Skip to Content
Security Strategies in Linux Platforms and Applications, 2nd Edition
book

Security Strategies in Linux Platforms and Applications, 2nd Edition

by Michael Jang, Ric Messier
October 2015
Intermediate to advanced
514 pages
16h 19m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 2nd Edition

CHAPTER

4

User Privileges and Permissions

AFTER A SYSTEM IS BOOTED AND RUNNING, it lives to serve users. Linux systems are designed to have multiple users. This may mean that multiple users could be logged in at the same time, both on the system directly as well as remotely. You may have only a single user for the system if it’s a desktop, but there are probably quite a few additional users added by certain software packages to handle the services that are running. The thing about users, though, is that you probably want to be able to protect one from another. Everyone has secrets, after all, and sometimes you just want to keep someone from inadvertently altering files that belong to someone else. With Linux, permissions are based ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

Michael Jang

Publisher Resources

ISBN: 9781284090659