LPI Linux Essentials Certification All-in-One Exam Guide by Robb Tracy

LPI Linux Essentials Certification All-in-One Exam Guide by Robb Tracy

Author:Robb Tracy [Tracy, Robb]
Language: eng
Format: epub, pdf
Tags: -
Publisher: McGraw-Hill Osborne Media
Published: 2013-04-14T22:00:00+00:00


Figure 8-1 The tux user’s system environment

Notice that tux has his own directory in /home named tux.

Within his home directory, he has a variety of subdirectories, including the following:

• Desktop Contains the files and icons displayed on the desktop.

• Documents Contains documents.

• public_html Contains personal Web pages.

• bin Contains executable files and scripts that tux may need to run. This directory is automatically added to the PATH environment variable for the tux user, so he doesn’t need to specify the full path to any executable stored here.

• Downloads Contains files downloaded from the Internet by ksanders’ web browser.

• Music Contains music files.

• Pictures Contains image files.

• Videos Contains video files.

When tux logs in to the system, his own desktop preferences are loaded and he has access to his files stored in /home/tux. If a different user logs in, his or her desktop preferences are loaded and access is provided to that user’s home directory. If the system has been configured to work on a computer network, then users can log in to the system remotely and access their desktop and home directory as if they were sitting in front of the computer. In this scenario, multiple users can be logged in and using the same computer at the same time.

Because Linux is a multiuser operating system, we need some way to control who has access to what in the system. For example, suppose you have a Linux system with five user accounts:

• ksanders

• jelison

• hsaez

• ebuchannan

• aebbert

You need some way to make sure each of these users can access what he or she needs in the file system and nothing more. For example, you need to ensure that hsaez can access her files but can’t access jelison’s files and directories. Imagine what a nightmare it would be if one user on the system could access and tinker with files owned by a different user.

Linux uses file system access controls that prevent users from accessing files and directories they shouldn’t. This is done using users, groups, ownership, and permissions.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.