SlideShare una empresa de Scribd logo
1 de 50
Lesson 9-Setting and Using Permissions
Overview  ,[object Object],[object Object],[object Object],[object Object]
Overview  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Describing File Permissions  ,[object Object],[object Object],[object Object]
Describing File Permissions  ,[object Object],[object Object],[object Object],[object Object]
Examining the Permissions Field  ,[object Object],[object Object],[object Object],[object Object]
Examining the Permissions Field  ,[object Object],[object Object],[object Object]
Examining the Permissions Field  Permission Field For Users
Examining the Permissions Field  ,[object Object],[object Object],[object Object],[object Object]
Employing Read and Write  Permissions  ,[object Object],[object Object]
Changing Permissions for a File to Read Only  Assigning Read Only Permission
Changing Permissions for a File to Write Only  Assigning Write Permission
Using Execute Permissions with a  File  ,[object Object],[object Object],[object Object]
Using Execute Permissions with a  File  ,[object Object],[object Object],[object Object]
Using Execute Permissions with a  File  ,[object Object],[object Object],[object Object]
Changing File Permissions Using Mnemonics  ,[object Object],[object Object]
Changing File Permissions Using Mnemonics  ,[object Object],[object Object]
Assigning Specific Permissions  Assigning All Permissions to All Users
Assigning Specific Permissions  Assigning Specific Permissions to Specific Users
Adding and Deleting Permissions  Denying Specific Permission to Specific Users
Changing File Permissions  Numerically  ,[object Object],[object Object],[object Object]
Changing File Permissions  Numerically  ,[object Object],[object Object],[object Object]
Changing File Permissions  Numerically  Numerical Combination of Permissions
Changing File Permissions  Numerically  Permission Values
Changing File Permissions  Numerically  Basic File Permissions
Changing Permissions for Group and Other  ,[object Object],[object Object]
Exploring the Effect of Granting Different Permissions  ,[object Object],[object Object],[object Object]
Modifying Directory Permissions  ,[object Object],[object Object],[object Object]
Modifying Directory Permissions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using Permissions to Control Directory Access  ,[object Object],[object Object],[object Object]
Using Permissions to Control Directory Access  ,[object Object],[object Object]
Listing the Files in a Directory  ,[object Object],[object Object],[object Object]
Denying Write Permissions for a Directory  ,[object Object],[object Object]
Examining the Need for Execute Permissions  ,[object Object],[object Object],[object Object]
Examining the Need for Execute Permissions  ,[object Object],[object Object],[object Object]
Changing Permissions for Files in all Subdirectories  ,[object Object],[object Object]
Identifying Other System  Permissions  ,[object Object],[object Object],[object Object],[object Object]
Identifying Other System  Permissions  ,[object Object],[object Object]
[object Object],[object Object],Identifying Other System  Permissions
Identifying Other System  Permissions  ,[object Object],[object Object]
Setting Permissions when Files and Directories are Created  ,[object Object],[object Object],[object Object],[object Object]
Setting Permissions when Files and Directories are Created ,[object Object],[object Object]
Examining the Default Permissions  ,[object Object],[object Object],[object Object]
Examining the Default Permissions  ,[object Object],[object Object],[object Object]
Specifying Default Permissions for Directories with umask  ,[object Object],[object Object]
Specifying Default Permissions for Directories with umask  Umask Values
Examining the Impact of umask on Other Operations  ,[object Object],[object Object],[object Object]
Examining the Impact of umask on Other Operations  ,[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

101 4.6 create and change hard and symbolic links
101 4.6 create and change hard and symbolic links101 4.6 create and change hard and symbolic links
101 4.6 create and change hard and symbolic links
Acácio Oliveira
 

La actualidad más candente (19)

intro unix/linux 05
intro unix/linux 05intro unix/linux 05
intro unix/linux 05
 
Os lab manual
Os lab manualOs lab manual
Os lab manual
 
Linux commands
Linux commands Linux commands
Linux commands
 
Unix commands in etl testing
Unix commands in etl testingUnix commands in etl testing
Unix commands in etl testing
 
Linux Introduction (Commands)
Linux Introduction (Commands)Linux Introduction (Commands)
Linux Introduction (Commands)
 
Commands and shell programming (3)
Commands and shell programming (3)Commands and shell programming (3)
Commands and shell programming (3)
 
Perintah dasar terminal kali linux
Perintah dasar terminal kali linuxPerintah dasar terminal kali linux
Perintah dasar terminal kali linux
 
intro unix/linux 04
intro unix/linux 04intro unix/linux 04
intro unix/linux 04
 
intro unix/linux 03
intro unix/linux 03intro unix/linux 03
intro unix/linux 03
 
Unix files
Unix filesUnix files
Unix files
 
Basic Linux day 2
Basic Linux day 2Basic Linux day 2
Basic Linux day 2
 
Unix
UnixUnix
Unix
 
Course 102: Lecture 2: Unwrapping Linux
Course 102: Lecture 2: Unwrapping Linux Course 102: Lecture 2: Unwrapping Linux
Course 102: Lecture 2: Unwrapping Linux
 
Command
CommandCommand
Command
 
101 4.6 create and change hard and symbolic links
101 4.6 create and change hard and symbolic links101 4.6 create and change hard and symbolic links
101 4.6 create and change hard and symbolic links
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Comp practical
Comp practicalComp practical
Comp practical
 
Course 102: Lecture 12: Basic Text Handling
Course 102: Lecture 12: Basic Text Handling Course 102: Lecture 12: Basic Text Handling
Course 102: Lecture 12: Basic Text Handling
 
Directory Commands - R.D.Sivakumar
Directory Commands - R.D.SivakumarDirectory Commands - R.D.Sivakumar
Directory Commands - R.D.Sivakumar
 

Similar a intro unix/linux 09

Linux files and file permission
Linux files and file permissionLinux files and file permission
Linux files and file permission
U.P Police
 
Lession1 Linux Preview
Lession1 Linux PreviewLession1 Linux Preview
Lession1 Linux Preview
leminhvuong
 
Unit 4 user and group
Unit 4 user and groupUnit 4 user and group
Unit 4 user and group
root_fibo
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
blusmurfydot1
 

Similar a intro unix/linux 09 (20)

OS Unit IV.ppt
OS Unit IV.pptOS Unit IV.ppt
OS Unit IV.ppt
 
File permissions
File permissionsFile permissions
File permissions
 
Linux files and file permission
Linux files and file permissionLinux files and file permission
Linux files and file permission
 
Basic Linux
Basic LinuxBasic Linux
Basic Linux
 
Lession1 Linux Preview
Lession1 Linux PreviewLession1 Linux Preview
Lession1 Linux Preview
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.ppt
 
Introduction to linux day3
Introduction to linux day3Introduction to linux day3
Introduction to linux day3
 
Download It
Download ItDownload It
Download It
 
Unit 4 user and group
Unit 4 user and groupUnit 4 user and group
Unit 4 user and group
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
 
File Input/output, Database Access, Data Analysis with Pandas
File Input/output, Database Access, Data Analysis with PandasFile Input/output, Database Access, Data Analysis with Pandas
File Input/output, Database Access, Data Analysis with Pandas
 
Ppt linux
Ppt linuxPpt linux
Ppt linux
 
prateekporwal
prateekporwalprateekporwal
prateekporwal
 
File Access Permission
File Access PermissionFile Access Permission
File Access Permission
 
Licão 04 permissions
Licão 04 permissionsLicão 04 permissions
Licão 04 permissions
 
FILE PERMISSION OR ACCESS MODE
 FILE PERMISSION OR ACCESS MODE FILE PERMISSION OR ACCESS MODE
FILE PERMISSION OR ACCESS MODE
 
Host security
Host securityHost security
Host security
 

Más de duquoi (9)

Troubleshooting CD Burning
Troubleshooting CD BurningTroubleshooting CD Burning
Troubleshooting CD Burning
 
Advanced Bash Scripting Guide 2002
Advanced Bash Scripting Guide 2002Advanced Bash Scripting Guide 2002
Advanced Bash Scripting Guide 2002
 
Astrolog: Switches
Astrolog: SwitchesAstrolog: Switches
Astrolog: Switches
 
Cinelerra Video Editing Manual
Cinelerra Video Editing ManualCinelerra Video Editing Manual
Cinelerra Video Editing Manual
 
Iptables
IptablesIptables
Iptables
 
Ffmpeg
FfmpegFfmpeg
Ffmpeg
 
rosegarden
rosegardenrosegarden
rosegarden
 
intro unix/linux 12
intro unix/linux 12intro unix/linux 12
intro unix/linux 12
 
intro unix/linux 01
intro unix/linux 01intro unix/linux 01
intro unix/linux 01
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

intro unix/linux 09