1 00:00:00,920 --> 00:00:02,850 Hello, everyone, and Distomo. 2 00:00:02,990 --> 00:00:10,190 I'm going to show you how to use and apply the three special permissions, the six user I.D., the city 3 00:00:10,220 --> 00:00:12,550 girl Baida and the sticky bit. 4 00:00:13,370 --> 00:00:21,710 The mayor reason for using special permissions is to allow Alderney users to work on executable files 5 00:00:21,890 --> 00:00:28,950 and directories without asking a route for any help or to enter the routes passwords. 6 00:00:30,390 --> 00:00:38,780 What is the six user I.D. bit, the city user I.D. bit grants and Odagiri user to run an exhibit or 7 00:00:38,810 --> 00:00:41,250 files and programs as an owner. 8 00:00:41,700 --> 00:00:43,800 For example, let's run the command. 9 00:00:43,860 --> 00:00:51,420 Ellis Dash slash Ben slash B best WD as we can see here. 10 00:00:51,840 --> 00:00:56,940 This command has a six user I.D. beside the user. 11 00:00:58,570 --> 00:01:03,450 Permissions means that everyone on the system here kind of grand disconnect. 12 00:01:03,790 --> 00:01:04,300 Let's run. 13 00:01:04,300 --> 00:01:07,330 Another comment also has a secure Zygi. 14 00:01:07,600 --> 00:01:10,010 So we run the Ellis Dash L. 15 00:01:10,300 --> 00:01:17,110 Slash user slash Ben Slash as you as we can see. 16 00:01:17,470 --> 00:01:19,060 Also, we can't render comment. 17 00:01:19,210 --> 00:01:19,840 It's you. 18 00:01:20,320 --> 00:01:22,220 And it has also I see two Zygi. 19 00:01:22,300 --> 00:01:27,040 You can see here this is beside the user or the owner permissions. 20 00:01:27,400 --> 00:01:30,570 OK, now let's create a file. 21 00:01:31,000 --> 00:01:33,040 I'm going to create a script file. 22 00:01:33,280 --> 00:01:35,320 So I'm gonna call this one five. 23 00:01:36,410 --> 00:01:39,320 That is each perfect. 24 00:01:40,010 --> 00:01:42,740 Now let's shake the permission for this fight. 25 00:01:45,830 --> 00:01:54,140 As we can see here, despite doesn't have six user I.D., so how we can apply the site user I.D. on 26 00:01:54,140 --> 00:01:55,850 this Bashur script file. 27 00:01:56,570 --> 00:02:02,260 So we got to use the command change mocked if we'd like to know more about this command. 28 00:02:02,400 --> 00:02:03,120 We are under command. 29 00:02:03,200 --> 00:02:07,770 Man Change Mode can check the main page of disclaimer. 30 00:02:08,479 --> 00:02:09,050 Let's go back. 31 00:02:09,590 --> 00:02:19,130 Change what then what we're gonna do you this is represent the user then plus s then we gonna type the 32 00:02:19,130 --> 00:02:21,560 name of the file. 33 00:02:23,210 --> 00:02:24,410 Let's run the command again. 34 00:02:24,670 --> 00:02:25,670 Ellis Dash. 35 00:02:26,570 --> 00:02:28,130 Then the name of the file. 36 00:02:28,990 --> 00:02:29,860 S Edge. 37 00:02:30,300 --> 00:02:32,060 Perfect as we can see here. 38 00:02:32,720 --> 00:02:37,260 Now we apply to seat user I.D. on this file. 39 00:02:38,210 --> 00:02:38,440 OK. 40 00:02:39,020 --> 00:02:42,140 Now let's move on to the next type right now. 41 00:02:42,320 --> 00:02:43,940 What is the CIT Group? 42 00:02:44,210 --> 00:02:54,230 I bet it's a it's a similar concept of the CIT user I.D. However, it's a seek permission for any or 43 00:02:54,260 --> 00:03:01,880 for all the groups so we can apply just on the group's levels and it's grand and order user to run finance 44 00:03:01,880 --> 00:03:04,340 program as a member of the groups. 45 00:03:04,960 --> 00:03:05,190 OK. 46 00:03:05,270 --> 00:03:06,170 There is a command. 47 00:03:06,200 --> 00:03:08,230 We can run this command. 48 00:03:08,270 --> 00:03:13,400 Ellis Dash l slash user slash bean slash. 49 00:03:13,910 --> 00:03:14,440 Right. 50 00:03:19,530 --> 00:03:21,460 As we can see here, this command. 51 00:03:21,630 --> 00:03:26,610 So what is it it's there is to command, it is their right and will command. 52 00:03:26,670 --> 00:03:33,720 This is sent text message to another users on determinant on this one, as we can see here. 53 00:03:33,750 --> 00:03:36,410 This command has a set group idea. 54 00:03:36,420 --> 00:03:37,470 As we can see here. 55 00:03:38,070 --> 00:03:42,660 We have this on the group permissions. 56 00:03:44,160 --> 00:03:50,220 Less, less kids create a file on we gonna apply a six user I.D., for example. 57 00:03:50,250 --> 00:03:50,780 I'm Galkin. 