Http://student.csdn.net/space.php? Uid = 129820 & Do = Blog & id = 40308
* Originally published in "grass-roots" magazine,: http://www.lampbrother.net/grassroots/
In Linux, every common user can change his/her password, which is a reasonable setting.
On the setuid permission in Linux)
1. What is setuid?
We know that when the "Ps" command is executed under the Linux Command Line, all processes in the current system will be listed. In this example, we can see that each process is associated with
Linux under setuid Command!reproducedEvery ordinary user in a Linux system can change their own password, which is a reasonable setting.The problem is: the user's information is saved in the file/etc/passwd, the user's password is saved in the
Setuid function parsing, setuid Function
Before discussing this setuid function, we should first understand the three UID values maintained by the kernel for each process. These three UIDs are the actual user ID (real UID), valid user ID (valid uid),
From: http://blog.chinaunix.net/space.php? Uid = 1877180 & Do = Blog & cuid = 1132108
In Linux, each process has three [4th] user identifiers.
Real uid: real User ID.Saved uid: saved user IDValid uid: valid user IDThe real User ID (real UID) is the
Setuid on shell scripts
Running software as root without requiring a root password is the subject of a number of tutorials on the web, and although it may seem a little bit confusing, it's fairly simple. inevitably, users want to run shell scripts
actual User id:Some articles refer to it as the real user ID, which is the ID when we log on to the UNIX system.
Valid User ID: Defines the rights of the operator. A valid user ID is a property of a process that determines the access to the file
UNIX environment Advanced Programming 8.11 mentioned in the user's actual ID, valid user ID, save the user ID set the concept of the time, I stuck, the internet to find a post, to do a detailed description. Collection of.
7.6 The USER ID of A
Basic file permissions in Linux every file in Linux is associated with multiple permission types. Among these permissions, we mainly deal with three types of permissions: user, user group, and other users (others ). A user is the owner of a file. A
A secure program must minimize privileges to reduce the likelihood of a bug being converted into a security flaw. This article discusses how to minimize privileges by minimizing the privileged modules, the privileges granted, and the effective time
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.