Unix security: Difference between revisions

Content deleted Content added
m Remove cliché phrase without citation
m Design concepts: Permissions: Already covered in the already linked "file system permissions" article. Code examples are of no use here. This isn't stackoverflow.
Line 6:
===Permissions===
A core security feature in these systems is the [[file system permissions]]. All files in a typical [[Unix filesystem]] have permissions set enabling different access to a file.
 
Permissions on a file are commonly set using the [[chmod]] command and seen through the [[ls]] command. For example:
-r-xr-xr-x 1 root wheel 745720 Sep 8 2002 /bin/sh
 
[[Unix permissions]] permit different users access to a file. Different ''user groups'' have different permissions on a file.
 
More advanced Unix filesystems include the ''Access Control List'' concept which allows permissions to be granted to multiple users or groups. An ''Access Control List'' may be used to grant permission to additional individual users or groups. For example:
/pvr [u::rwx,g::r-x,o::r-x/u::rwx,u:sue:rwx,g::r-x,m::rwx,o::r-x]
 
In this example, which is from the {{Not a typo|[[chacl]]}} command on the [[Linux]] operating system, the user '''sue''' is granted ''write'' permission to the ''/pvr'' directory.
 
===User groups===