Define file permission in unix, Operating System

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components stored in the inode table entry for the folder.

Every file has permission or protection attributes for 3 levels or classifications of machine user, i.e.

  • User (u)
  • Group (g)
  • Other (o)

These permissions are loaded using the ls -l command. The permission mask is spited into three areas, also named levels of permission. The left most group of three functions are those permissions that apply to the operator, or individual who contains the file.
In that case, ownership is calculated by the user identification number given when the file is build. Don't lay about the user identification number at that point, we'll see closely at it when we see at how your user record is prepared and stored.

 

2250_File permission in unix.png

Posted Date: 7/28/2012 8:17:32 AM | Location : United States







Related Discussions:- Define file permission in unix, Assignment Help, Ask Question on Define file permission in unix, Get Answer, Expert's Help, Define file permission in unix Discussions

Write discussion on Define file permission in unix
Your posts are moderated
Related Questions
Interrupts The hardware mechanism that enables a device to inform the CPU is called an interrupt. The basic interrupt mechanism works as follows. The CPU hardware has a wire kn

Define LRU Page Replacement Algorithm LRU policy: LRU expands to least currently use. This policy suggests which we re- move a page whose last usage is farthest from current ti

KERNEL-LEVEL THREADS (KLT) In this level every thread management is done by kernel .No thread library except an API system calls to the kernel thread facility exists. The kern

What is an acyclic graph? A tree that has been corrupted by links to other branches, but does not have any cyclic paths in it.

Explain Rehashing to Handle Collision Rehashing:  Re-hashing schemes make use of a second hashing operation while there is a collision. If there is an additional collision, we

Explain the Spawnvp Function used in the netware Spawnvp(flags, execNmae, argv)   This function executes  similarly to spawnlp( ) except that parameters are passed as a v

What disadvantages are there to this two-level directory? Without other provisions, two users who require cooperating with each other are hampered in reaching every other's fi

Define entry section and exit section. The critical section problem is to design a protocol that the processes can use to cooperate. Every process must request permission  to e

What is paging? Name the different paging techniques. Paging is a memory management method that permits the physical-address space of a process to be noncontiguous. Paging evad

Describe paging technique used in UNIX systems. When a process begin in UNIX, not every its memory pages are read in from the disk at once. In its place, the kernel loads into