06-19-2007
chown root:mydbagroup /path/to/dba
chmod 4710 /path/to/dba
should do it
Cheers,
ZB
10 More Discussions You Might Find Interesting
1. IP Networking
hi,all, i have a question to trouble you.
a workstation named AAA, and open the ftp services to permit user download and upload files. i have root password.
a pc install windows 2k named BBB, someone install a serv-u ftp ( a ftp server software ) to transfer data. i don't have the... (4 Replies)
Discussion started by: yarx
4 Replies
2. Solaris
Hi,
Wanted to remove a user from a group , but no GUI , must use command line (2 Replies)
Discussion started by: civic2005
2 Replies
3. Shell Programming and Scripting
I need to find all the files that have group Read or Write permission or files that have user write permission.
This is what I have so far:
find . -exec ls -l {} \; | awk '/-...rw..w./ {print $1 " " $3 " " $4 " " $9}'
It shows me all files where group read = true, group write = true... (5 Replies)
Discussion started by: shunter63
5 Replies
4. Cybersecurity
Under oracle user file abc.txt was created. Oracle user belong to dba group on UNIX Server. However other non Oracle users which belongs to some other network groups need read only access to this file.
Every time when I login as other then oracle user and try to view this file it saying that I... (2 Replies)
Discussion started by: groosha
2 Replies
5. AIX
Dear AIX/UNIX experts:
I have a demand to restricted a file to be copy by others, but this file must can be read by others/Applications.
As I tried, the chmod command cannot fulfill this requirement. But not sure if the ACL can achieve this function or not ?
Could anybody give me your... (8 Replies)
Discussion started by: devyfong
8 Replies
6. UNIX for Dummies Questions & Answers
Is it possible?
Scenario:
ALLOW only access from: userok@ip_good
DENY access from userok@*
and
ALLOW acces from *@*
Regards
ISrael. (4 Replies)
Discussion started by: iga3725
4 Replies
7. Emergency UNIX and Linux Support
Hi all
We have squid-2.5.STABLE11-3.FC4 running in our environment.
LDAP authentication works fine. Active Directory 2003 Users are prompted to enter credentials every time they access the net. The system works perfectly, but I need to configure Squid to block users in a specific AD group.... (1 Reply)
Discussion started by: wbdevilliers
1 Replies
8. Ubuntu
Hi,
Anyone can help me on how to duplicate privileges and group for useroradb01 to userrootdb01. I have currently using "useroradb01" and create a newly user "userrootdb01".
I want both in the sames privileges and group. Please see the existing users list below;
drwxr-xr-x 53 useroradb01... (0 Replies)
Discussion started by: fspalero
0 Replies
9. Solaris
Hi,
I want to deny Vi editor to few users, is it possible to do the same in Solaris 10. If yes, then how?
Thanks in advance............ (2 Replies)
Discussion started by: ajhal04
2 Replies
10. Red Hat
Hi,
In the following output you can see the the user "richard" is a member on the team/group "developers":
# id richard
uid=10247(richard) gid=100361(developers) groups=100361(developers),10053(testers)
but in the following details of the said group (developers), the said user... (3 Replies)
Discussion started by: indiansoil
3 Replies
symlink(4) Kernel Interfaces Manual symlink(4)
NAME
symlink - symbolic link
DESCRIPTION
A symbolic (or soft ) link is a file whose name indirectly refers (points) to a relative or absolute path name.
During path name interpretation, a symbolic link to a relative path name is expanded to the path name being interpreted, and a symbolic
link to an absolute path name is replaced with the path name being interpreted.
Thus, given the path name
If is a symbolic link to a relative path name such as the path name is interpreted as
If is a symbolic link to an absolute path name such as the path name is interpreted as
All symbolic links are interpreted in this manner, with one exception: when the symbolic link is the last component of a path name, it is
passed as a parameter to one of the system calls: or (see readlink(2), rename(2), symlink(2), unlink(2), chown(2) and lstat(2)). With
these calls, the symbolic link, itself, is accessed or affected.
Unlike normal (hard) links, a symbolic link can refer to any arbitrary path name and can span different logical devices (volumes).
The path name can be that of any type of file (including a directory or another symbolic link), and may be invalid if no such path exists
in the system. (It is possible to make symbolic links point to themselves or other symbolic links in such a way that they form a closed
loop. The system detects this situation by limiting the number of symbolic links it traverses while translating a path name.)
The mode and ownership of a symbolic link is ignored by the system, which means that affects the actual file, but not the file containing
the symbolic link (see chmod(1)).
Symbolic links can be created using or (see ln(1) and symlink(2)).
AUTHOR
was developed by HP and the University of California, Berkeley.
SEE ALSO
cp(1), symlink(2), readlink(2), link(2), stat(2), mknod(1M).
symlink(4)