58 00:03:50,850 --> 00:03:53,040 I'm gonna create a file here. 59 00:03:53,850 --> 00:03:58,190 I'm gonna call this file file to that DEEKS Steve. 60 00:03:58,680 --> 00:03:59,190 Perfect. 61 00:04:00,030 --> 00:04:02,900 Then I'm going to use that change more dingy. 62 00:04:02,940 --> 00:04:07,400 Plus s then file to that extent. 63 00:04:08,880 --> 00:04:13,060 I supplied so many of these file to. 64 00:04:14,860 --> 00:04:17,500 As we can see here after we. 65 00:04:19,230 --> 00:04:24,600 Run the command to change mode Geep plus s, then the name of the file. 66 00:04:25,230 --> 00:04:29,460 Now we have a set Grube I.D. for this fight. 67 00:04:31,020 --> 00:04:35,540 Let's move to the last time of that special permissions. 68 00:04:35,880 --> 00:04:36,590 The sticky bit. 69 00:04:37,050 --> 00:04:38,080 So what is this sick? 70 00:04:38,090 --> 00:04:47,030 Ibbett The sticky bits prevent anyone on the system to remove unmodified files except the owner and 71 00:04:47,030 --> 00:04:50,490 a root user who can remove and modify. 72 00:04:50,510 --> 00:04:51,750 Files and directories. 73 00:04:53,150 --> 00:04:53,490 There is a. 74 00:04:55,670 --> 00:04:56,840 Here it is a date. 75 00:04:57,000 --> 00:04:59,970 I'm going to run the comment unless dash l slash temp. 76 00:05:01,370 --> 00:05:07,190 So this I'm going to run it will with the deed, as we can see here. 77 00:05:07,640 --> 00:05:13,670 This file has a sticky bit D and we applied the sticky bit on the other. 78 00:05:14,870 --> 00:05:17,150 Permissions, run it again. 79 00:05:17,580 --> 00:05:19,130 Let's get yes, clear. 80 00:05:19,220 --> 00:05:20,720 I'm going to clear the screen here. 81 00:05:21,810 --> 00:05:23,280 You can see here the team. 82 00:05:24,920 --> 00:05:25,880 We have the team here. 83 00:05:26,030 --> 00:05:29,260 So does the team file has a sticky bit. 84 00:05:29,930 --> 00:05:31,720 Nobody can remove this file. 85 00:05:32,330 --> 00:05:34,400 Now, let's create a file. 86 00:05:35,750 --> 00:05:36,800 I'm going to create a directory. 87 00:05:37,060 --> 00:05:43,550 I'm gonna call this one is a sticky, perfect sticky directory. 88 00:05:43,550 --> 00:05:46,240 Does the short make directive perfect? 89 00:05:47,280 --> 00:05:51,980 And now what I'm gonna do, I'm gonna check the permission for this directory. 90 00:05:53,690 --> 00:05:55,460 So it doesn't have a sticky bit. 91 00:05:56,270 --> 00:06:01,820 Now, I want to I would like to apply to stick a bit on this fire, so I'm going to use the comment. 92 00:06:01,830 --> 00:06:03,570 Change what then? 93 00:06:04,070 --> 00:06:11,480 I'm going to use all this rubies in the other plus T as a stick stick a bit. 94 00:06:11,930 --> 00:06:14,470 This is the short for the sticky bit, sort of. 95 00:06:14,480 --> 00:06:16,850 I would like to apply a sticky bit. 96 00:06:17,150 --> 00:06:18,640 We have to use the letter T.. 97 00:06:19,390 --> 00:06:20,970 Dan, the name of the file. 98 00:06:22,190 --> 00:06:23,940 Let's run the command here to check. 99 00:06:24,170 --> 00:06:24,630 Oh. 100 00:06:25,010 --> 00:06:29,360 See over here we have a sticky bit on this file. 101 00:06:30,200 --> 00:06:30,590 Hope. 102 00:06:31,880 --> 00:06:34,970 I hope that you guys understood the three. 103 00:06:35,030 --> 00:06:36,700 The difference between the three types. 104 00:06:37,460 --> 00:06:41,210 This a city was an I.D. and Citigroup I.D. and a sticky bit. 105 00:06:41,510 --> 00:06:48,530 Just to recap, and I would like just to see somebody what we will what they just have explained to 106 00:06:48,530 --> 00:06:48,800 you. 107 00:06:49,040 --> 00:06:56,580 So the city has an I.D. We apply this this type on the user permission was it was gleeful deciduous 108 00:06:56,650 --> 00:06:57,140 Obeidi. 109 00:06:57,500 --> 00:07:04,310 We apply this type on on the group level just for the group, for group group admissions and for the 110 00:07:04,310 --> 00:07:06,600 sticky bit sticky bit. 111 00:07:06,620 --> 00:07:07,910 We apply them on the other. 112 00:07:08,270 --> 00:07:14,690 But the stickybeak defense, anyone on the system to remove and modify fives except the owner and which 113 00:07:14,750 --> 00:07:19,010 was a whole cut, remove, modify, Fi's or directress. 114 00:07:20,390 --> 00:07:21,590 That's concludes our session. 115 00:07:22,580 --> 00:07:23,150 Thank you. 116 00:07:23,220 --> 00:07:24,620 I see you in the next lesson.