What is an alternative to using permissions

Assignment Help Computer Engineering
Reference no: EM132189956

Please label each question, then write answer. For example, Question 1) then write answer.

1. In UNIX directories are treated as files, in fact a directory is a file. Directories have permissions associated with them as do files.

• Given a file with permissions of 644 octal (rw- r-- r-- ) within a directory with permissions of 730 octal (rwx -wx ---) . How can this combination of permissions compromise the file?

• Given a file with permissions of 444 octal (r-- r-- r-- ) within a directory with permissions of 770 octal (rwx rwx ---). How can this combination of permissions compromise the file?

2. Explain how UNIX permissions could be used to support shared access of files between the owner and the designated people in each scenario.

• How would you allow access to file1 for person1?

• How would you allow access to file1 for person1 and file2 for person2?

• How effective are Unix permissions for allowing shared file access? What is an alternative to using permissions?

Reference no: EM132189956

Questions Cloud

What is the index of the top element of the stack : What is the index of the top element of the stack. What is the index of the bottom element of the stack?
Overall profitability of the industry to improve : All of Southwest airlines competitors adopt the same jet engine maintenance programs as part of their strategy to improve.
Find the projects IRR : Question - A project costs 1000 dollars today and returns $500 in Year 1, $300 in Year 2, and $400 in Year 4. Find the projects IRR
Central planning in planned economies : How do prices and wages perform functions similar to 'central planning' in planned economies?
What is an alternative to using permissions : How effective are Unix permissions for allowing shared file access? What is an alternative to using permissions?
What about spam outside the united states : What recourse do users have if they are wronged in activities such as gambling and if the servers are physically located outside the United States?
Search a binary search tree with n nodes for a given value : Search a binary search tree with n nodes for a given value. Determine whether or not a sorted list of n elements has any duplicate values.
What are some of the reasons it is slow to be adopted : Although most would agree that sustainable behavior is a good thing, what are some of the reasons it is slow to be adopted?
Prepare schedule of accounts receivable and accounts payable : Prepare schedules of Accounts Receivable and Accounts Payable - Prepare a Post-closing Trial Balance as at 31August - Complete the worksheet

Reviews

Write a Review

Computer Engineering Questions & Answers

  Private base class function declared public in derived class

Private base class function declared public in derived class

  What is the objective of unique labeling in real world

Why should labels be unique, what objective does unique labeling serve in real world? Why is assignment of accountability significant? What would be consequence of not having it?

  Transmition of the packet

An Ethernet MAC sub layer receives the 1510 bytes of the data from LLC layer. Explain whether the data encapsulation can be within one frame?

  Construct a finite-state machine for the log-on procedure

Construct a finite-state machine for the log-on procedure for a computer, where the user logs on by entering a user identification number.

  Write a brief summary of what steps are suggested

Write a brief summary of what steps are suggested, and provide your opinion on which proposed options make the most sense.

  Define defense in depth

Define defense in depth

  Would you support the companys decision

How its games can produce more dopamine in the brains of players. Would you support the company's decision?

  Question1 what are the methods of defense and provide

question1. what are the methods of defense and provide examples? how do you deal with the damage?2. explain fundamental

  Implement a simple file system with login authentication

Implement a simple file system with login authentication and access control - Construct an associated file system, into which a user can log. Files can be created, read from, written to, but only in accordance with a three-level access control mode..

  Give an algorithm to update the mst when the weight

Let G be an edge-weighted, undirected, and connected graph. You are already given the MST, T, of G.

  Define the concept of a six-stage add pipeline

It is required to compute Ci = Ai + Bi (i = 1- 50), where A, B, and C are arrays of floating-point numbers, using a six-stage add pipeline.

  Describe the two site illustrations that have images of

what are two site examples that have images of multimedia that are used effectively on the site? why do you think

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd