This is the set of exercises following the article on Linux Permissions. If you carefully read the article and understood the principles detailed inside, you should be able to answer…
linux administration
-
-
This tutorial is a complete guide on understanding cron on Linux as well as the role of the crontab file. As a system administrator, it is very likely that you…
-
For a system administrator, it is very common to perform input or output redirection during its daily work. Input and output redirection is a very powerful tool, allowing you to…
-
This tutorial focuses on how to create swap space on Debian 10 via a swap file or a swap partition on your hard drive. On a Linux system, it is…
-
On Debian 10, users are able to change their password pretty easily. It is also possible, if you have sudo rights, to change user passwords as well as to define…
-
The Secure Shell (or SSH) is a cryptographic protocol enabling secure communication between clients and servers. SSH is widely used to connect to remote Linux systems in a secure way.…
-
In our previous article about file permissions, we had a quick discussion on the different file types that may exist on a Linux system. Standard files, directories, links, devices, sockets,…
- 1
- 2