8

Ownership and Permissions

In this chapter, you’ll learn how users and groups are combined with ownership and permissions to create the basic Linux security model. This combination of primitives is used to control access to just about everything on a Linux system – processes, files, network sockets, devices, and more.

First, you’ll get a tour of all the important file information you get from a long listing (with an emphasis on permissions, naturally). Then we’ll cover the common permissions that you’ll encounter on production Linux systems, and finally, we’ll show you all the Linux commands you’ll use to set and modify permissions on files. Together, we’ll do the following:

  • Decipher the output of a long listing
  • Learn about file attributes ...

Get The Software Developer's Guide to Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.