Đặt quyền cho file trong LINUX

Đặt quyền cho file trong LINUX

Ngày tải lên : 23/08/2012, 11:01
... phải nói là file mới phải chứ!) [root@localhost cgi-bin]$chmod -R 755 * -> đặt quyền "rwxr-x-r-x" cho tất cả các files trong thư mục cgi-bin và các thư mục con của cgi-bin. Tuy nhiên, ... chạy file lamviec! anh sẽ không thể nào chạy được file lamviec bởi vì nó cần truy cập đến file dulieu của huy, mà file này lại không thuộc quyền sở hữu của anh. huy sẽ chmod o+wr cho file dulieu! ... Hack permissions! Đôi khi admin hoặc một số users cẩu thả khi đặt quyền cho các files của họ. Họ đã tự mang họa vào thân mà chẳng hay gì hết!? Hãy xem các ví dụ sau: Tìm tất cả các file thuộc...
  • 4
  • 1.8K
  • 6
Các hệ thống file trong  Linux

Các hệ thống file trong Linux

Ngày tải lên : 05/11/2012, 14:39
... àûúåc sûã dng trong Linux nhû Ext3, Reiserfs, XFS, vâ JFS cố tđnh tin cêåy cao vâ cố khẫ nùng ghi nhúá quấ trịnh thao tấc trïn dûä liïåu (journaling). THÏË NÂO LÂ JOURNALING FILE SYSTEM? Chng ta ... mịnh. HÏÅ THƯËNG FILE REISERFS tûúãng ca viïåc xêy dûång hïå thưëng file Reiserfs xët phất tûâ u cêìu tưëi ûu viïåc lûu trûä cấc file nhỗ vâ tùng tưëc àưå truy cêåp àïën cấc file nây. Reiserfs sûã ... Reiserfs àïí lûu trûä vâ truy cêåp cấc file nhỗ lâ tưëi ûu, vúái tưëc àưå truy cêåp file tùng tûâ 8-15 lêìn vâ dung Hïå àiïìu hânh Linux Cấc hïå thưëng file trong Linux ...
  • 2
  • 644
  • 6
Cac he thong file trong Linux

Cac he thong file trong Linux

Ngày tải lên : 07/02/2013, 06:51
... àûúåc sûã dng trong Linux nhû Ext3, Reiserfs, XFS, vâ JFS cố tđnh tin cêåy cao vâ cố khẫ nùng ghi nhúá quấ trịnh thao tấc trïn dûä liïåu (journaling). THÏË NÂO LÂ JOURNALING FILE SYSTEM? Chng ta ... mịnh. HÏÅ THƯËNG FILE REISERFS tûúãng ca viïåc xêy dûång hïå thưëng file Reiserfs xët phất tûâ u cêìu tưëi ûu viïåc lûu trûä cấc file nhỗ vâ tùng tưëc àưå truy cêåp àïën cấc file nây. Reiserfs sûã ... Reiserfs àïí lûu trûä vâ truy cêåp cấc file nhỗ lâ tưëi ûu, vúái tưëc àưå truy cêåp file tùng tûâ 8-15 lêìn vâ dung Hïå àiïìu hânh Linux Cấc hïå thưëng file trong Linux ...
  • 2
  • 368
  • 2
unit 4 lesson 1: where is your school?( A1, 2)

unit 4 lesson 1: where is your school?( A1, 2)

Ngày tải lên : 07/07/2013, 01:26
... Phong. This is his school. Phong’s school is small. It is in the country. This is Thu. This is her school. Thu’s school is big. It is in the city. 1 2 3 4 5 6 7 8 A2. Answer. Then write the answers in ... No, it isn't. 5. Yes, it is. - Write a paragraph: This is Phong. His school is small. It's in the country. This is Thu. Her school is big. It's in the city. - Read it loudly before ... in the exercise book. ( close books ) - play the game as teacher’s requirement. - Ss work in teams 1. Yes, it is. 2. No, it isn't. 3. It is in the country. 4. No, it isn't. ...
  • 3
  • 832
  • 3
Where is the books

Where is the books

Ngày tải lên : 30/08/2013, 17:10
  • 6
  • 395
  • 0
C programming in linux

C programming in linux

Ngày tải lên : 13/09/2013, 09:23
  • 84
  • 443
  • 0
Security Issues in Wireless Systems

Security Issues in Wireless Systems

Ngày tải lên : 29/09/2013, 21:20
... packet is encapsulated in PPP. This packet is then encapsulated in L2TP. UDP header is added to this L2TP packet and is encapsulated in an IP datagram. This IP packet is destined for the Internet ... tunneled using IP. An L2TP access concentrator is the client end of Security Issues in Wireless Systems 337 Figure 12.4 The Point-to-Point Tunneling Protocol (PPTP) standard 12 Security Issues in Wireless Systems The ... developed in response to the increasing use of mobile computers in order to enable computers to maintain Internet connection during their movement from one Internet access point to another. It is important...
  • 14
  • 368
  • 0
What Is Java?

What Is Java?

Ngày tải lên : 19/10/2013, 21:15
... into which I am grouping both web and enterprise applications, but the industry is dominated by three primary technologies: • Microsoft Windows .NET • Enterprise Java Technologies • LAMP (Linux ... faster. • Java is interpreted. Java s compiler translates source code into class files of bytecode instructions. A virtual machine examines each instruction and uses that instruction’s meaning to execute ... free, plus Macintosh, Sun, AIX, HP-UX, and any other operating system for which there is a Java virtual machine. The History of Java Java’s abstraction of the underlying operating system, and...
  • 10
  • 569
  • 0
Installing and Using Endpoint Security Agent for Linux Server Version NGX 7.0 GA

Installing and Using Endpoint Security Agent for Linux Server Version NGX 7.0 GA

Ngày tải lên : 23/10/2013, 12:15
... customized RPM 17 Installing Endpoint Security Agent using RPM 17 Upgrading Endpoint Security Agent using RPM 18 Uninstalling Endpoint Security Agent using RPM 19 Customizing the Endpoint Security Agent ... the installation type 12 Installing using the installation script 13 Uninstalling using the installation script 15 Installing using the Endpoint Security Agent RPM 16 Before you begin 16 Building ... Endpoint Security Agent for Linux provides enterprise endpoint security for Linux users. Use this guide to install and administer Endpoint Security Agent for Linux. This chapter provides the system...
  • 25
  • 554
  • 0
Writing device drivers in Linux: A brief tutorial

Writing device drivers in Linux: A brief tutorial

Ngày tải lên : 23/10/2013, 22:15
... fclose(PARLELPORT); } Writing device drivers in Linux: A brief tutorial Final application: flashing lights 18 #include < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include ... < ;linux/ kernel.h> /* printk() */ #include < ;linux/ slab.h> /* kmalloc() */ #include < ;linux/ fs.h> /* everything */ #include < ;linux/ errno.h> /* error codes */ #include < ;linux/ types.h> ... io.h. <parlelport initial> = /* Necessary includes for drivers */ #include < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include < ;linux/ kernel.h> /* printk()...
  • 21
  • 437
  • 0
Java Security Second Edition

Java Security Second Edition

Ngày tải lên : 09/11/2013, 02:15
... http://www.sdo.net/com/sdo/). 2.5 Policy Files In order to administer the Java sandbox, you list the various permissions we've discussed in a Java policy file. Java virtual machines can use any number of policy files, but ... their own permission classes. Granting this type of permission is obviously somewhat dangerous; this permission is usually given only to classes within the Java API and to classes in Java extensions. 2.3 ... reading an existing file or errors in reading the keystore. 2.5.1.1 Managing policy codebases The initial screen for this tool displays the name of the currently loaded policy file (which is blank...
  • 486
  • 443
  • 0
Tài liệu Writing device drivers in Linux: A brief tutorial docx

Tài liệu Writing device drivers in Linux: A brief tutorial docx

Ngày tải lên : 13/12/2013, 11:15
... < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include < ;linux/ kernel.h> /* printk() */ #include < ;linux/ slab.h> /* kmalloc() */ #include < ;linux/ fs.h> ... io.h. <parlelport initial> = /* Necessary includes for drivers */ #include < ;linux/ init.h> #include < ;linux/ config.h> #include < ;linux/ module.h> #include < ;linux/ kernel.h> /* printk() ... which links the call with the file functions it defines. It is invoked, when installing the module, in this way: <memory init module> = int memory_init(void) { int result; /* Registering...
  • 21
  • 412
  • 0
Tài liệu Adding Users in Linux pdf

Tài liệu Adding Users in Linux pdf

Ngày tải lên : 21/12/2013, 19:15
... necessary administrative privileges by logging off of the server and logging on again using the Administrator account. Reflection Why is it important that only an administrator is allowed to ... Copyright  2002, Cisco Systems, Inc. Lab 10.2.2: Adding Users in Linux Estimated Time: 20 minutes Objective In this lab, the student will learn how to create user accounts using the Linux Red Hat ... studentA4 B1 instructorB1 instructorB1 Instructor, Windows Computer B2 studentB2 studentB2 B3 studentB3 studentB3 B4 studentB4 studentB4 C1 instructorC1 instructorC1 Instructor, Linux Computer...
  • 7
  • 334
  • 0
Tài liệu Security Threats in Mobile Ad Hoc Network doc

Tài liệu Security Threats in Mobile Ad Hoc Network doc

Ngày tải lên : 16/01/2014, 16:33
... 5 Security Threats in Link Layer 18 Security Threats in Mobile Ad Hoc Networks 5.3 Summary Most of the link layer attacks in MANET are removed by enhancing the existing protocol or proposing ... in existing protocols. They can be classified into the following categories. 6.1.1 Table-driven In table-driven routing protocol, proactive scheme is used. It means that they maintain consistent ... etc. Chapter 6 Security Threats in Network Layer 22 Security Threats in Mobile Ad Hoc Networks 6.2.2 Routing Cache Poisoning Attack Routing cache poisoning attack uses the advantage of the promiscuous...
  • 48
  • 358
  • 0

Xem thêm