Coding With Fun
Home Docker Django Node.js Articles Python pip guide FAQ Policy

Chapter 5 User Identity and File Permissions.


May 23, 2021 That's what Linux should learn



Linux is a multi-user, multi-tasking operating system, with good stability and security, behind the scenes to ensure the security of Linux system is a series of complex configuration work. T his chapter details how the owner of the file, the group, and others can read (r), write (w), perform (x), and so on, and how to add, delete, and modify user account information in a Linux system. W e can also use SUID, SGID, and SBIT special permissions to set up system permissions more flexibly to compensate for the lack of general operating permissions on files. H idden permissions add an invisible layer of protection to the system, allowing hackers to view critical log information at most, not modify or delete it. T he Access Control List (ACL) for files further allows a single user, group of users to set special permissions for a single file or directory, ingesting the minimum permissions that a file can have to meet its work needs. This chapter concludes with an explanation of how to use su commands and sudo services to give ordinary users administrator privileges, not only to meet the daily needs of the work, but also to ensure the security of the system.