Under various UNIX and Linux operating systems, each file (folder is also considered a file) is read, write, run set permissions.For example, when I use the ls-l command to list file tables, I get the following output:-rw-r--r-- 1 bu users 2254 200
Http://william71.blogbus.com/logs/33484772.html755 on behalf of the user to the file has read, write, execute permissions, the same group of other people have the ability to execute and read, no write permission, the other user's permissions and the
Http://william71.blogbus.com/logs/33484772.htmlUnder various UNIX and Linux operating systems, each file (folder is also considered a file) is read, write, run set permissions.For example, when I use the ls-l command to list file tables, I get the
In unix and linux, the chmod command is used to change the permissions of files and directories. This is a must for unix and linux users to be familiar with many
In unix and linux, the chmod command is used to change the permissions of files and
experiment 3:unix/linux permissions and file management commands
1. Experimental purposes
Unix/linux permissions and file management commands;
The use of Unix/linux file system;
Other commands related to file system administration. 2, the
I. Basic file Permissions 1-1. Modification of basic permissions-rw-r--r---The first "-" indicates the file type (-file, D directory, l soft link file)-rw-r--r--U owner G-owned group O otherswhere R reads, W writes, X executes(1). chmod [option]
User and user groups
Linux is a multi-user, multi-tasking operating system, in order for each user to have more confidential file data, so not see the rights management is more important. Linux file ownership and access authorization are
Many operations on Ubuntu are performed on the terminal. Files managed by the sudo command are owned by the root user, which cannot be changed by the general user. On the graphic interface, you can use the permission options folder in the attribute
Remember: the operations on the affected system may change the existing evidence or lead to the loss of sensitive information!
{Initial response }}
Objective: To obtain the loss-prone data in the system before judicial authentication and replication,
How does an excellent UNIX System Administrator work? Paul Venezia from InfoWorld tries to summarize nine features of excellent UNIX system administrators. Paul is a senior editor and consultant who focuses on Perl, PHP, SQL, FreeBSD, Linux and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.