Posts

Showing posts with the label Security

umask Contol Center

Image
Interstellar Permissions Unmasking umask for Galactic File Control Welcome to the captivating world of umask mastery in the Linux terminal, mighty captains! As you embark on this thrilling adventure, the umask command becomes your ultimate tool. It empowers you to finely adjust the permissions of files and directories, granting or restricting access to various in-game entities. This command serves as your portal to reshape file and directory permissions, allowing for a truly personalized and tailored gaming experience. Take your Examination, Captain! We need to make sure you can navigate this ship: 👮👇 https://www.certificationmethods.com/2023/05/lpi-e-umask-test.html Now let's explore this System! Display the current umask value: $ umask This command simply displays the current umask value in the terminal. It provides the octal representation of the umask, where each digit corresponds to the permissions subtracted from the owner, group, and others, respectively. Set a new umask v

CEH H9 - Zero Trust

Image
https://hakin9.org/security-of-zero-trust/ Security of Zero Trust Introduction In today's digital age, where cyber threats loom large and data breaches make headlines far too often, the need for robust security measures has never been more critical. Organizations worldwide are grappling with the challenge of protecting their sensitive information and critical assets from increasingly sophisticated attacks.[1] Zero Trust, a revolutionary cybersecurity strategy that challenges the conventional notion of network trust, has arrived. Unlike perimeter-based models that assume users and devices are trusted once inside the network, Zero Trust employs a more cautious and proactive approach. It assumes that no user or device should be inherently trusted, regardless of their location or network connection. But what is Zero Trust exactly? Zero Trust is a security framework that adheres to the concept "never trust, always verify". It advocates for the continuous authentication and aut

LPI E C1 - chmod test

Image
LPI Linux Essentials / C1 Knowledge Domain Topic 5:  Security and File Permissions   Practice Test Questions: 1. You want to modify the permissions of the directory "sensitive-docs" to make it more private. Which command would you use? a) chmod o-rwx sensitive-docs/ b) chmod u-rwx sensitive-docs/ c) chmod a-rwx sensitive-docs/ d) chmod g-rwx sensitive-docs/ /* --------------------- */ -------------------------- Answer 1 Below:  -------------------------- /* --------------------- */ Explanation : The command "chmod o-rwx" removes read, write, and execute permissions for others (users who are not the owner or part of the group) on the "sensitive-docs" directory, making it more private.   Answer 1: a) chmod o-rwx sensitive-docs/ 2. You need to view the permissions of the directory "top-secret" without displaying its contents. Which command would you use? a) ls -l top-secret/ b) ls -d top-secret/ c) ls -la top-secret/ d) ls -ld top-secret