Sponsored Content
Operating Systems Solaris consequence of chmod o-rwx .... Post 302237512 by upengan78 on Wednesday 17th of September 2008 07:42:32 PM
Old 09-17-2008
Quote:
Originally Posted by frank_rizzo
this would remove others permissions on all hidden files. in the root file system.

i would suggest that you verify with ls prior to blindly running commands with wild cards as root. your asking for trouble.

look at another system to see what is different.
that means permissions on "/" also right ? Thanks !
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

CHMOD Help!!

Ok, listen.........I was using FTP Works to remove and add some files to a domain server. I messed with chmod button and made it so that no-one could access or their browsers could execute files and 2 or three certain directories. If anyone knows how to use this command and will give me a heads up... (2 Replies)
Discussion started by: jarrell
2 Replies

2. UNIX for Dummies Questions & Answers

Chmod Help!

Here is the deal, I am good with html and java and am creating a website for my brother. On this site he has chosen to use a ikonboard.com discussion board. I have done everything I can to pull it off, but no can do. Here is the problem: The site is being created using the angelfire... (12 Replies)
Discussion started by: xwfprez
12 Replies

3. UNIX for Dummies Questions & Answers

chmod

Hi, can anybody help me? i have probable a simple problem about permissions. i have a server and on this server there comes some files from a another server via ftp with a separte user. i would like to modify the files with a awk script but i donīt have the permissions to modify the... (3 Replies)
Discussion started by: scotty
3 Replies

4. UNIX for Dummies Questions & Answers

Permission 711---RWX---X---X

I have a file with permisson 711; but when an other user run the program, it can't open. This is the message: /sbin/sh: ./myprogram: cannot open Can any1 tell me why please? Thanks! (6 Replies)
Discussion started by: bobo
6 Replies

5. UNIX for Advanced & Expert Users

how to set the default file persmission of file to "rwx"

hi. I want to set the default permission for ever new created file to rwxrwxrwx .. I try umask 000 but it does't not give the execute persmission , is there any way to set the default permission for every new created file to rwxrwxrwx .. thankx (9 Replies)
Discussion started by: tahir23
9 Replies

6. Solaris

create user with RWX access to a specific directory in Solaris 10

I need to create a user account for a developer that will allow him rwx access to all resources in a directory. How can I do that? Thanks (5 Replies)
Discussion started by: gsander
5 Replies

7. UNIX and Linux Applications

What is the difference between chmod in solaris and chmod in Linux?

i think it is the same in both... Iam i right? (1 Reply)
Discussion started by: sumaiya
1 Replies

8. UNIX for Dummies Questions & Answers

chmod

Hi I tried to use chmod in unix to change my file's permission. chmod 701 hello.cgi And it did change my desired file's permission. Yet, the name of the file is changed to hello.cgi* . And therefore I cannot compile it after that. So, I just wondering why there is an extra '*' in the file's... (2 Replies)
Discussion started by: alvin8906
2 Replies

9. UNIX for Dummies Questions & Answers

How to create a Group with rwx permission?

I want to create a GROUP with rwx permission. Also, I want to create a GROUP with root privileges, so that next time i create a user, I just need to add it to any of the groups and privileges automatically applied. please help. Thanks, Shouvanik (4 Replies)
Discussion started by: shouvanik
4 Replies

10. UNIX for Beginners Questions & Answers

Umask to generate files with rwx permissions for all

i need my script1.sh to generate /tmp/temp.txt with full permissions i.e -rwxrwxrwx 1 user1 users 23 Dec 16 10:52 /tmp/temp.txtmore script1.sh umask 666 echo "hello">/tmp/temp.txt But the script1.sh generates temp.txt with different permissions as shown below. -rwxr-xr-x 1 user1 users... (6 Replies)
Discussion started by: mohtashims
6 Replies
ST_SNAPSHOT(1)							      systraq							    ST_SNAPSHOT(1)

NAME
st_snapshot - calculate checksum and stat ownership and permissions of files SYNOPSIS
ST_SUM=sha256sum st_snapshot patterns homepatterns DESCRIPTION
st_snapshot calculates checksums and stats ownership and permissions of critical system files. This script is typically run in either root-mode or public-mode. Running this script in root-mode requires root priviliges. One is adviced to set up a dedicated user account for running this script in public mode. In root-mode, the files snapshot_root.list and snapshot_root.homelist are typically passed as arguments. These pattern files are read by the script and contain names of files and directories; listing a directory in such a pattern file is equivalent to listing all files which live in the directorytree with this directory as root. snapshot_root.list could e.g. read # snapshot_root.list - files and directories we wanna get # monitored: we wanna get a note once these files, or any file # under these directories, gets created, gets rm-ed, gets # permissions or contents changed. these notices will not # include the possibly secret contents of these files # # this file gets read by st_systraq /etc/group /etc/gshadow /etc/hosts.allow /etc/hosts.deny /etc/hosts.equiv /etc/lilo.conf /etc/passwd /etc/postfix/server.pem /etc/shadow /etc/skel /etc/ssh Equivalent files snapshot_pub.list and snapshot_pub.homelist should be on the system. These files should contain all worldreadable to be monitored files. This allows for running this script as root only in those cases where it's needed: when reading files, readable for root only. The homelist files contain files and directories which should get monitored for every homedirectory on the system. snapshot_pub.homelist could e.g. contain: .profile .cshrc .tcshrc .login .logout .bash_profile .bashrc .exrc .nexrc As a special case, when the environment variable ST_OPHOMES is set to a non-empty string (typically when running in public mode), we stat the permissions on all homedirectories themselves. The produced snapshot is printed to stdout. The output when running in public mode could look like: # ownership and permissions of homedirs drwxr-xr-x root root /bin drwxr-xr-x root root /dev drwxr-sr-x root staff /home drwxr-sr-x joostvb joostvb /home/joostvb drwxr-xr-x root root /usr/sbin drwxr-xr-x root root /var # sha256sum of critical pub files 4d3cd13d6dbc10e2e3ccb9477cbc9eb9b76302454c276d5771ae0b10a5fbb4d2 /home/joostvb/.ssh/id_rsa.pub eb8d83e0246f761a21bdfb13a03fac634ed7c3b7dde4c2efddd7b2838d32596f /var/qmail/alias/.bashrc 4e371f9a11f5a2464d3d5c952e58e24f73b377d33767ed93b2082fcb59a647fe /etc/zlogin # ownership and permissions of critical pub files -rw-rw-r-- joostvb joostvb /home/joostvb/.ssh/id_rsa.pub -rw-r--r-- joostvb joostvb /home/joostvb/.ssh/authorized_keys ENVIRONMENT
ST_OPHOMES - non-empty in case permissions on all homedirectories should be printed ST_SUM - command for calculating file checksums. E.g. sha256sum, sha512sum, sha384sum, sha224sum or sha1sum. SEE ALSO
The systraq manual. VERSION
This manpage: $Id: st_snapshot.pod 374 2008-12-14 08:47:32Z joostvb $ COPYRIGHT
Copyright (C) 2001, 2002, 2003, 2004, 2008 Joost van Baal This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with http://www.gnu.org/copyleft/gpl.html or write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA. AUTHOR
Joost van Baal <joostvb-systraq-20041015@mdcc.cx> 20081217 2008-12-15 ST_SNAPSHOT(1)
All times are GMT -4. The time now is 07:13 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy