LPI Linux Essentials Certification All-in-One Exam Guide by Robb Tracy
Author:Robb Tracy [Tracy, Robb]
Language: eng
Format: epub, pdf
Tags: -
Publisher: McGraw-Hill Osborne Media
Published: 2013-04-14T22:00:00+00:00
Figure 8-1 The tux user’s system environment
Notice that tux has his own directory in /home named tux.
Within his home directory, he has a variety of subdirectories, including the following:
• Desktop Contains the files and icons displayed on the desktop.
• Documents Contains documents.
• public_html Contains personal Web pages.
• bin Contains executable files and scripts that tux may need to run. This directory is automatically added to the PATH environment variable for the tux user, so he doesn’t need to specify the full path to any executable stored here.
• Downloads Contains files downloaded from the Internet by ksanders’ web browser.
• Music Contains music files.
• Pictures Contains image files.
• Videos Contains video files.
When tux logs in to the system, his own desktop preferences are loaded and he has access to his files stored in /home/tux. If a different user logs in, his or her desktop preferences are loaded and access is provided to that user’s home directory. If the system has been configured to work on a computer network, then users can log in to the system remotely and access their desktop and home directory as if they were sitting in front of the computer. In this scenario, multiple users can be logged in and using the same computer at the same time.
Because Linux is a multiuser operating system, we need some way to control who has access to what in the system. For example, suppose you have a Linux system with five user accounts:
• ksanders
• jelison
• hsaez
• ebuchannan
• aebbert
You need some way to make sure each of these users can access what he or she needs in the file system and nothing more. For example, you need to ensure that hsaez can access her files but can’t access jelison’s files and directories. Imagine what a nightmare it would be if one user on the system could access and tinker with files owned by a different user.
Linux uses file system access controls that prevent users from accessing files and directories they shouldn’t. This is done using users, groups, ownership, and permissions.
Download
LPI Linux Essentials Certification All-in-One Exam Guide by Robb Tracy.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7746)
Grails in Action by Glen Smith Peter Ledbrook(7668)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6248)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6208)
Running Windows Containers on AWS by Marcio Morales(5732)
Kotlin in Action by Dmitry Jemerov(5020)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4739)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4397)
Combating Crime on the Dark Web by Nearchos Nearchou(4328)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3999)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3991)
The Age of Surveillance Capitalism by Shoshana Zuboff(3915)
Python for Security and Networking - Third Edition by José Manuel Ortega(3551)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3490)
Mastering Python for Networking and Security by José Manuel Ortega(3322)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3312)
Blockchain Basics by Daniel Drescher(3275)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3229)
TCP IP by Todd Lammle(2960)
