Search results
Jump to navigation
Jump to search
Page title matches
- {{Short description|Technology for controlling access to file system items}} ...based technology as well as ACLs, the former is called ''traditional POSIX permissions'' for clarity even though it is not a well-known term. ...19 KB (2,761 words) - 04:21, 22 June 2025
Page text matches
- #REDIRECT [[File-system permissions#Traditional Unix permissions]] ...66 bytes (6 words) - 17:53, 13 August 2020
- #REDIRECT [[File-system permissions#Traditional Unix permissions]] ...66 bytes (6 words) - 17:53, 13 August 2020
- '''Permissions''' may refer to: * [[Application permissions]] ...377 bytes (40 words) - 17:38, 17 May 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:05, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:09, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 18:03, 8 August 2022
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:14, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:05, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:05, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:04, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:04, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:09, 12 August 2020
- #REDIRECT [[File-system permissions]] ...37 bytes (3 words) - 15:05, 12 August 2020
- * Read-only access to files or directories in [[file system permissions]] * Read-only access for [[database administrator]]s in database system permissions ...354 bytes (44 words) - 02:11, 30 July 2021
- *[[File system permissions]] ...105 bytes (12 words) - 18:21, 2 January 2023
- #REDIRECT [[File-system permissions]] <!-- [[WP:HOT]]list redirect --> ...70 bytes (9 words) - 15:11, 12 August 2020
- ...=DFVoodoo>{{cite web | last=Gruber | first=John | title=Seriously, 'Repair Permissions' Is Voodoo | work=Daring Fireball | publisher=John Gruber | url=http://dari ...curity_Overview/Concepts/chapter_3_section_9.html|title=Security Overview: Permissions|work=[[Apple Developer]]|access-date=April 4, 2007|url-status=dead|archive- ...5 KB (660 words) - 10:49, 21 March 2025
- ...'COPS''') was the first [[vulnerability scanner]] for [[Unix]] [[operating system]]s to achieve widespread use. It was created by [[Dan Farmer]] while he was ...ch programmed to audit one part of the operating system:<ref>COPS README.1 file{{Full citation needed|date=July 2024}}</ref> ...2 KB (315 words) - 06:03, 7 May 2025
- ...of [[Computer security|securing]] a [[Unix]] or [[Unix-like]] [[operating system]]. ===Permissions=== ...5 KB (695 words) - 13:11, 2 February 2025
- ...ems. The book contains troubleshooting tips, background information on the system and its commands, and examples to assist with learning. ...2 KB (276 words) - 00:40, 20 November 2023