Source: http://blog.chinaunix.net/uid-26642180-id-3378119.html
Detailed description of three permissions of set UID, GID, and sticky bit
Each file has an owner, indicating who created the file. At the same time, the file also has a group
RWX permissions of other people in the main group on files1.userdel Delete things are not complete, there will be residues,completely delete [[email protected] ~]# Userdel-r Tomsingle delete [[email protected] ~]# Rm-rf/var/spool/mail/tomThe
Operation on the real machine, restoring the environment[[Email protected] Desktop]# rht-vmctl Reset Classroom[[Email protected] Desktop]# rht-vmctl Reset Server[[Email protected] Desktop]# rht-vmctl Reset DesktopConfigure the following static
User Group Security Settings in Linux
Chmod o-r/etc/passwd // prevent other users from getting information in passwd
Chmod o-r/etc/group // prevent other users from getting information in the group
Chgrp apache/etc/passwd/etc/group // change
Some virtual host security settings in linux-Linux Enterprise Application-Linux server application information. The following is a detailed description. User Group settings
Chmod o-r/etc/passwd // prevent other users from getting information in
Download Ecshop (ecshop_v2.7.3_utf8_release1106) installation package, unzip the upload folder after the FTP to the server/usr/local/html directory, and renamed to Ecshop, in the browser to access the HTTP ://192.168.254.100/ecshop/install/index.php,
Create a user process manually1) New user natasha,uid is 1000,gid to 555, note information is "master"vim/etc/passwdNatasha:x:1000:555:master:/home/natasha:/bin/bash2) Modify Natasha user's home directory for/natasha[Email protected] ~]#
I. Basic authority and attribution1. Access rightsREAD: Allow viewing, displaying directory listingsWrite: Allow modification, allow new, move, delete files or subdirectories in the directoryExecutable: Allow to run programs, switch directories2.
Install and configure DRBD in CentOS 6.5
Lab environment:
(1) Use CentOS6.5
(2) Use the 163 yum source (see below for configuration methods)
(3) Add the same virtual hard disk to the two virtual machines. I use 10 GB
Operating System host name IP
Minus All O user rightschmod o-x/bin/*chmod o-x/sbin/*chmod o-x/usr/bin/*chmod o-x/usr/sbin/*chmod o-x/usr/local/bin/*Give o user the necessary permissionschmod o+x/bin/suchmod O+x/bin/bashchmod o+x/usr/bin/idchmod O+x/bin/grepchmod
experiment 3:unix/linux permissions and file management commands
1. Experimental purposes
Unix/linux permissions and file management commands;
The use of Unix/linux file system;
Other commands related to file system administration. 2, the
This chapter blog related Linux knowledge points
Different points for find versus grep:Find is a file Search command--used to find files in a specified directory, and grep as a text Search command--to search the target file according to a user-
Introduction to special permissions set UIDWhen s this flag appears on the file owner's X permission, such as/usr/bin/passwd the permission state of this file: "-rwsr-xr-x.", this is called the set UID, referred to as suid. So what is the specific
I. Special privilegesIn fact, there are four groups of permission bits, a total of 12, and the use of the umask command to view the anti-mask corresponding to the 12-bit, where the first three bits is the special mask corresponding bits.Three
The installation configuration of Apache, PHP, and MySQL is introduced in the first two sections. The installation of phpMyAdmin is more like the installation of a PHP application. I will install a wiki or CMS system later.
See:
Mac OS X Leopard:
Do you have such a complaint?There is not a week to update the blog, simply say what to do it, mainly the company to arrange docking the interface of a large company, the number of interfaces will be about 10, after docking also need to add to the
1. See what files and directories are in the current directory> ls//list> Ls-al//all list Displays the full file details of the current directory (shown as a list) shows hidden files> ls-l//list Displays the details of the current directory general
SUID to set User IDSGID is set Group ID
SUID
When an executable with a suid bit is executed, the file will run as the owner, meaning that whoever executes the file has the file owner's privileges.
If the owner is root, then the executor has the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.