today's howtos
-
The New Stack ☛ A Guide to Linux Access Control Lists
Those of us who shift rapidly between Linux and Microsoft Windows recognize some fundamental differences. One of these is permissions. Standard Linux permissions are pretty simple: Designate one user, one group, and then anyone else (known as “others”), and grant read, write, and execute permissions as necessary. Windows permissions are far more complex, with nesting, more access levels, and the mixing in of Share permissions. However, in many ways, Windows permissions are also more flexible and practical at scale.
This article covers Linux access control lists (ACLs), which provide significantly more flexibility than standard Linux permissions. I’ll discuss viewing and configuring ACLs for multiple individual users and multiple groups. Chances are, your Linux distribution of choice already enables ACLs (ACLs are actually a function of the filesystem).
-
Network World ☛ Understanding exit codes on Linux
An exit code other than 0 indicates that a script or a command has failed in some way. Learn more about exit codes and the types of errors they represent in this post.
-
Network World ☛ Making use of command history on Linux
Command history on Linux allows you to review and repeat previous commands with little effort. It is built into the bash shell (included in the shell executable). It’s a helpful feature if you want to rerun commands without retyping them or examine recently run commands when you’re trying to determine when or how some recent change might have been made.
If you type “which history” on the command line, you can expect to see a response that indicates the shell can’t find it. Of course, that’s only because the which command is looking for an executable to run – not for a shell built-in.
-
TechTarget ☛ The suite of tools that comprise tcpreplay offers administrators a variety of network security options. Learn some of the benefits of this free utility.
The suite of tools that comprise tcpreplay offers administrators a variety of network security options. Learn some of the benefits of this free utility.