6 More Discussions You Might Find Interesting
1. Fedora
Hi everyone,
I know the following questions are noobish questions but I am asking them because I am confused about the basics of history behind UNIX and LINUX.
Ok onto business, my questions are-:
Was/Is UNIX ever an open source operating system ?
If UNIX was... (21 Replies)
Discussion started by: sreyan32
21 Replies
2. Shell Programming and Scripting
Hi Friends
I'm new to this UNIX - I'm working on the porting project from Solaris To Linux i just want to map some commands from solaris to Linux so can any one please tell me how to get the source code of the commands like "ls", "cu", "du"
Regards
sabee (1 Reply)
Discussion started by: sabee.prakash
1 Replies
3. UNIX for Dummies Questions & Answers
Hello
what is the best open source antispam?
Thanks http://www.linuxforums.org/forum/images/smilies/icon_smile.gif (1 Reply)
Discussion started by: mohammadmahdi
1 Replies
4. UNIX for Dummies Questions & Answers
Hello
What is the best open source anti virus?
Thanks (4 Replies)
Discussion started by: mohammadmahdi
4 Replies
5. IP Networking
Hello there,
I wanted to know the members' opinion about the best open source network management software which uses a web browser to show its interface and results.
I am interested in the software for both windows and Linux OSs.
Thanks. (4 Replies)
Discussion started by: Jawwad
4 Replies
6. Post Here to Contact Site Administrators and Moderators
This is a slick looking forum. Any chance on making the code for the forum open source? (1 Reply)
Discussion started by: ecupirate1998
1 Replies
LEARN ABOUT FREEBSD
_secure_path
_SECURE_PATH(3) BSD Library Functions Manual _SECURE_PATH(3)
NAME
_secure_path -- determine if a file appears to be secure
LIBRARY
System Utilities Library (libutil, -lutil)
SYNOPSIS
#include <sys/types.h>
#include <libutil.h>
int
_secure_path(const char *path, uid_t uid, gid_t gid);
DESCRIPTION
This function does some basic security checking on a given path. It is intended to be used by processes running with root privileges in
order to decide whether or not to trust the contents of a given file. It uses a method often used to detect system compromise.
A file is considered 'secure' if it meets the following conditions:
1. The file exists, and is a regular file (not a symlink, device special or named pipe, etc.),
2. Is not world writable.
3. Is owned by the given uid or uid 0, if uid is not -1,
4. Is not group writable or it has group ownership by the given gid, if gid is not -1.
RETURN VALUES
This function returns zero if the file exists and may be considered secure, -2 if the file does not exist, and -1 otherwise to indicate a
security failure. The syslog(3) function is used to log any failure of this function, including the reason, at LOG_ERR priority.
SEE ALSO
lstat(2), syslog(3)
HISTORY
Code from which this function was derived was contributed to the FreeBSD project by Berkeley Software Design, Inc.
BUGS
The checks carried out are rudimentary and no attempt is made to eliminate race conditions between use of this function and access to the
file referenced.
BSD
May 2, 1997 BSD