Tagged: user

1

Linux Chroot Command Tutorial with Examples

Linux provides different mechanisms for practical and security reasons. chroot is one of them. Processes in linux can access to the file system or root by default. Linux kernel also provides chroot mechanism to restrict access to the whole filesystem in Linux. Syntax The chroot syntax is like below.

OPTION is chroot...

0

Linux Etc Login.defs Configuration with Examples

Linux shadow password suite provides password related utils and configuration. /etc/login.defs or simple login.defs provides configuration about shadow utils. This file provides password, mail, user id, group id, user home related configuration. We will look all of the useful configurations in this tutorial. Login.defs Configuration File login.defs configuration file is located at /etc/login.defs ....

0

Security Roles and Responsibilities In Security Governance

Security role is the part where an individual plays in a complete organization security implementation and administration. In this tutorials different security roles and responsibilities in an organization. Senior Manager Senior Manager is responsible for all organization security. Senior Manager will have following roles and responsibilities Sign off all policy...

2

Linux Ulimit Command Tutorial with Examples To Increase Open File Limit

Linux kernel provides some configuration about system related limits and maximums. These are like maximum file handler count, maximum file locks, maximum process count etc. These limits are used to stay in safe area and do not bottleneck system performance. But sometimes these limits should be decreased or increased. ulimit is...

0

Linux Chmod Command Tutorial with Examples To Change Permission of Files and Folders

chmod command is used to change access permission of files and directories in Linux operating systems. chmod stands for change mode. Access permissions specifies whether a user account or group can read, write or execute given file and directory. Syntax Syntax of chmod command is like below.

Roles While managing access...

0

Linux Chown Command Tutorial with Examples To Change Ownership Of Files

chown command is used to change file and folders user , group and other ownership. chown is very useful tool but sometimes becomes very dangerous because it can harm current owner policy.chown mainly changes read , write and execute owner according to given user or group. Syntax Syntax of chown is like below.

List User and...

0

Git – Environment Setup and Basic Configuration

Installing git is easy with operating system provided packages like apt or dnf. We can track here Fedora way with dnf but it is very similar for other operating systems like CentOS, Debian, Ubuntu etc.

First-Time Configuration After installing git making some configuration will make usage of the git...

Enjoy this blog? Please spread the word :)