Top 10 Cyber Security Tips
1.Be a responsible cyber citizen. If you use the Internet, you’re a citizen of a global community—a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge […]
Sticky Bit, Set User Id, Set Group Id in linux
Three special types of permissions are available for executable files and public directories: setuid, setgid, and sticky bit. When these permissions are set, any user who runs that executable file assumes the ID of the owner (or group) of the executable file. […]
Linux Chage command and Examples
Chage command syntax chage [-m mindays] [-M maxdays] [-d lastday] [-I inactive] [-E expiredate] [-W warndays] user We can go through some examples to get a better understanding of this command. TASK 1: Use chage command to list the password […]