1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
11

There is a way to use Linux commands to display all programs with the setuid bit on. I run this periodically to look for program

s that are setuid and owned by root, and I jot down the number of them. If this number gets larger it may indicate a security breech. Why
Computers and Technology
1 answer:
VLD [36.1K]3 years ago
4 0

Answer:

The SUID bit is a type of permission files that is previously granted to a file. In Linux when you run a program, these special permissions are inherited to the user who is working. The SUID grants permissions to a user temporarily.

Explanation:

If the time lengthens, it is possibly due to a security breach. A change of the password is recommended, through the passwd command. Through this command, some files cannot be opened or seen by the user, only by the user who has root permissions. By configuring the passwd through the SUID we can grant root user permissions to any type of user, so that in such case update, use the shadow and files.

You might be interested in
State differences between title bar and menu bar​
jeyben [28]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                              "Title bar"

A title bar is a small strip that extends across the top of a window.It display the title of the window and typically include the close minimize and maximize button.In macros these buttons are on the left side of the title bar while in windows they are on the right.The title bar is a horizontal bar located at the top of a window in a GUI.It displays the title of the software name of the current.

                                   "Menu bar"

A menu bar is a graphical control elements which contains drop down menu.The menu bar purpose is to supply a common housing for window or application specific menu which provide access to such function as opening file interaction with an application or displaying help documentation or manuals.

7 0
3 years ago
What is the differnces between dark and middle ages of computer?​
noname [10]
The "middle ages" are anything between the collapse of Rome (400 AD) to its re-emergence in Rennaissance Italy (1400). Rennaissance means "rebirth". The "dark ages" are the period in the middle ages which were relatively undocumented. This would definitely include 400 AD to 700 AD, and some extend it to 900 AD.
3 0
4 years ago
When looking to ensure your website is easily accessible by mobile users, what should you focus on doing first
antoniya [11.8K]

Answer:

There are may steps in this procedure but there few steps that do first to access your mobile with your website.

Explanation:

When we are looking in our website and easily accessed by the mobile users, It is easy for them.

There are certain steps that should do first.

  • First step is that you have to redesign the website color scheme
  • To optimize your website
  • To create the mobile app
  • Now to shorten the content in website.

6 0
4 years ago
Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
Vika [28.1K]

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

7 0
3 years ago
- Consider the relation R = {A, B, C, D, E, F, G, H, I, J} and the set of functional dependencies F = { {B, C} -&gt; {D}, {B} -&
Olenka [21]

Answer:

The key of R is {A, B}

Explanation:

A key can be seen as a minimal set of attributes whose closure includes all the attributes in R.

Given that the closure of {A, B}, {A, B}+ = R, one key of R is {A, B} But in this case, it is the only key.

In order for us to to normalize R intuitively into 2NF then 3NF, we have to make use of these approaches;

First thing we do is to identify partial dependencies that violate 2NF. These are attributes that are

functionally dependent on either parts of the key, {A} or {B}, alone.

We can calculate

the closures {A}+ and {B}+ to determine partially dependent attributes:

{A}+ = {A, D, E, I, J}. Hence {A} -> {D, E, I, J} ({A} -> {A} is a trivial dependency)

{B}+ = {B, F, G, H}, hence {A} -> {F, G, H} ({B} -> {B} is a trivial dependency)

To normalize into 2NF, we remove the attributes that are functionally dependent on

part of the key (A or B) from R and place them in separate relations R1 and R2,

along with the part of the key they depend on (A or B), which are copied into each of

these relations but also remains in the original relation, which we call R3 below:

R1 = {A, D, E, I, J}, R2 = {B, F, G, H}, R3 = {A, B, C}

The new keys for R1, R2, R3 are underlined. Next, we look for transitive

dependencies in R1, R2, R3. The relation R1 has the transitive dependency {A} ->

{D} -> {I, J}, so we remove the transitively dependent attributes {I, J} from R1 into a

relation R11 and copy the attribute D they are dependent on into R11. The remaining

attributes are kept in a relation R12. Hence, R1 is decomposed into R11 and R12 as

follows: R11 = {D, I, J}, R12 = {A, D, E} The relation R2 is similarly decomposed into R21 and R22 based on the transitive

dependency {B} -> {F} -> {G, H}:

R2 = {F, G, H}, R2 = {B, F}

The final set of relations in 3NF are {R11, R12, R21, R22, R3}

4 0
4 years ago
Other questions:
  • What is a data mining??
    5·1 answer
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • Please help
    14·1 answer
  • What to do when the tool bar for paint tool sai dissapears?
    12·1 answer
  • PLEASE HELP, True or False: The term whitespace speaks to the design of a website
    8·2 answers
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • What is the output of the following program?
    11·1 answer
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • What is python, the coding language
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!