Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Suppose we want to change the permissions of a file named newfile.
a) What user(s) can change the permissions of newfile?
b) How do we view what permissions are currently in place for that file?
c) What are the base file and directory permissions in most Debian Linux systems?
d) What permissions does the preconfigured umask set for new files and directories?
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
a) What user(s) can change the permissions of newfile?
VIEW b) How do we view what permissions are currently in place for that file?
VIEW c) What are the base file and directory permissions in most Debian Linux systems?
VIEW d) What permissions does the preconfigured umask set for new files and directories?
VIEW Step by stepSolved in 4 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-engineering and related others by exploring similar questions and additional content below.Similar questions
- The ACL for a hypothetical file in a Linux system is –rw-r-----. Briefly explain who can read and/or write this file. Do not explain each character in the ACL, but answer in broad terms as simply as you can.arrow_forwardGiven a linux file mode (permissions) as an integer, return the permission string that the mode represents. Example 1: mode = 511 511 == Ob111111111 permissons = 'rwxrwxrwx' Example 2: mode = 424 424 == ob110101000 permissions = 'rw-r-x---' def perms(mode): passarrow_forwardWrite the command that can be used to perform the following:a. Back up the contents of the /var directory (which contains symbolically linked files)to the second nonrewinding SCSI tape device on the system using the tar utility.b. Append the file /etc/inittab to the archive created in Exercise 3a.c. Create a tarball called /stuff.tar.gz that contains all files in the /root/stuff directory. d.Use the cpio utility to back up all files in the /var directory (which contains symbolicallylinked files) to the first rewinding IDE tape device that has a block size of5KB.e. Perform a full filesystem backup of the /var filesystem using the dump utility andrecord the event in the /etc/dumpdates file.f. View the contents of the archives created in Exercises 3a, c, d, and e.g. Extract the contents of the archives created in Exercises 3a and c to the /rootdirectory.h. Extract the contents of the archives created in Exercises 3d and e to their originallocations.arrow_forward
- Create a Linux shell script that will search for US phone numbers in files that are in a directory that has been passed in as a parameter to your script. The script must recognize phone numbers in the following formats: (570)555-1212, 570.555.1212, 570-555-1212, and +1.570.555.1212. Your script should also attempt to minimize false positives. The script should work on files that are compressed or uncompressed. This script could be useful to you if you were trying to find phone numbers on a filesystem image that you have mounted on your Linux forensics workstation. The output should be similar to the following, but you have some flexibility in the exact format: letter.docx: (312)555-1212 570.389.3000 intro.txt: 570-389-3000arrow_forwardWhat one line command accomplishes the following in Ubuntu-Linux: Imagine you found a file named README in a directory and tried to read the file using a text editor, but editor couldn’t properly display the contents. Instead, what you got was a bunch of weird characters. To view the contents of the file properly, you need to find out what type of file it is. What command will tell you what type of file README is?arrow_forwardA user belongs to a group that has all permissions on a file named linux.txt, but the user, as the owner of the file, has no permissions. Describe which operations, if any, the user/owner can perform on linux.txt. Which command can the user/owner give that will grant the user/owner all permissions on the file?arrow_forward
- Answer the questions in Linux command 1. Create a single command to read a file called program.c and write a file called unreadable.c, by replacing all newlines and tabs with spaces, and replacing all multiple consecutive spaces with a single space. The result should still be a legal C program but not exactly readable. 2. Write a single shell command line, possibly consisting of multiple commands (separated by semicolons), that will create a file diffs.txt containing a list of all files found in my Documents directory that aren’t also found in yours. Assume your current working directory is your home directory.arrow_forwardDraw a picture with 9 little boxes and fill in the 1s and Os for the mode for a file with permission modes of rwxr-x-- X rw-r- - r - - rwxr-x - - X rw-rw - r - - rw-r- - r - -arrow_forwardThis is regarding Linux System callsarrow_forward
- For linux: what would be the command to access or view the number of bytes in the file /sys/kernel/kexec_loaded? what commands are used to retrieve the information of who is the owner of the /boot subdirectory?arrow_forwardBook: Windows PowerShell step by step 3rd edition - Ed Wilsonarrow_forwardPelase slovearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY