From the course: LPI Linux Essentials (010-160) Cert Prep
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Using special execute permissions - Linux Tutorial
From the course: LPI Linux Essentials (010-160) Cert Prep
Using special execute permissions
- So we've already talked about the fact that the execute permission bit enables you to identify programs, as such, by using the LS-LA command. By seeing that X listed you're going to know these are things that you can run as a program. Now these files can be done using your own credentials, which is usually a good thing, because you want to run these processes as a specific user as part of Linux's security model. So if you're running a file you're going to be the one using your normal user permissions. Occasionally, though, you may need to run these programs with elevator permissions, as a super user, an admin, or even the root user. For example, if you want to change the password by using the password program, this is going to have to be run as root, because it needs to write a special configuration file that only the root user has. So if users were to change their own passwords, the password must have root privileges,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Setting ownership4m 25s
-
(Locked)
Setting ownership demonstration4m 6s
-
(Locked)
Understanding permissions4m 9s
-
(Locked)
Permission strings and setting the umask6m 25s
-
(Locked)
Using sticky bits2m 44s
-
(Locked)
Using special execute permissions3m 41s
-
(Locked)
Hiding files and directories2m 24s
-
(Locked)
Setting permissions7m 9s
-
(Locked)
-