Đặt quyền cho file trong LINUX
... phải nói là file mới phải chứ!) [root@localhost cgi-bin]$chmod -R 755 * -> đặt quyền "rwxr-x-r-x" cho tất cả các files trong thư mục cgi-bin và các thư mục con của cgi-bin. Tuy nhiên, ... chạy file lamviec! anh sẽ không thể nào chạy được file lamviec bởi vì nó cần truy cập đến file dulieu của huy, mà file này lại không thuộc quyền sở hữu của anh. huy sẽ chmod o+wr cho file dulieu! ... Hack permissions! Đôi khi admin hoặc một số users cẩu thả khi đặt quyền cho các files của họ. Họ đã tự mang họa vào thân mà chẳng hay gì hết!? Hãy xem các ví dụ sau: Tìm tất cả các file thuộc...
Ngày tải lên: 23/08/2012, 11:01
Các hệ thống file trong Linux
... àûúåc sûã dng trong Linux nhû Ext3, Reiserfs, XFS, vâ JFS cố tđnh tin cêåy cao vâ cố khẫ nùng ghi nhúá quấ trịnh thao tấc trïn dûä liïåu (journaling). THÏË NÂO LÂ JOURNALING FILE SYSTEM? Chng ta ... mịnh. HÏÅ THƯËNG FILE REISERFS tûúãng ca viïåc xêy dûång hïå thưëng file Reiserfs xët phất tûâ u cêìu tưëi ûu viïåc lûu trûä cấc file nhỗ vâ tùng tưëc àưå truy cêåp àïën cấc file nây. Reiserfs sûã ... Reiserfs àïí lûu trûä vâ truy cêåp cấc file nhỗ lâ tưëi ûu, vúái tưëc àưå truy cêåp file tùng tûâ 8-15 lêìn vâ dung Hïå àiïìu hânh Linux Cấc hïå thưëng file trong Linux ...
Ngày tải lên: 05/11/2012, 14:39
Cac he thong file trong Linux
... àûúåc sûã dng trong Linux nhû Ext3, Reiserfs, XFS, vâ JFS cố tđnh tin cêåy cao vâ cố khẫ nùng ghi nhúá quấ trịnh thao tấc trïn dûä liïåu (journaling). THÏË NÂO LÂ JOURNALING FILE SYSTEM? Chng ta ... mịnh. HÏÅ THƯËNG FILE REISERFS tûúãng ca viïåc xêy dûång hïå thưëng file Reiserfs xët phất tûâ u cêìu tưëi ûu viïåc lûu trûä cấc file nhỗ vâ tùng tưëc àưå truy cêåp àïën cấc file nây. Reiserfs sûã ... Reiserfs àïí lûu trûä vâ truy cêåp cấc file nhỗ lâ tưëi ûu, vúái tưëc àưå truy cêåp file tùng tûâ 8-15 lêìn vâ dung Hïå àiïìu hânh Linux Cấc hïå thưëng file trong Linux ...
Ngày tải lên: 07/02/2013, 06:51
unit 4 lesson 1: where is your school?( A1, 2)
... Phong. This is his school. Phong’s school is small. It is in the country. This is Thu. This is her school. Thu’s school is big. It is in the city. 1 2 3 4 5 6 7 8 A2. Answer. Then write the answers in ... No, it isn't. 5. Yes, it is. - Write a paragraph: This is Phong. His school is small. It's in the country. This is Thu. Her school is big. It's in the city. - Read it loudly before ... in the exercise book. ( close books ) - play the game as teacher’s requirement. - Ss work in teams 1. Yes, it is. 2. No, it isn't. 3. It is in the country. 4. No, it isn't. ...
Ngày tải lên: 07/07/2013, 01:26
Security Issues in Wireless Systems
... packet is encapsulated in PPP. This packet is then encapsulated in L2TP. UDP header is added to this L2TP packet and is encapsulated in an IP datagram. This IP packet is destined for the Internet ... tunneled using IP. An L2TP access concentrator is the client end of Security Issues in Wireless Systems 337 Figure 12.4 The Point-to-Point Tunneling Protocol (PPTP) standard 12 Security Issues in Wireless Systems The ... developed in response to the increasing use of mobile computers in order to enable computers to maintain Internet connection during their movement from one Internet access point to another. It is important...
Ngày tải lên: 29/09/2013, 21:20
What Is Java?
