O'Reilly logo

Linux and Unix Shell Programming by David Tansley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1.10. Conclusion

This chapter has introduced you to the basic concepts of file security. If used correctly and with a pause for thought you will have no problems. A slight slip of the fingers when typing a chmod -R command from the root directory can take ages to get the system back to its correct access permission mode, so please don’t wear plasters on your fingers when you type that command!

The use of suid scripts is down to you. Use them but make sure you control and monitor their use, and please do not use ‘root’ enabled suid scripts.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required