. When you create a new user, but do not specify the group to which he belongs, automatically creates a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.