... into which I am grouping both web and enterprise applications, but the industry is dominated by three primary technologies: • Microsoft Windows .NET • Enterprise Java Technologies • LAMP (Linux ... faster. • Java is interpreted. Java s compiler translates source code into class files of bytecode instructions. A virtual machine examines each instruction and uses that instruction’s meaning to execute ... free, plus Macintosh, Sun, AIX, HP-UX, and any other operating system for which there is a Java virtual machine. The History of Java Java’s abstraction of the underlying operating system, and...
Ngày tải lên: 19/10/2013, 21:15
Installing and Using Endpoint Security Agent for Linux Server Version NGX 7.0 GA
... customized RPM 17 Installing Endpoint Security Agent using RPM 17 Upgrading Endpoint Security Agent using RPM 18 Uninstalling Endpoint Security Agent using RPM 19 Customizing the Endpoint Security Agent ... the installation type 12 Installing using the installation script 13 Uninstalling using the installation script 15 Installing using the Endpoint Security Agent RPM 16 Before you begin 16 Building ... Endpoint Security Agent for Linux provides enterprise endpoint security for Linux users. Use this guide to install and administer Endpoint Security Agent for Linux. This chapter provides the system...
Ngày tải lên: 23/10/2013, 12:15
Writing device drivers in Linux: A brief tutorial
... fclose(PARLELPORT); } Writing device drivers in Linux: A brief tutorial Final application: flashing lights 18 #include < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include ... < ;linux/ kernel.h> /* printk() */ #include < ;linux/ slab.h> /* kmalloc() */ #include < ;linux/ fs.h> /* everything */ #include < ;linux/ errno.h> /* error codes */ #include < ;linux/ types.h> ... io.h. <parlelport initial> = /* Necessary includes for drivers */ #include < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include < ;linux/ kernel.h> /* printk()...
Ngày tải lên: 23/10/2013, 22:15
Java Security Second Edition
... http://www.sdo.net/com/sdo/). 2.5 Policy Files In order to administer the Java sandbox, you list the various permissions we've discussed in a Java policy file. Java virtual machines can use any number of policy files, but ... their own permission classes. Granting this type of permission is obviously somewhat dangerous; this permission is usually given only to classes within the Java API and to classes in Java extensions. 2.3 ... reading an existing file or errors in reading the keystore. 2.5.1.1 Managing policy codebases The initial screen for this tool displays the name of the currently loaded policy file (which is blank...
Ngày tải lên: 09/11/2013, 02:15
Tài liệu Writing device drivers in Linux: A brief tutorial docx
... < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include < ;linux/ kernel.h> /* printk() */ #include < ;linux/ slab.h> /* kmalloc() */ #include < ;linux/ fs.h> ... io.h. <parlelport initial> = /* Necessary includes for drivers */ #include < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include < ;linux/ kernel.h> /* printk() ... which links the call with the file functions it defines. It is invoked, when installing the module, in this way: <memory init module> = int memory_init(void) { int result; /* Registering...
Ngày tải lên: 13/12/2013, 11:15
Tài liệu Adding Users in Linux pdf
... necessary administrative privileges by logging off of the server and logging on again using the Administrator account. Reflection Why is it important that only an administrator is allowed to ... Copyright 2002, Cisco Systems, Inc. Lab 10.2.2: Adding Users in Linux Estimated Time: 20 minutes Objective In this lab, the student will learn how to create user accounts using the Linux Red Hat ... studentA4 B1 instructorB1 instructorB1 Instructor, Windows Computer B2 studentB2 studentB2 B3 studentB3 studentB3 B4 studentB4 studentB4 C1 instructorC1 instructorC1 Instructor, Linux Computer...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Security Threats in Mobile Ad Hoc Network doc
... 5 Security Threats in Link Layer 18 Security Threats in Mobile Ad Hoc Networks 5.3 Summary Most of the link layer attacks in MANET are removed by enhancing the existing protocol or proposing ... in existing protocols. They can be classified into the following categories. 6.1.1 Table-driven In table-driven routing protocol, proactive scheme is used. It means that they maintain consistent ... etc. Chapter 6 Security Threats in Network Layer 22 Security Threats in Mobile Ad Hoc Networks 6.2.2 Routing Cache Poisoning Attack Routing cache poisoning attack uses the advantage of the promiscuous...
Ngày tải lên: 16/01/2014, 16:33
Bạn có muốn tìm thêm với từ khóa: