Special privileges
passwd:s

SUID: When running a program , The owner of the corresponding process is the owner of the program file itself , Not the starter ;
    chmod u+s FILE
    chmod u-s FILE
         If FILE It has Execution Authority , be SUID Is shown as s; Otherwise, it will show S;
SGID: When running a program , The group of the corresponding process is the group of the program file itself , Not the basic group to which the initiator belongs ;
    chmod g+s FILE
    chmod g-s FILE
        develop team, hadoop, hbase, hive
        /tmp/project/
            develop
Sticky: In a public directory , Each can create files , Delete your own files , But you can't delete other people's files ;
    chmod o+t DIR
    chmod o-t DIR
    
000:
001:
...
110:
111:

chmod 5755 /backup/test

umask 0022

Special privileges :SUID,SGID,Sticky More articles about

  1. Linux Special user rights suid,sgid, sticky

    Each process maintains the following 6 individual ID: True identity : real UID, readl GID --> Sign in shell The identity used Valid identity : effective UID, effective GID ...

  2. 【Linux】 File special permission SUID/SGID/Sticky Bit

    linux In addition to the common reading (r). Write (w). perform (x) Out of authority , also 3 A special privilege , Namely setuid.setgid and stick bit 1.setuid.setgid Let's look at an example , View your /usr/b ...

  3. SUID,SGID,Sticky Bit Detailed explanation ( turn )

    SUID attribute passwd Commands can be used to change a user's password , Ordinary users can use this command to change their password . But the way to save a user's password /etc/shadow File permissions are 400, That is to say, only the owner of the file root The user can write , ...

  4. SUID ,SGID ,Sticky

    SUID passwd:s SUID: When running a program , The owner of the corresponding process is the owner of the program file itself , Not the starter : chmod u+s FILE chmod u-s FILE If FILE It has Execution Authority , ...

  5. chmod 4777? File special permission SUID SGID StickyBit

    Story introduction I came across an order today , test How the 777 There's another one in the front , It overturned my cognition , At this time, we have to read the book of bird brother God , Find a link <7.4.3 File special permission :SUID/SGID/Sticky Bit> ...

  6. linux Basics 2-cd、mkdir、touch、umask、chattr、lsattr、SUID/SGID/Sticky Bit

    One cd : . Represents the current directory .. Represents the previous level directory - Represents the previous working directory ~ representative [ Current user identity ] Your own directory And cd The effect is the same ~account representative account This user's home directory Two m ...

  7. Linux Special privileges SUID,SGID,SBIT

    setuid and setgid Namely set uid ID upon execution and set group ID upon execution Abbreviation . We usually abbreviate them to suid and ...

  8. linux in suid/sgid/sticky And extended attributes (attr)

    suid Only for command files .( Such as /usr/bin/passwd) When the command file has suid Authority , Then the operation user's authority becomes the master authority . There is no... On the command file suid The user's permission remains unchanged . see suid jurisdiction : [roo ...

  9. CentOS File special permission SUID,SGID,SBIT

    1.SUID , It is a special permission to set binary program , The executor of a binary program can temporarily have the authority of the owner ( Only valid for binary programs with execute permission ). (1)SUID Permissions are only valid for binary programs : (2) This permission is valid only when the ...

Random recommendation

  1. BZOJ2118 Mo Mo's equation [ number theory Shortest path modeling ]

    2118: Mo Mo's equation Time Limit: 10 Sec  Memory Limit: 259 MBSubmit: 1317  Solved: 504[Submit][Status][Discus ...

  2. UVA 10325 - The Lottery( A class )

    A problem I have done before , forget /gcd 了 , It seems that we need to take a look at the previous things . #include <cstdio> #include <cstring> #include <iostr ...

  3. How to change c# Project App.config file

    Dynamic modification App.Config and web.Config First, suppose your application configuration file is as follows : <?xml version="1.0" encoding="utf-8&q ...

  4. linux shell if Parameters

    shell It's used in programming if The parameters in the statement –b When file Returns true when a block file exists -c When file Returns true when a character file exists -d When pathname Returns true when it exists and is a directory -e When path ...

  5. [Angular 2] NgNonBindable

    If you want to print someting like {{content}} on the html, using ng-non-bindable directive: <div ...

  6. C# Import and export excel File the case

    Personal summary leads to excel Report cases : // Exporting the report protected void btnExport_Click(object sender, EventArgs e) { List<ProOut ...

  7. Someone asked a question : must do RESTful Do you ?

    Let me write it out front This question seems to be a little cute , Or similar problems are not reliable , There are so many certain things in the world , It doesn't take long to do development , So if you have this question, it's really a little out of tune , But maybe it's just a casual question , No depth ...

  8. java Of finalize Methods use

    1. finalize The role of finalize() yes Object Of protected Method , Subclasses can override this method for resource cleanup ,GC Call this method before recovering objects. . finalize() And C++ The destructor in ...

  9. linux install jdk1.8(rpm The way )

    stay Oracle Download from the official website 64 Bit jdk1.8 edition jdk1.8: http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloa ...

  10. c++ The use of pointers and pointer references in

    When a pointer is passed as an argument to a function , In fact, it's essentially placement and transmission , About to make a copy of the pointer , The modification of the pointer inside the function is actually the modification of the local variable inside the function . This is different from quoting , The reference is actually when the parameter is passed ...