The Linux Command Line Chapter 9

Slides:



Advertisements
Similar presentations
Linux Users and Groups Management
Advertisements

Linux File & Folder permissions. File Permissions In Ubuntu, files and folders can be set up so that only specific users can view, modify, or run them.
File Security. Viewing Permissions ls –l Permission Values.
Chapter 10 File System Security. Security Policies security policies are doors maintain a balance between total access and total security UNIX has two.
Web Pages Publishing your page on ASUWlink. Unix Directory Commands ls –la –will show all directories and files –will show directory and file permissions.
Linux+ Guide to Linux Certification, Second Edition
User Accounts and Permissions Chapter IV / Part II.
CS 497C – Introduction to UNIX Lecture 15: - File Attributes Chin-Chih Chang
Lecture 02CS311 – Operating Systems 1 1 CS311 – Lecture 02 Outline UNIX/Linux features – Redirection – pipes – Terminating a command – Running program.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
Getting Started with Linux Linux System Administration Permissions.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Embedded Programming and Robotics Lesson 13 Basic Linux 1.
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Filesystem Hierarchy Standard (FHS) –Standard of outlining the location of set files and directories on a Linux system –Gives Linux software developers.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
EMT 2390L Lecture 5 Dr. Reyes Reference: The Linux Command Line, W.E. Shotts.
Workbook 4 User & Group Permissions RH030 Linux Computing Essentials.
PacNOG 6: Nadi, Fiji UNIX ™/ /Linux Permissions Hervey Allen Network Startup Resource Center.
Privileges: who can control what Introduction to Unix June 16, 2009 Papeete, French Polynesia Hervey Allen.
Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.
CSCI 330 The UNIX System Unit V Permissions. all access to directories and files is controlled UNIX uses discretionary access control (DAC) model each.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Tony Kombol.  man  on-line user manual  man command_you_want_info_on  type q to exit  examples:  for ls (list directory) ▪ man ls  for cp (copy)
File System Security ls -l. First Columm d = directory l = symbolic link b = block special file c = character special file p = fifo (or named pipe) special.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
Linux Filesystem Management
Privileges: who can control what
Permissions: who can control what Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA
SYSTEM ADMINISTRATION PART I by İlker Korkmaz and Kaya Oğuz
Chapter 8 File Security.
BIF703 File Permissions.
The Linux Command Line Chapter 14
Privileges: who can control what
Linux Users and Groups Management
Systems Administration CSCI Fall 2016
The Linux Command Line Chapter 16
The Linux Command Line Chapter 12
The Linux Command Line Chapter 2
The Linux Command Line Chapter 29
The Linux Command Line Chapter 10
The Linux Command Line Chapter 18
The Linux Command Line Chapter 24
The Linux Command Line Chapter 11
The Linux Command Line Chapter 3
Security and File Permission
UNIX Commands A Brief Look at Common UNIX Commands.
The Linux Command Line Chapter 28
Engineering Secure Software
UNIX Commands A Brief Look at Common UNIX Commands.
The Linux Command Line Chapter 17
Working with Mac OS and Linux
The Linux Command Line Chapter 4
Chapter Introduction 3.2 The UNIX Model of Ownership
UNIX Commands A Brief Look at Common UNIX Commands.
The Linux Command Line Chapter 14
In the last class,. ls –l command. seven fields
Adding New Users.
1.3 Given a scenario, apply appropriate Microsoft command line tools
UNIX Commands A Brief Look at Common UNIX Commands.
Ustaza. Imtithal Alnour Saeed & Ustaza Sana AL-Hwishel
The Linux Command Line Chapter 3
The Linux Command Line Chapter 4
The Linux Command Line Chapter 12
The Linux Command Line Chapter 11
The Linux Command Line Chapter 24
Presentation transcript:

The Linux Command Line Chapter 9 Permissions Prepared by Dr. Reyes, New York City College of Technology

Ownership Files permissions are divided in three levels: owner, group, everybody ls -l id - command used to find out information about your identity

Change Mode chmod – command to change the mode or permissions of a file or directory Permissions represented using octal notation > foo.txt ls -l foo.txt chmod 600 foo.txt chmod 777 foo.txt

Changing Identities su - command that allows you to log in as another user su – su – username sudo - command that allows you to execute commands as a different user, usually a superuser in a controlled way sudo chown - command used to change the owner of a file passwd - command used to change the password