Reference no: EM13166732
This assignment should give you experience in using file descriptors, open(), close(), write(), stat() and chmod(), perror(), and command line arguments.
Program
Write a program that will allow you to add messages to a file that has NO permissions for any user.
A Unix system has many files that have sensitive information in them. Permissions help keep these files secure. Some files can be publicly read, but can not be altered by a regular user (ex.: /etc/passwd). Other files can't be read at all by a regular user (ex.: /etc/shadow).
The program you develop should take a message given as a command line argument and append it to a file (also specified on the command line). The file should have no permissions, both before and after the message is appended. Of course, the file should be owned by you.
Your program should also have a -c option that will clear the file before the message is appended.
Algorithm
- Check to see if the output file exists. If it doesn't, create it. Life is simpler if a newly created file is closed at the end of this step.
- Check the permissions of the output file. If any permissions exist, print a useful error message and exit.
- Change the permissions on the file to allow writing by the user.
- Open the file for output. If the "-c" command line option is present, make sure the file is truncated.
- Write the message from the command line to the output file. Write an additional newline character so that the output has a nicer format.
- Clear the permissions and close the file. (These two operations can be performed in either order, but the implementation is slightly different.)
Useful Hints
- Don't use the command line arguments directly. Their position in the argument list may change depending on options. Create meaningful char*variables and fill these with the appropriate entries from the argument list.
- Check for error values after nearly every system function call. It's a pain to set up, but it saves time in the long run.
Input
None, really. Just command line arguments.
Error Checking
If the log file cannot be opened, an appropriate error message should be printed and the program should exit. If the file has any permissions at all, the file should be rejected as insecure, and the program should exit.
8-bit registers are there in the intel 80x86 cpu design
: In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers.
|
Draw pictures of the list names afte
: Draw pictures of the list names after each line of the following code. Show the head pointer of the list, and the values and next pointers of every node. Draw pointers as arrows, and the null pointer as a slash or X. You may assume the list is sin..
|
Implement a game called bunko-poker
: Implement a game called Bunko-Poker. The gameplay is an easily programmed version of the popular game Yahtzee. Your program will make use of the supplied static functions Dice.roll() and, in cases where you might need the string ordered, Dice.ordered..
|
Is problem solving easier and more effective in solving
: Is problem solving easier and more effective in solving business problems without information systems or with? (justify your position)
|
Develop should take a message given as a command
: The program you develop should take a message given as a command line argument and append it to a file (also specified on the command line). The file should have no permissions, both before and after the message is appended. Of course, the file sh..
|
Linked list with first node pointer p.
: Complete the code for a function that replaces each occurrence of value x by value y in a linked list with first node pointer p.
|
Prepare a quarterly income statement
: Prepare a quarterly income statement, a statement of retained earnings, and a balance sheet and journalize and post the adjusting entries. In the ledger accounts ( T-accounts), indicate the adjusting entries with an A.
|
Declare a pointer to an array of 500 school
: In a main() demonstration function, declare a pointer to an array of 500 School objects and include code to handle any memory allocation errors that occur. in a loop, declare 500 array objects at a time, continuing to rewrite the main() functions ..
|
Uses a loop to populate a one-dimensional array
: Write the following program that creates and uses a loop to populate a one-dimensional array that holds the even numbers between 1 and 12; creates and uses a loop to populate a second one-dimensional array that holds the odd numbers between 1 and 12;..
|