1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f

ile be compromised in this case? What are the limitations?
Computers and Technology
1 answer:
jeka943 years ago
8 0

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

You might be interested in
Which of the following is not a true statement about Christopher Columbus it oko
Thepotemich [5.8K]

Answer:

  • There has been a need to explore the different regions across the globe in the early ages, as there were ships to travel but there was no one before who knew about the different routes and maps of the region, so, it was sort of blind folded traveling when some one wanted to go far distances yet some of them knew about other regions on the far sides of many seas having a unique culture, different languages, along with having diversity among the flora and fauna inside the region.
  • So, like many other curious people across the globe there was a need for the people to explore all the regions. As, it was a need for the travelers and all the rest of free fork to know about this world. Now, every wanted to know more about the different lands but there were few who even performed the great feat, as they had fear for their lives.While, Christopher Columbus was more into sacrificing his own life in order to explore the lands at the far lands across the Pacific ocean. As, he arranged his mind and covered all the required arrangements for the journey.
  • As, was at first wanted to explore the lands of far east and thus wanted to more about the Subcontinent India, but in turn he reached the lands of the American continent in far west.While, upon arriving the American region we say many people with different skin tone, culture and language which was very different then he heard about the people of India.There was more different world then he could ever think of as he had a lot to tell about these lands upon the way back to Europe or his home land.

7 0
3 years ago
Two electronics technicians are looking at the piece of testing equipment shown in the figure above. Technician A says that this
Ilya [14]
B is your correct answer.
8 0
3 years ago
Read 2 more answers
"kannst du mir bitte helfen" in German-English from Reverso Context: Hier, kannst du mir bitte helfen?
tatuchka [14]

Answer:

"Come help me, please" "Can you help me here?"

Explanation:

Some form of question or help, i think...

4 0
2 years ago
WHO LOVES THE KREW LOOK IT UP ON YOU_TUBE IF UR NOT SURE BUT PLZ SUBSCRIBE TO HER SHE DA BEST "YOOT" the one with pink and golde
kodGreya [7K]

Answer:

i like her mate :3 glad im not alone!

Explanation:

7 0
3 years ago
Read 3 more answers
Only numbers should go in the columns for Payload Size and Packet Size. The sizes are in bytes. Don't forget to account for the
Anna11 [10]

Answer:

Non-Payload Bytes sent are 1476(total) - 393 (payload) = 1083 bytes

1083 (non-payload) out of 1476(total) is 73.37 %

Non-Hello bytes sent are 1476(total) - 53(hello payload) = 1425 bytes

1425(non-hello) out of 1476(total) is 96.54 %

7 0
3 years ago
Other questions:
  • You have informed your users that you need to bring the machine down at the end of the day to perform routine maintenance. Howev
    14·1 answer
  • Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even
    12·1 answer
  • What is the definition of posture<br>​
    7·1 answer
  • Write a program in C/C++ to draw the following points: (0.0,0.0), (20.0,0.0), (20.0,20.0), (0.0,20.0) and (10.0,25.0). For this
    6·1 answer
  • What is the difference between an activity inventory and an object inventory?
    8·1 answer
  • Which of the following symbols is a part of all spreadsheet functions?
    7·2 answers
  • What is block chain?
    5·2 answers
  • Software that enables the organization to centralize data is called A. Data Repository B. Data Base Management System C. Data Wa
    6·1 answer
  • What is hub.pls ans from pic. for computers​
    9·2 answers
  • Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!