Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Linux use additional rights     - How to use Android Studio development / debugging Android source code (Linux)

- Linux Getting Started tutorial: Experience Xen Virtual Machine chapter (Linux)

- Linux system started to learn: Teaches you install Fedora 22 on VirtualBox (Linux)

- MNIST presentation and database conversion (Database)

- Using Linux command line and execute PHP code (Programming)

- Each catalog Detailed Linux (Linux)

- C ++, overloading, cover, hide (Programming)

- A summary of Java multi-threaded programming - acquaintance multithreading (Programming)

- To change CentOS7 runlevel (Linux)

- Source code to compile and install MySQL 5.7.9 (Database)

- Summary of Docker mounted directory (Server)

- Linux System Tutorial: How to Check MariaDB server versions (Database)

- Linux shell scripts bubble sort (Programming)

- Scope of variables in Object-C (Programming)

- Use libpq under Ubuntu 14.04 (Linux)

- Android Studio commonly used shortcuts and how to follow the Eclipse Shortcuts (Linux)

- Java Network Programming Internet address lookup (Programming)

- MySQL to recover the data through binlog (Database)

- Three details reflect the Unix system security (Linux)

- Android Notification (Programming)

 
         
  Linux use additional rights
     
  Add Date : 2018-11-21      
         
         
         
  1.SET bit permissions: used to executable program or script file set, which is the main user of SUID represents an increase SET-bit permissions, SGID expressed within a group of users to increase SET-bit access. After the executable file is set SUID, SGID permissions, any user execute the file and obtain the file owner, is a group corresponding to the identity of the account.

Add SET-bit executable file permissions using the chmod command can also be achieved using the u + s, g + s permission modes are used to set the SUID, SGID permission. If you use a digital form, SUID the corresponding octal number is 4, SGID for the octal number is 2, can be "nnnn" in the form of privilege modes, such as "4755" means to set SUID permissions, "6755" means and set SUID, SGID permissions .

File data is mainly used to set special permissions for an additional directory, when the directory is set to the sticky bit permission, even if the user has write access to the directory, you can not delete the directory of other users: 2. The sticky bit permission . Setting directory permissions sticky bit, when using ls to view its properties, permissions to other users at x becomes t.

When using the chmod command to set the directory permissions, + t, -t privilege modes are used to add, remove sticky bit permission. The digital rights mode nnnn The first digit to 1,0, may also be implemented to add, remove sticky bit permission.

Privileged position: suid sgid

[Root @ ocm1 ~] # vim kuqlan.sh

[Root @ ocm1 ~] # ll

total 84

-rw-r - r-- 1 root root 17 Mar 10 12:57 kuqlan.sh

lrwxrwxrwx 1 root root 3 Mar 9 16:58 t.link -> ttt

[Root @ ocm1 ~] # chmod 755 kuqlan.sh

[Root @ ocm1 ~] # ls -al kuqlan.sh

-rwxr-xr-x 1 root root 17 Mar 10 12:57 kuqlan.sh

[Root @ ocm1 ~] # chmod 4755 kuqlan.sh

[Root @ ocm1 ~] # ls -al kuqlan.sh

-rwsr-xr-x 1 root root 17 Mar 10 12:57 kuqlan.sh

[Root @ ocm1 ~] # chmod 2755 kuqlan.sh

[Root @ ocm1 ~] # ls -al kuqlan.sh

-rwxr-sr-x 1 root root 17 Mar 10 12:57 kuqlan.sh

[Root @ ocm1 ~] # chmod 6755 kuqlan.sh

[Root @ ocm1 ~] # ls -al kuqlan.sh

-rwsr-sr-x 1 root root 17 Mar 10 12:57 kuqlan.sh
     
         
         
         
  More:      
 
- Linux Apache server configure to protect system security (Linux)
- How screenshots from the Linux command line (Linux)
- Linux kernel source tree to establish load module hello (Linux)
- BusyBox making the file system (Linux)
- Java reflection Introduction (Programming)
- Iptables principle (Linux)
- Ubuntu users to install the system indicator SysPeek 0.3 (Linux)
- Android main thread message system (Handler Looper) (Linux)
- Java MVC CRUD examples (Programming)
- How to configure MariaDB replication in CentOS Linux (Database)
- Use MySQL optimization of security to prevent misuse of aliases (Database)
- JVM garbage collector and memory allocation strategy (Programming)
- OpenSUSE GPG Comments (Linux)
- How to use the command line ftp upload and download files (Linux)
- Mhddfs: multiple smaller partitions into one large virtual storage (Linux)
- The PostgreSQL database pg_dump command line does not enter a password method (Database)
- Ubuntu under Spark development environment to build (Server)
- MongoDB Learning the notes (Database)
- Ubuntu modify locale problem solving (Linux)
- Install snort intrusion detection system on Debian (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.