1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f

ile be compromised in this case? What are the limitations?
Computers and Technology
1 answer:
jeka943 years ago
8 0

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

You might be interested in
Ite the technical terms for the following:
mars1129 [50]

Answer:

  • Hardware
  • Operating system software
  • Application system software
  • Computer
5 0
3 years ago
What types of computers where made in the 2000s?
Margarita [4]

Answer:

Mac was made in 2000!!!!!!!!

6 0
3 years ago
A good hash algorithm is one that it cannot be reversed-engineerable or be easily attacked.
Free_Kalibri [48]

Answer:

A. True

Explanation:

7 0
3 years ago
Read 2 more answers
A ________ is a virus that is attached to documents such as word or excel files.
Olin [163]
A macro virus is a specific type of virus wherein it attaches to word processing documents like MS Word or MS Excel files. Furthermore, this virus would launch commands wherein it automatically starts certain programs that consume a lot of you computer memory. However, it could just be easily removed by an anti-malware tool.
6 0
3 years ago
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or
Artyom0805 [142]

Answer:

A. Do not use computer access or the Internet for unprofessional or inappropriate purposes.

7 0
3 years ago
Other questions:
  • _____ is published by the U.S. Bureau of Labor Statistics. It provides up-to-date career outlook information. It is no longer av
    15·2 answers
  • With a two-dimensional array, the ____ field holds the number of rows in the array.
    6·1 answer
  • Cual es la definición de grouded ​
    7·2 answers
  • Beverly is creating a website for her new clothing company. Aside from including photographs, how can she use the index page to
    8·2 answers
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
  • IF ANSWER I WILL BE REALLY HAPPY
    13·2 answers
  • Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure
    10·2 answers
  • How many micro processors will a small computer have? A. none B. two C. one D. three
    8·2 answers
  • Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that som
    14·1 answer
  • I'm pretty sure most of you know squid game, right? Well, are the actors really dying? or is it just CGI or effects? Because it'
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!