01-13-2004
Mattyboy,
Your question sounds like homework as do your other posts. Please read the forum rules.
As for an example of setting an extended ACL:
/usr/bin/setfacl -s user:user4991:r-x,user::rwx,group::---,mask:r-x,other:---, /path/to/some/file
Read the manpage for setfacl.
Cheers,
Keith
6 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I am having this problem......when I run this script:
print -n "Enter file name to be deleted: "
read answer
if
then
rm $name
else
echo "No such file with the name: $name exists"
fi
I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies
2. Cybersecurity
Hello,
Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop.
But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown... (10 Replies)
Discussion started by: Bashar
10 Replies
3. Shell Programming and Scripting
Hi pls help me out to short out this problem
rm PAB113_011.out
rm: PAB113_011.out: override protection 644 (yes/no)? n
If i give y it remove the file.
But i added the rm command as a part of ksh file and i tried to remove the file. Its not removing and the the file prompting as... (9 Replies)
Discussion started by: sri_aue
9 Replies
4. Shell Programming and Scripting
Since I'm just new in unix, can I ask the experts on how I can develop or enhance a unix utility in protecting or securing a file using scripts.
Im thinking chmod, is it enought? or are there other utilities in unix?
My algorithm is like there will be a menu that shows a list of types of... (2 Replies)
Discussion started by: imjustjong
2 Replies
5. Linux
Hi All
I am working on a site to help newbie to learn linux for free.
demo.freelinuxconsole.info
there is only one file index.php its been able to rename or deleted.
Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies
6. Shell Programming and Scripting
Hi everyone,
I´m trying to protect the scripts I have made from changes.
At my office I´m the one who research improvements on daily tasks, and I´ve done many scripts, that I share with my partners.I´m tired because they take my scripts and make their owns with new features that don´t share... (4 Replies)
Discussion started by: dover07
4 Replies
LEARN ABOUT NETBSD
mprotect
MPROTECT(2) BSD System Calls Manual MPROTECT(2)
NAME
mprotect -- control the protection of pages
LIBRARY
Standard C Library (libc, -lc)
SYNOPSIS
#include <sys/mman.h>
int
mprotect(void *addr, size_t len, int prot);
DESCRIPTION
The mprotect() system call changes the specified pages to have protection prot. Not all implementations will guarantee protection on a page
basis; the granularity of protection changes may be as large as an entire region.
The protections (region accessibility) are specified in the prot argument by OR'ing the following values:
PROT_EXEC Pages may be executed.
PROT_READ Pages may be read.
PROT_WRITE Pages may be written.
PROT_NONE No permissions.
RETURN VALUES
Upon successful completion, a value of 0 is returned. Otherwise, a value of -1 is returned and errno is set to indicate the error.
ERRORS
[EACCES] A memory protection violation occurred, or the PROT_EXEC flag was attempted on pages which belong to a filesystem mounted
with the NOEXEC flag.
[EINVAL] An invalid memory range, or invalid parameters were provided.
[ENOMEM] A resource shortage occurred while internally calling uvm_map_protect(9).
SEE ALSO
madvise(2), mincore(2), msync(2), munmap(2)
HISTORY
The mprotect() function first appeared in 4.4BSD.
BSD
April 3, 2011 BSD