F5F Stay Refreshed Software Operating Systems Linux uses suid, sgid and sticky bits to manage file permissions and ownership.

Linux uses suid, sgid and sticky bits to manage file permissions and ownership.

Linux uses suid, sgid and sticky bits to manage file permissions and ownership.

F
fantasy_miner
Member
166
09-24-2022, 10:09 PM
#1
- Online courses on platforms like Coursera, edX, or Khan Academy.
- Video tutorials on YouTube focusing on the topic.
- Interactive coding projects such as those on Codecademy or freeCodeCamp.
- Hands-on exercises with real-world examples to apply what you learn.

For a step-by-step project example:
Start with building a simple calculator app using basic programming concepts, then gradually add features like memory storage or user interface improvements. This will help reinforce your understanding through practical application.
F
fantasy_miner
09-24-2022, 10:09 PM #1

- Online courses on platforms like Coursera, edX, or Khan Academy.
- Video tutorials on YouTube focusing on the topic.
- Interactive coding projects such as those on Codecademy or freeCodeCamp.
- Hands-on exercises with real-world examples to apply what you learn.

For a step-by-step project example:
Start with building a simple calculator app using basic programming concepts, then gradually add features like memory storage or user interface improvements. This will help reinforce your understanding through practical application.

V
Vxniq
Junior Member
40
09-25-2022, 04:07 AM
#2
Many articles discuss these topics. Look up suid, sgid, and sticky bit to understand their roles. They let users or others run files with the owner's access rights. For instance, it enables changing passwords even though regular users lack permission to read/write the encrypted password file. The sticky bit prevents deletion of files by other users, regardless of your own permissions, especially in temporary directories.
V
Vxniq
09-25-2022, 04:07 AM #2

Many articles discuss these topics. Look up suid, sgid, and sticky bit to understand their roles. They let users or others run files with the owner's access rights. For instance, it enables changing passwords even though regular users lack permission to read/write the encrypted password file. The sticky bit prevents deletion of files by other users, regardless of your own permissions, especially in temporary directories.

X
xxlluier12
Junior Member
23
10-06-2022, 09:49 PM
#3
building a basic command-line script to list files in a directory.
X
xxlluier12
10-06-2022, 09:49 PM #3

building a basic command-line script to list files in a directory.