Question:
Unix vs. Linux - file access mechanisms?
Tom
2012-04-23 05:27:38 UTC
Having investigated the file access control mechanisms used by one Microsoft operating system and one version of Linux.
Seven answers:
Greywolf
2012-04-23 05:29:49 UTC
Yes, that's right. UNIX and Linux have file access control mechanisms. To find out more, use Google.
ray_diator
2012-04-23 06:14:43 UTC
I'm not sure why you mentioned Microsoft because they have not connection with Unix or Linux.



Unix and Linux use the same file access mechanisms - but what is your question?
?
2016-10-22 11:29:31 UTC
i exploit a Mac and that i imagine it really is tremendous. Key issues to note about the Mac: it really is a steep studying curve coming from a abode windows depending device. that's style of further intense priced than your abode windows device. The classes you record gained't artwork natively on the mac. The Mac does assist you installation abode windows on it besides, so that you are able to run the abode windows applications. there's a version of microsoft workplace (note, excel etc...) for the Mac. good tip: i'd recommend going into your community apple keep and having a check out a 21" iMac or a fifteen" MacBook professional (later is a laptop, former a operating laptop or computer). i do not recognize a lot about Linux. i appreciate my Mac (some may say a touch too a lot) and that i'd recommend it to all and sundry. have you ever seen upgrading your laptop hardware tona faster device and boosting the operating device to abode windows 7? can be a touch extra maximum economical. wish this permits!
?
2012-04-23 05:38:49 UTC
What is your question?

It is very difficult to discuss about whole mechanism here. Read books on Operating Systems such as Dieterl&Dietel, Galvina,
?
2017-03-04 02:02:18 UTC
when you are watching a television set or movie it is very easy to get distracted and multi task, where reading a book, they have your full attention usually!
?
2017-01-31 22:29:36 UTC
Reading a good reserve offers a richer experience and can leave you with memory that can last years
2012-04-23 10:31:22 UTC
Hey Tom, the answer is



file access control is in many file system including linux 2.0 and windows 7

they both run the same **** basically . So if your not too much of a retard read the following and you will understand you fudu.



Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation. For instance, if a file has an ACL that contains (Alice, delete), this would give Alice permission to delete the file.

Contents [hide]

1 ACL-based security models

2 Filesystem ACLs

3 Networking ACLs

4 See also

5 References

6 External links

[edit]ACL-based security models



When a subject requests an operation on an object in an ACL-based security model the operating system first checks the ACL for an applicable entry to decide whether the requested operation is authorized. A key issue in the definition of any ACL-based security model is determining how access control lists are edited, namely which users and processes are granted ACL-modification access. ACL models may be applied to collections of objects as well as to individual entities within the system's hierarchy.

[edit]Filesystem ACLs



A Filesystem ACL is a data structure (usually a table) containing entries that specify individual user or group rights to specific system objects such as programs, processes, or files. These entries are known as access control entries (ACEs) in the Microsoft Windows NT[1], OpenVMS, Unix-like, and Mac OS X operating systems. Each accessible object contains an identifier to its ACL. The privileges or permissions determine specific access rights, such as whether a user can read from, write to, or execute an object. In some implementations an ACE can control whether or not a user, or group of users, may alter the ACL on an object.

Most of the Unix and Unix-like operating systems (e.g. Linux,[2] BSD, or Solaris) support POSIX.1e ACLs, based on an early POSIX draft that was abandoned. Many of them, for example AIX, FreeBSD,[3] Mac OS X beginning with version 10.4 ("Tiger"), or Solaris with ZFS filesystem,[4] support NFSv4 ACLs, which are part of the NFSv4 standard. There are two experimental implementations of NFSv4 ACLs for Linux: NFSv4 ACLs support for Ext3 filesystem[5] and recent Richacls,[6] which brings NFSv4 ACLs support for Ext4 filesystem.

[edit]Networking ACLs



Main article: Standard Access Control List

On some types of proprietary computer hardware, an Access Control List refers to rules that are applied to port numbers or network daemon names that are available on a host or other layer 3, each with a list of hosts and/or networks permitted to use the service. Both individual servers as well as routers can have network ACLs. Access control lists can generally be configured to control both inbound and outbound traffic, and in this context they are similar to firewalls. Like Firewalls, ACLs are subject to security regulations and standards such as PCI DSS.

[edit]See also



Standard Access Control List, Cisco-IOS configuration rules

Role-based access control

Confused deputy problem

Capability-based security

Cacls

DACL

[edit]References



^ "Managing Authorization and Access Control". Microsoft Technet.

^ Support for ACL and EA introduced in RHEL-3 in October 2003 [1] (the patch exists before, but officially in kernel since 2.6 released at December 2003)

^ http://wiki.freebsd.org/NFSv4_ACLs

^ "8. Using ACLs to Protect ZFS Files (Solaris ZFS Administration Guide) - Sun Microsystems". Docs.sun.com. 2009-10-01. Retrieved 2010-05-04.

^ "Native NFSv4 ACLs on Linux". Suse.de. Retrieved 2010-05-04.

^ "Richacls - Native NFSv4 ACLs on Linux". bestbits.at. 2011-09-01. Retrieved 2011-01-04.

[edit]External links



FreeBSD Handbook: File System Access Control Lists

SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements

Susan Hinrichs. "Operating System Security".

John Mitchell. "Access Control and Operating System Security".

Michael Clarkson. "Access Control".

Permissions: a primer or Dacl Sacl Owner Sid and Ace explained on the Helge Klein (creator of the free SetAcl tool for Windows) Website.

Microsoft

MSDN Library: Access Control Lists

Microsoft Technet: How Permissions Work

This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.

View page ratings

Rate this page

What's this?

Trustworthy

Objective

Complete

Well-written

I am highly knowledgeable about this topic (optional)



Submit ratings

Categories: Computer access control

Log in / create accountArticleTalkReadEditView history





Reference: Wikipedia.



Your a **** sucker.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...