Http://student.csdn.net/space.php? Uid = 129820 & Do = Blog & id = 40308
* Originally published in "grass-roots" magazine,: http://www.lampbrother.net/grassroots/
In Linux, every common user can change his/her password, which is a reasonable setting.
Linux under setuid Command!reproducedEvery ordinary user in a Linux system can change their own password, which is a reasonable setting.The problem is: the user's information is saved in the file/etc/passwd, the user's password is saved in the
On the setuid permission in Linux)
1. What is setuid?
We know that when the "Ps" command is executed under the Linux Command Line, all processes in the current system will be listed. In this example, we can see that each process is associated with
"Setuid & Setgid"1. Commentary by Setuid and SetgidThe setuid and setgid bits are programs or commands that allow a normal user to run only the root account in the root user's role. For example, we use the normal user to run the passwd command to
Setuid function parsing, setuid Function
Before discussing this setuid function, we should first understand the three UID values maintained by the kernel for each process. These three UIDs are the actual user ID (real UID), valid user ID (valid uid),
From: http://blog.chinaunix.net/space.php? Uid = 1877180 & Do = Blog & cuid = 1132108
In Linux, each process has three [4th] user identifiers.
Real uid: real User ID.Saved uid: saved user IDValid uid: valid user IDThe real User ID (real UID) is the
Special permissions for GNULinux-setuid, setgid, and stickbit
/********************************************************************* * Author : Samson * Date : 01/06/2015 * Test platform: * 3.13.0-24-generic * GNU bash,
Special permissions for GNU Linux-setuid, setgid, stick bit, and-setuidsetgid
/********************************************************************* * Author : Samson * Date : 01/06/2015 * Test platform: * 3.13.0-24-generic *
Article Title: Description of setuid, setgid, and sticky permissions. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
Setuid on shell scripts
Running software as root without requiring a root password is the subject of a number of tutorials on the web, and although it may seem a little bit confusing, it's fairly simple. inevitably, users want to run shell scripts
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.