January 2024
Beginner to intermediate
300 pages
6h 42m
English
In this chapter, you’ll learn how users and groups are combined with ownership and permissions to create the basic Linux security model. This combination of primitives is used to control access to just about everything on a Linux system – processes, files, network sockets, devices, and more.
First, you’ll get a tour of all the important file information you get from a long listing (with an emphasis on permissions, naturally). Then we’ll cover the common permissions that you’ll encounter on production Linux systems, and finally, we’ll show you all the Linux commands you’ll use to set and modify permissions on files. Together, we’ll do the following:
Read now
Unlock full access