More on User, Group and Permission

Red Hat Linux Essentials More on User, Group, Permission, Filesystem and System Admin Tools
7 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$49.99
List Price:  $69.99
You save:  $20
€48.02
List Price:  €67.23
You save:  €19.21
£39.14
List Price:  £54.79
You save:  £15.65
CA$71.63
List Price:  CA$100.29
You save:  CA$28.65
A$80.06
List Price:  A$112.09
You save:  A$32.03
S$67.51
List Price:  S$94.52
You save:  S$27.01
HK$388.46
List Price:  HK$543.88
You save:  HK$155.41
CHF 44.24
List Price:  CHF 61.94
You save:  CHF 17.70
NOK kr563.34
List Price:  NOK kr788.73
You save:  NOK kr225.38
DKK kr358.57
List Price:  DKK kr502.03
You save:  DKK kr143.46
NZ$88.43
List Price:  NZ$123.81
You save:  NZ$35.37
د.إ183.61
List Price:  د.إ257.07
You save:  د.إ73.45
৳5,964.32
List Price:  ৳8,350.53
You save:  ৳2,386.20
₹4,269.04
List Price:  ₹5,977
You save:  ₹1,707.95
RM224.30
List Price:  RM314.04
You save:  RM89.74
₦77,264.53
List Price:  ₦108,176.53
You save:  ₦30,911.99
₨13,894.99
List Price:  ₨19,454.09
You save:  ₨5,559.10
฿1,708.15
List Price:  ฿2,391.55
You save:  ฿683.40
₺1,759.41
List Price:  ₺2,463.31
You save:  ₺703.90
B$318.75
List Price:  B$446.27
You save:  B$127.52
R937.33
List Price:  R1,312.34
You save:  R375
Лв93.99
List Price:  Лв131.59
You save:  Лв37.60
₩72,848.40
List Price:  ₩101,993.60
You save:  ₩29,145.19
₪182.43
List Price:  ₪255.42
You save:  ₪72.98
₱2,932.41
List Price:  ₱4,105.61
You save:  ₱1,173.20
¥7,857.17
List Price:  ¥11,000.67
You save:  ¥3,143.49
MX$1,008
List Price:  MX$1,411.29
You save:  MX$403.28
QR181.52
List Price:  QR254.14
You save:  QR72.62
P693.18
List Price:  P970.50
You save:  P277.32
KSh6,450.70
List Price:  KSh9,031.50
You save:  KSh2,580.80
E£2,541.20
List Price:  E£3,557.88
You save:  E£1,016.68
ብር6,354.82
List Price:  ብር8,897.26
You save:  ብር2,542.43
Kz45,590.88
List Price:  Kz63,830.88
You save:  Kz18,240
CLP$49,454.60
List Price:  CLP$69,240.40
You save:  CLP$19,785.80
CN¥364.87
List Price:  CN¥510.85
You save:  CN¥145.98
RD$3,040.26
List Price:  RD$4,256.60
You save:  RD$1,216.34
DA6,753.71
List Price:  DA9,455.74
You save:  DA2,702.02
FJ$115.90
List Price:  FJ$162.28
You save:  FJ$46.37
Q384.44
List Price:  Q538.26
You save:  Q153.81
GY$10,442.13
List Price:  GY$14,619.81
You save:  GY$4,177.68
ISK kr6,976.10
List Price:  ISK kr9,767.10
You save:  ISK kr2,791
DH503.31
List Price:  DH704.68
You save:  DH201.36
L920.86
List Price:  L1,289.28
You save:  L368.41
ден2,954.07
List Price:  ден4,135.94
You save:  ден1,181.86
MOP$399.27
List Price:  MOP$559.01
You save:  MOP$159.74
N$928.04
List Price:  N$1,299.34
You save:  N$371.29
C$1,836.54
List Price:  C$2,571.30
You save:  C$734.76
रु6,797.51
List Price:  रु9,517.06
You save:  रु2,719.54
S/185.85
List Price:  S/260.20
You save:  S/74.35
K202.57
List Price:  K283.61
You save:  K81.04
SAR187.71
List Price:  SAR262.82
You save:  SAR75.10
ZK1,381.27
List Price:  ZK1,933.89
You save:  ZK552.61
L239.16
List Price:  L334.85
You save:  L95.68
Kč1,208.85
List Price:  Kč1,692.49
You save:  Kč483.63
Ft19,737.39
List Price:  Ft27,633.93
You save:  Ft7,896.53
SEK kr544
List Price:  SEK kr761.65
You save:  SEK kr217.64
ARS$51,344.11
List Price:  ARS$71,885.87
You save:  ARS$20,541.75
Bs344.88
List Price:  Bs482.86
You save:  Bs137.98
COP$220,596.26
List Price:  COP$308,852.42
You save:  COP$88,256.15
₡25,341.90
List Price:  ₡35,480.70
You save:  ₡10,138.79
L1,268.10
List Price:  L1,775.44
You save:  L507.34
₲389,249.85
List Price:  ₲544,980.94
You save:  ₲155,731.08
$U2,221.61
List Price:  $U3,110.44
You save:  $U888.82
zł204.67
List Price:  zł286.56
You save:  zł81.88
Already have an account? Log In

Transcript

In the reading section we have learned about user groups and permissions. And here in this video we are going to learn more about user groups and permissions. In advanced level, here we will learn where the password files, the SAM file and other files are located shadow files. The salmon is in Windows version. And what we can do in advance for user, group and permissions so let's start. The authentication information is stored in plain text files.

In the locations as EDC, password shadow group, g shadow the password restores the usernames the shadow which stores the passwords for respective username. Similarly, the group is tours the group names and the G shadow is tours the group passwords. You can use various management tools however, you could not read shadow files. But with certain utilities, you could access those files. The location is a very obscure because you need to protect it securely, you must lock this location, the directory could be logged, and non root users could not access that file. The user management tools include as UI tools and ci tools that come system config users is a UI tool where you can manage user group and permissions.

And with CLA, you can use a user Add User mode and user tail delete. The securing of shadow files and the password files is very important, because certain kind of tools are there which can be used to sniff your password. There is a utility called rootkit, which can be installed in your brand in a pendrive different files. When that pendrive is connected to a system, it directly attacks that shadow file and certain location etc shadow and copies all the files that is placed there. So you must block all the copy, paste and other options. If you want to secure your system, you must also lock any external devices like USB or CD drive, you must lock it protected otherwise your system would be compromised.

System users and groups could be used the server programs such as web or printer search typically, which is run as unprivileged users not as root. You must secure it. Do not remember the root and payments That are called as background process in Linux mail LP and nobody, this could could be used as an unprivileged user, not as a rule, so this does not cause any accidental harm to the system. The running programs in this way limits the amount of damage that any single program can do because they could not access each location and does not could not perform various tasks. You can monitor the login. For connected users you can use w login and reboot history you can use last to see last login, who logged the last four failed login attempts you can check last B and for most recent login you can right command last log who logged the computer last thing the default permission Could be saved with four directories is a triple seven minus unmask triple seven means READ WRITE execute all permissions.

These are permitted for directories so carefully hide change the permissions for the directory which are sensitive, like the shadow side of that tree. The default permission for files is the directory default without execute permission. So you need to provide execute permission when you want to allow a user to execute a certain file. unmask is a set with unmask command and non privileged users unmask is 002. The files with have permission say of 664. The directories will have permission of 775 by default and users and mask is zero to two.

You could change it and this is a default You can add a special permission for executables. A special permission for executables could be placed with su ID and SDA to come up with an SU ID you could have the command which runs with permissions of the owner of the command not executed of the command. Okay, let's come on. And similarly as the it runs with a group affiliation of the group command, you can also create your own command and restore it with a shell script. Similarly, we can do with batch a script on Windows or you could get a special permission for directories or you can use a sticky bit for files and directories with a sticky bit that can set only remote by owner or dude Regardless of write permission for the directory, that could be removed do files or directories, which are defined with sticky bits can be removed only by user who created it or by root, who can do anything.

Whether right permission is allowed or not to the directory, similarly as di D is affiliated for a group with a similar functionality as SDK with. So we learned a brief about user group and permissions and we need to security keep in mind about a rootkit and various things about them. If we explore ethical hacking and cybersecurity, it would be considered and apart in your career, that would allow you to secure your network or database or your environment so You must explore be curious and keep learning keep moving ahead. You will learn more and implement more

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.