Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
UNIX treats file directories in the same fashion as files; that is, both are defined by the same type of data structure, called an inode. As with files, directories include a nine-bit protection strong. If care is not taken, this can create access control problems. For example, consider a file with protection mode 644(octal) contained in a directory with protection mode 730. How might the file be compromised in this case? What can we do to stop this vulnerability without changing the protection mode 730 for the directory?
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Suggest an efficient scheme for maintaining a per-user protection scheme.That is, the system maintains one directory per user, and that directory lists allthe objects to which the user is allowed access. Your design should address theneeds of a system with 1000 users, of whom no more than 20 are active at anytime. Each user has an average of 200 permitted objects; there are 50,000 totalobjects in the system.arrow_forwardConsider user accounts on a computer system with a Web server configured to provide user Web areas. In general, this uses a standard directory name, such as “public_html,” in a user’s home directory. However, access control needs to be properly set to allow users (with or without user accounts on the system) to browse the webpages. Assuming there are one main page (index.html), two pictures files (a.jpg and b.jpg) stored in an sub-directory (Image) and one pdf file (c.pdf) stored in an sub-directory (Doc), all under the public_html. (a) Specify the access matrix for each directory (excluding home directory) and files that allows everyone to view the webpage. (b) Draw a directed graph that represented to the access matrixarrow_forwardSuppose we have a Unix file system with block size of 8 Kbyte and pointers with size of 4 bytes. How large a file can be represented using only single indirect pointer in inode? A. 8 Kbyte B. 2K * 8 Kbyte C. 2K * 2K * 8 Kbyte D. 2K * 2K * 2K * 8 Kbytearrow_forward
- The following four requests could come in to an operating system as it is running on a computer system: The clock in the computer has just “ticked,” and we need to update a seconds counter. The program running on processor 2 is trying to perform an illegal operation code. Someone pulled the plug on the power supply, and the system will run out of power in 50 msec. The disk has just read the character that passed under the read/write head, and it wants to store it in memory before the next one arrives. In what order should the operating system handle these requests?arrow_forwardFor this assignment, write a pair of programs, in C or as shell scripts, to send and receive a message. Your programs will: Send and receive a message by a covert channel on a MINIX 3 system. Hint: A permission bit can be seen even when a file is otherwise inaccessible, and the sleep command or system call is guaranteed to delay for a fixed time, set by its argument. Measure the data rate on an idle system. Create an artificially heavy load by starting up numerous different background processes and measure the data rate again.arrow_forwardAssuming 4K clustering for a 500-byte file, what is the size (in bytes) of the File Slack? O 12 bytes O 1536 bytes O 3584 bytes O 4096 bytesarrow_forward
- Minix Suppose a file is on a filesystem using a 1K block size. This file is maintained on thedisk using i-nodes as is typical on many UNIX filesystems (as described on pages 286-287 and789-790 of your text). Suppose there are seven direct pointers, and then a pointer to one singlydirect block, a pointer to a doubly indirect block, and a pointer to a triply indirect block. Suppose aprogram creates and opens a file in this filesystem, and then seeks to the following positions,writes a character, and then exits. Identify how many disk blocks, (both data and indirect blocks)must be allocated to store the data for the file. (Note that a-c each represent a different file.)a. Seek to 9000b. Seek to 300000c. Seek to 67,000,000How big would a file need to be to require the triply indirect pointer?arrow_forwardLoad infile using one byte per channel and save it as a PNG, using outfile for the file name. Use one byte per channel. graphics.cpp 1 #define STB IMAGE IMPLEMENTATION 2 #define STB IMAGE WRITE IMPLEMENTATION #include "stb_image.h" #include "stb_image_write.h" 3 4 #include #include 7 using namespace std; 8 9. int main() 10 { string infile = "pete.png"; string outfile = "out.png"; 11 12 13 14 15 16 17 } CodeCheck Resetarrow_forwardGiven the following data file: STUDENT(ID, SNAME, ADDRESS, LEVEL, GPA, …) Suppose that: record size R = 200 bytes block size B = 512 bytes r = 2000 records Then, Find out: Blocking factor(Bfr) Bfr=B/R Number of file blocks(b) b=r/bfrarrow_forward
- - Let's assume that a system can handle 2,000 users. a UNIX security system that permits 1,990 users to view a single file called "MPX.pdf" is suggested. Do you have any plans for the other ten people who don't have access to the file?arrow_forwardWhat would happen if a directive were disregarded? In the following circumstances, a software-managed TLB is faster than a hardware-managed TLB:arrow_forwardThe beginning of a free space bitmap looks like this after the disk partition is first formatted: 1000 0000 0000 0000 (the first block is used by the root directory). The system always searches for free blocks starting at the lowest-numbered block, so after writing file A, which uses six blocks, the bitmap looks like this: 1111 1110 0000 0000. Show the bitmap after each of the following additional actions: (A) File A is deleted (B) File C is written, using eight blocks (C) File B is deleted.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education