Define file permission in unix, Operating System

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components stored in the inode table entry for the folder.

Every file has permission or protection attributes for 3 levels or classifications of machine user, i.e.

  • User (u)
  • Group (g)
  • Other (o)

These permissions are loaded using the ls -l command. The permission mask is spited into three areas, also named levels of permission. The left most group of three functions are those permissions that apply to the operator, or individual who contains the file.
In that case, ownership is calculated by the user identification number given when the file is build. Don't lay about the user identification number at that point, we'll see closely at it when we see at how your user record is prepared and stored.

 

2250_File permission in unix.png

Posted Date: 7/28/2012 8:17:32 AM | Location : United States







Related Discussions:- Define file permission in unix, Assignment Help, Ask Question on Define file permission in unix, Get Answer, Expert's Help, Define file permission in unix Discussions

Write discussion on Define file permission in unix
Your posts are moderated
Related Questions
What are the common strategies to select a free hole from a set of available holes? The most common methods are a. First fit b. Best fit c. Worst fit

Recognition of essential syntactic constructs by reductions, this task is carried out by Recognition of essential syntactic constructs by reductions, this task is carried out

When we download a movie from the Internet, we don't care about, say, packet sizes. However, even ifwe are not aware of howlow-level details of networks are implemented, our data i

what is secondary storage management

what are the design issues of network OS

Conservative GC can be used for languages such as C and C++, which were not explicitly designed for garbage collection. This is a non-copying technique. A conservative garbage coll

What is the use of FIFOs in client-server applications

Translation Look aside Buffer In a cached system, the base addresses of the last few indexed pages is maintained in registers named the TLB that adds in faster lookup. TLB has

Q. Describe the three main architectural layers of Windows XP? Answer: (1) The HAL (Hardware Abstraction Layer) creates operating system portability by hiding hardware differ

Example 1.  The diagram illustrating the data structures of in-memory VFS objects and on-disk objects and their relationships on slide 24 of the lecture notes OSD.4. This diagram i