Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Question regarding permision and seguid bit (sticky bit) Post 302156757 by arunkumar_mca on Wednesday 9th of January 2008 02:55:24 AM
Old 01-09-2008
Question regarding permision and seguid bit (sticky bit)

Hi ,


I am having file permision as

drwxrwsr_x

I kwo for deleting a file in the diretory i need w permsion as well ..
Say if i am having the permsion as


drwxrwsrwx - wil any one can delete the files in the directory ..

And one more question what is the s doing there .. What is the use of it ..


Thanks,
Arun.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Sticky bit

I have a questions, whose answer may be very obvious: Of what use is the sticky-bit permission on a Unix system? I have looked at the chmod(1) man page on our HP-UX playground system, and haven't been given much explanation: Add or delete the save-text-image-on-file- execution (sticky... (3 Replies)
Discussion started by: LivinFree
3 Replies

2. UNIX for Dummies Questions & Answers

sticky bit??

I have a script that I want to be able to let user 'wcs1234' execute it, but when it runs, it will do so under the higher authority of 'cdunix'. It is my understanding that I accomplish this with a sticky bit. I have tried every variation of this but am unable to get this to work. my script is... (2 Replies)
Discussion started by: hedrict
2 Replies

3. UNIX for Dummies Questions & Answers

sticky bit

What command string would you use to set the sticky bit on a directory that you own? (2 Replies)
Discussion started by: mma_buc_98
2 Replies

4. UNIX for Dummies Questions & Answers

Sticky Bit

I have the sticky bit set on my /tmp directory, but users are still able to remove files that are not owned by them. Does the /etc/group file get invloved in securing these files ?? (1 Reply)
Discussion started by: rob11g
1 Replies

5. Shell Programming and Scripting

sticky bit

Hi frns, What is command to list out all dir's for which sticky bit has been set. Regards, Manu (2 Replies)
Discussion started by: manu.vmr
2 Replies

6. UNIX for Dummies Questions & Answers

Sticky Bit

Hi, could anyone please send me a link to learn/ know more about sticky bits? I am still not clear on the application of using a sticky bits. Thanks for your help. Regards, UP (3 Replies)
Discussion started by: teenu18
3 Replies

7. UNIX for Advanced & Expert Users

sticky bit

Hi, I understand the purpose of sticky bit on directories. But I am not very clear about what the sticky bit do on a file. Can any one explain me in detail and with example please. Thanks in advance. (1 Reply)
Discussion started by: praveen_b744
1 Replies

8. Shell Programming and Scripting

Sticky Bit

I want a file I create to not be deletable by other users so I created a sticky bit by chmod 1644 on the file. chown'd it to root and then tried to delete (via GUI drag to trash and empty) as a non root user and it let me. is sticky bit only good for terminal deletes or something? (4 Replies)
Discussion started by: glev2005
4 Replies

9. AIX

Sticky Bit

What is sticky bit ...and where we aill use this.. how to set this bit in files and directories (1 Reply)
Discussion started by: udtyuvaraj
1 Replies

10. AIX

sticky bit

as far as i understand, if sticky bit is set on a directory, the files created under tht directory cannot be deleted by ordinary user... but we can do ths by permission itself,,, tht's assign only read permission to tht dirrectory wht 's the difference? (1 Reply)
Discussion started by: udtyuvaraj
1 Replies
ipsec_config_delete(1M) 												   ipsec_config_delete(1M)

NAME
ipsec_config_delete - delete configuration records from the HP-UX IPSec configuration database and delete certificate files SYNOPSIS
object_name ip_addr object_name object_name object_name object_name DESCRIPTION
The command deletes configuration records from the configuration database and certificate data. If HP-UX IPSec is active and running, the data (IPsec policy, authentication record or bypass list entry) is also deleted from the runtime policy database. If you delete IPsec policies that have active Security Associations (SAs), HP-UX IPSec removes the SAs from the Security Association Database (SADB) and sends a delete notification to the remote system. If HP-UX IPSec removes an IKE policy, the associated IPSec SAs can remain active, but no IKE control messages can be sent. The command deletes the certificate for the local system and the related private key file from the directory. It does not delete certifi- cates for CAs or Certificate Revocation Lists (CRLs). To delete these objects, you must manually delete the files in the directory. You can use the command to display the file names with the subject names for the CA certificate files and the issuer names for the CRL files. You cannot delete the configuration object. Options and Operands The command recognizes the following options and operands: object_name Specifies the name of the object you are deleting. Do not use this argument when deleting a configuration object. You cannot delete the host, IKEv1, or IKEv2 policies. ip_addr Specifies the IP address of the entry in the bypass list you are deleting. EXAMPLES
The following command deletes the host IPsec policy named AUTHOR
was developed by HP. FILES
configuration database. default profile file. SEE ALSO
ipsec_admin(1M), ipsec_config(1M), ipsec_config_add(1M), ipsec_config_batch(1M), ipsec_config_export(1M), ipsec_config_show(1M), ipsec_migrate(1M), ipsec_policy(1M), ipsec_report(1M). HP-UX IPSec Software Required ipsec_config_delete(1M)
All times are GMT -4. The time now is 04:48 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy