1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f

ile be compromised in this case? What are the limitations?
Computers and Technology
1 answer:
jeka943 years ago
8 0

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

You might be interested in
Which term describes the process of training a machine to do simple, repetitive tasks, and adapt or correct its performance base
yKpoI14uk [10]
Automation. ... It involves taking a machine or software that was taught to do simple repetitive tasks (traditional automation) and teaching it to intuitively adapt or correct its performance based on changing conditions, at speed and scale.
8 0
3 years ago
Jacob wants to track the profiles of users who visit his Web site. He would like to store the user’s age, income, and location.
mario62 [17]
Spreadsheet

Description
A spreadsheet is a computer application for organization, analysis and storage of data in tabular form where Jacob can store the user’s information.
7 0
3 years ago
A "slideument" is:
Sophie [7]

Answer:

c. An electronic slide that tries to function as both a presentation visual and a printed document

Explanation:

Slideument combines both text and visual aids to form a document that can be fully understood by readers without the use of speakers when presenting these documents. It is a presentation with information containing visual aids and presented in form of slide deck so that it can be easily understood by readers.

8 0
3 years ago
Describe personal computer skills using three adjectives?
Volgvan

Answer:

proficient with Microsoft word Excel and PowerPoint

Explanation:

compost and send over 150 images microsoftop creating and the formatting simple office budget speed sheets on Microsoft Excel Bros and its documents Microsoft word

5 0
2 years ago
Read 2 more answers
1. In the canonical form ,the no of variables is?
andrey2020 [161]

The canonical form of a positive integer in decimal representation is a A finite sequence of digits that does not start with zero. More generally, for a class of things on which an equivalence relation is defined, a ecclesiastical form consists in the choice of a specific object in each class.

<h3>What is inequality constraints?</h3>

Number of inequality constraints: While there is a restriction on the number of separate equality constraints, there is no restriction on the digit of inequality constraints.

<h3>What is equality and inequality constraints?</h3>

Terminology. If an inequality constraint holds with equivalency at the optimal point, the constraint is said to be binding, as the issue cannot be varied in the direction of the constraint even though doing so would enhance the value of the objective function.

To learn more about  canonical form, refer

brainly.com/question/14398127

#SPJ9

8 0
1 year ago
Other questions:
  • Why is a port scan detected from the same ip on a subnet an alarming alert to receive from yourids?
    5·1 answer
  • The ____ is a single user, nonportable computer designed to perform engineering, cad, and software development work.
    9·1 answer
  • Assume that an array named salarySteps whose elements are of type int and that has exactly five elements has already been declar
    11·1 answer
  • How does one select an entrepreneurial activity?
    9·1 answer
  • In what ways are hardware and software different? in what ways are the the same?
    10·2 answers
  • Which of the following rights is NOT guaranteed by copyright?
    11·1 answer
  • A company is concerned that hackers may gain access to its computer system or that it may be
    11·1 answer
  • Make a jingle about basic of photo editing<br>pls answer me asap​
    10·1 answer
  • An IP address specifically belongs to:
    10·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!