O'Reilly logo

Linux Shell Scripting with Bash by Ken O. Burtch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Shell Security

System security can often be a two-edged sword. Many companies spend large sums of money on system administration tools; often then inadequately train their admin staff. The first word of system resource shortages invariably comes from the programmers themselves.

At one company I worked for, the official policy was to prevent the programmers on the system from accessing the performance monitoring utilities. When head of administration discovered the tools were accessible, he ordered them to be made secure. After a couple of weeks, the staff silently enabled the utilities again because disabling them bottled up the company's first line of defense.

Security in a shell script, like system security, is a matter not of tightening ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required