09-18-2003
reading permissions
in my unix text, an example of user/group/other permissions is given as follows:
drwxr-xr-x
Why are there 2 letter 'r's given under user permissions?
I understand, btw, that d is for directory, not dr.
I appreciate your help.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Can someone pleas tell me if there is something funny when it comes to unix permissions and PHP. When php creates a file in unix the owner is nobody...does this raise any issues, and if it does could someone please tell me a web site where I could read more about this. Thanks alot.
John (2 Replies)
Discussion started by: jmg5
2 Replies
2. UNIX for Dummies Questions & Answers
Hi all.
Her's what i want to do:
-> copy a file from /tmp to /usr/local/bin, and then give this file the default owner of /usr/local/bin.
My /usr/local/bin belongs to root:sys. When i detar the file mentionned, it keeps the rights it was created with.
How can i achieve what i want to do? A cp... (1 Reply)
Discussion started by: penguin-friend
1 Replies
3. Forum Support Area for Unregistered Users & Account Problems
I am having problems editing my profile, performing a search, etc ....
Always get msg that I don't have any permissions. What do I need to do?
Thanks
DANNYC (1 Reply)
Discussion started by: DANNYC
1 Replies
4. UNIX for Dummies Questions & Answers
I saved a perl code in xemacs. I used an xterminal to execute it but unix said that I don't have permission. I saved the files in my home directory. How do I change the permission. This is hat unix said:
-ksh: ./names.pl: cannot execute (5 Replies)
Discussion started by: lnatz
5 Replies
5. HP-UX
Hey,
We've got quite a strange problem on our hands here. We are running an HP 9000/800 B.11.00.
I've just created a new group in /etc/group which i called, let's say newgroup . Then I added 4 users to the group, namely user1, user2, user3, user4 . The command grpchk shows no strange things... (4 Replies)
Discussion started by: chrizz
4 Replies
6. Programming
hi
iam reading data from web page using request socket and curl socket.
now my problem is some the web page containg data as a image so how can i read the data from a image.
thank,inadvance.
sree (3 Replies)
Discussion started by: phani_sree
3 Replies
7. HP-UX
Hi,
I am a Unix Admin. I have to give the permissions to a user for creating new file in a directory in HP-Ux 11.11 system since he cannot able to create a new file in the directory.
Thanks in advance.
Mike (3 Replies)
Discussion started by: Mike1234
3 Replies
8. Shell Programming and Scripting
My /tmp is set with the following permissions (777) and a 't' at the end.
My umask is set to 022.
When I create a directory under /tmp (tmp/xx) it gets created as 755
as expected.
Yet when I create a file within that directory (/tmp/xx/yy) the permissions
are not 755 they are 644.
... (1 Reply)
Discussion started by: BeefStu
1 Replies
9. Shell Programming and Scripting
Hi, I am creating a ksh script to search for a string of text inside files within a directory tree. Some of these file are going to be read/execute only. I know to use chmod to change the permissions of the file, but I want to preserve the original permissions after writing to the file. How can I... (3 Replies)
Discussion started by: right_coaster
3 Replies
10. Shell Programming and Scripting
Hi guys,
i write the below script to make the user get to the directory that interesting. Now what I am trying is to check the permissions of the directory and if the directory exists to check the reading options.
echo "Please enter your desire folder directory ( \yourfolders) ?: \c"
... (9 Replies)
Discussion started by: mikerousse
9 Replies
LEARN ABOUT ULTRIX
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)