04-15-2009
Ah yes. Very important point. Better yet... set umask before creating the file. I have updated the post with the umask setting.
6 More Discussions You Might Find Interesting
1. Cybersecurity
can u give me a code for host based intrusion detection using system call introspection... (5 Replies)
Discussion started by: aravind007
5 Replies
2. Shell Programming and Scripting
Heloo every one
I want to write a script that detects a key press and mouse click and movement,but I dont know how.
The second one is I want to run myscript without writing the shell ie not "sh script.sh" but "script.sh"
Can you help me out of here?
Thanks in advance. (9 Replies)
Discussion started by: enoch99
9 Replies
3. Shell Programming and Scripting
I am currently running 4 scripts to complete a job for me. Each script requires the finished file of the one before it. For example the first script gets the finished file called model.x, then i would like script2 to start in and use model.x as the input and get model_min.x as the finished... (5 Replies)
Discussion started by: olifu02
5 Replies
4. Shell Programming and Scripting
Hello all
I have a script but I failed on the creation of
Script is any is carried out in the shell sends the owner of the server, the message is has been implemented
For example, functioned as a detection system intruders but in smaller
Is it possible to help if you allow
I want the... (4 Replies)
Discussion started by: x-zer0
4 Replies
5. Programming
Hey, for the purpose of a research project I need to know if a specific type of parallel processing is being utilized by any user-run programs. Is there a way to detect whether a program either returns a value to another program at the end of execution, or just utilizes any form of parallel... (4 Replies)
Discussion started by: azar.zorn
4 Replies
6. Shell Programming and Scripting
Hello all!
This is my first post and I'm very new to programming. I would like help creating a simple perl or bash script that I will be using in my work as a junior bioinformatician.
Essentially, I would like to take a tab-delimted or .csv text with 3 columns and write them to a "3D" matrix:
... (16 Replies)
Discussion started by: torchij
16 Replies
LEARN ABOUT LINUX
pam_umask
PAM_UMASK(8) Linux-PAM Manual PAM_UMASK(8)
NAME
pam_umask - PAM module to set the file mode creation mask
SYNOPSIS
pam_umask.so [debug] [silent] [usergroups] [umask=mask]
DESCRIPTION
pam_umask is a PAM module to set the file mode creation mask of the current environment. The umask affects the default permissions assigned
to newly created files.
The PAM module tries to get the umask value from the following places in the following order:
o umask= argument
o umask= entry of the users GECOS field
o pri= entry of the users GECOS field
o ulimit= entry of the users GECOS field
o UMASK= entry from /etc/default/login
o UMASK entry from /etc/login.defs
OPTIONS
debug
Print debug information.
silent
Don't print informative messages.
usergroups
If the user is not root and the username is the same as primary group name, the umask group bits are set to be the same as owner bits
(examples: 022 -> 002, 077 -> 007).
umask=mask
Sets the calling process's file mode creation mask (umask) to mask & 0777. The value is interpreted as Octal.
MODULE TYPES PROVIDED
Only the session type is provided.
RETURN VALUES
PAM_SUCCESS
The new umask was set successfully.
PAM_SERVICE_ERR
No username was given.
PAM_USER_UNKNOWN
User not known.
EXAMPLES
Add the following line to /etc/pam.d/login to set the user specific umask at login:
session optional pam_umask.so umask=0022
SEE ALSO
pam.conf(5), pam.d(5), pam(7)
AUTHOR
pam_umask was written by Thorsten Kukuk <kukuk@thkukuk.de>.
Linux-PAM Manual 06/04/2011 PAM_UMASK(8)