March 2017
Beginner to intermediate
925 pages
18h 11m
English
In simple terms, with capabilities, we can breakdown the power of a root user. From the man page for capabilities:
For the purpose of performing permission checks, traditional UNIX implementations distinguish two categories of processes: privileged processes (whose effective user ID is 0, referred to as superuser or root), and unprivileged processes (whose effective UID is nonzero). Privileged processes bypass all kernel permission checks, while unprivileged processes are subject to full permission checking based on the process's credentials (usually: effective UID, effective GID, and supplementary group list).
Starting with kernel 2.2, Linux divides the privileges traditionally ...
Read now
Unlock full access