Sponsored Content
Full Discussion: Access to a file
Top Forums UNIX for Dummies Questions & Answers Access to a file Post 302579389 by paras.oriental on Monday 5th of December 2011 02:59:40 PM
Old 12-05-2011
Question Access to a file

Hey friends,

If a file has permissions 000, then who can access the file?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Need help to access/mount so to access folder/files on a Remote System using Linux OS

Hi I need to access files from a specific folder of a Linux system from an another Linux System Remotely. I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility. Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies

2. UNIX for Dummies Questions & Answers

HOw I can Know who Access my file!!

Hi there I just want to know what is the best way to know who access my file and when? I want also to know if it's possiple to hide or restrict access to file or directory even from the root ' I THINK MUCH BETTER TO CHANGE THE NAME THEN :D "!!! thanks in advance Abdulkarim (3 Replies)
Discussion started by: geoquest
3 Replies

3. Programming

[C++] File I/O (Reading from a Random-Access File)

INFO: The program should enter a circle radius and Id for that circle to a file, then it should search for that id and print the radius for that circle. PROBLEM: This program compiles but it's not searching properly. Circle.h #ifndef CIRCLE_H #define CIRCLE_H #include <iostream>... (0 Replies)
Discussion started by: VersEtreOuNe
0 Replies

4. Cybersecurity

file permission/acl: 2 users with write access on 1 file...

Hello, i need some help/advice on how to solve a particular problem. these are the users: |name | group | ---------- --------------- |boss | department1 | |assistant | department1 | |employee | department1 | |spy | department2 | this is the... (0 Replies)
Discussion started by: elzalem
0 Replies

5. Programming

how to write Microsoft Access MDB file to a text file, using C ?

I'm in the UNIX environment. I'd like to read a Microsoft Access MDB file, and write the contents of that file into an ASCII text file. I want to write a C program to do this. Does anyone know if there's already source code out there that does this? Please advise. Thanks. (3 Replies)
Discussion started by: serendipity1276
3 Replies

6. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

7. IP Networking

Does my provider limit my internet access or somesites access?

Hi Good Day, i would like to ask for further info about my problems experiencing this evening. Im a PPP0 connection in the internet using 3G located in asia pacific region.i had this problem this evening in my INTERNET connections that there are some sites i can't open example ( Gizmodo.com,... (2 Replies)
Discussion started by: jao_madn
2 Replies

8. Solaris

samba read write access to owner and no access to other users

Hi All, I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration. Regards, Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies

9. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies

10. Shell Programming and Scripting

Script to access multiple file and operate on single file

We have three files as mentioned below: 1. main_file.txt: This is the file in which all operations will be done. Which means this file will be signed by using the below two files 2. signature_file.txt: This is a status file and contains two signatures. 3. command.txt:file contains two commands... (2 Replies)
Discussion started by: chetanojha
2 Replies
nisopaccess(1)							   User Commands						    nisopaccess(1)

NAME
nisopaccess - NIS+ operation access control administration command SYNOPSIS
nisopaccess [-v] directory operation rights nisopaccess [-v] [-r] directory operation nisopaccess [-v] [-l] directory [operation] DESCRIPTION
Most NIS+ operations have implied access control through the permissions on the objects that they manipulate. For example, in order to read an entry in a table, you must have read permission on that entry. However, some NIS+ operations by default perform no access checking at all and are allowed to all: Operation Example of commands that use the operation NIS_CHECKPOINT nisping -C NIS_CPTIME nisping, rpc.nisd NIS_MKDIR nismkdir NIS_PING nisping, rpc.nisd NIS_RMDIR nisrmdir NIS_SERVSTATE nisbackup, nisrestore NIS_STATUS nisstat, rpc.nispasswdd The nisopaccess command can be used to enforce access control on these operations on a per NIS+ directory basis. The directory argument should be the fully qualified name, including the trailing dot, of the NIS+ directory to which nisopaccess will be applied. As a short-hand method, if the directory name does not end in a trailing dot, for example "org_dir", then the domain name is appended. The domain name is also appended to partial paths such as "org_dir.xyz". You can use upper or lower case for the operation argument. However, you cannot mix cases. The "NIS_" prefix may be omitted. For example, NIS_PING can be specified as NIS_PING, nis_ping, PING, or ping. The rights argument is specified in the format defined by the nischmod(1) command. Since only the read ("r") rights are used to determine who has the right to perform the operation, the modify and delete rights may be used to control who can change access to the operation. The access checking performed for each operation is as follows. When an operation requires access be checked on all directories served by its rpc.nisd(1M), access is denied if even one of the directories prohibits the operation. NIS_CHECKPOINT Check specified directory, or all directories if there is no directory argument, as is the case when NIS_CHECKPOINT is issued by the "nisping -Ca" command. Return NIS_PERMISSION when access is denied. NIS_CPTIME Check specified directory. It returns 0 when access is denied. NIS_MKDIR Check parent of specified directory. Returns NIS_PERMISSION when access is denied. If the parent directory is not available locally, that is, it is not served by this rpc.nisd(1M), NIS_MKDIR access is allowed, though the operation will be executed only if this rpc.nisd is a known replica of the directory. You should note that the NIS_MKDIR operation does not create a NIS+ directory; it adds a directory to the serving list for this rpc.nisd, if appropriate. NIS_PING Check specified directory. No return value. NIS_RMDIR Check specified directory. NIS_PERMISSION is returned when access denied. The NIS_RMDIR operation does not remove a NIS+ directory; it deletes the directory from the serving list for this rpc.nisd, if appropriate. NIS_SERVSTATE Check access on all directories served by this rpc.nisd. If access is denied for a tag, "<permission denied>" is returned instead of the tag value. NIS_STATUS Same as for NIS_SERVSTATE. Notice that older clients may not supply authentication information for some of the operations listed above. These clients are treated as "nobody" when access checking is performed. The access control is implemented by creating a NIS+ table called "proto_op_access" in each NIS+ directory to which access control should be applied. The table can be manipulated using normal NIS+ commands. However, nisopaccess is the only supported interface for NIS+ opera- tion access control. OPTIONS
The following options are supported: -l List the access control for a single operation, or for all operations that have access control enabled. -r Remove access control for a certain operation on the specified directory. -v Verbose mode. EXAMPLES
Example 1 Enabling Access Control for the NIS_PING Operation To enable access control for the NIS_PING operation on "org_dir.`domainname`." such that only the owner of the directory can perform a NIS_PING, or change the NIS_PING rights: example% nisopaccess org_dir NIS_PING o=rmcd,g=,w=,n= Example 2 Listing the Access to NIS_PING To list the access to the NIS_PING operation for org_dir: example% nisopaccess -l org_dir NIS_PING NIS_PING ----rmcd-------- owner.dom.ain. group.dom.ain. Example 3 Removing Access Control for NIS_PING To remove access control for NIS_PING on org_dir: example% nisopaccess -r org_dir NIS_PING EXIT STATUS
The following exit values are returned: 0 Successful operation. other Operation failed. The status is usually the return status from a NIS+ command such as nistbladm. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWnisu | +-----------------------------+-----------------------------+ SEE ALSO
NIS+(1), nischmod(1), nistbladm(1), rpc.nisd(1M), attributes(5) NOTES
NIS+ might not be supported in future releases of the Solaris operating system. Tools to aid the migration from NIS+ to LDAP are available in the current Solaris release. For more information, visit http://www.sun.com/directory/nisplus/transition.html. SunOS 5.11 2 Dec 2005 nisopaccess(1)
All times are GMT -4. The time now is 02:10 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy