From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
chmod - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
chmod
- Let's talk about the chmod command, and in this sub-lesson, we'll run a lab about file permissions. So chmod stands for change file mode bits, but what does that mean? We use chmod to change the permissions of files. It changes the mode by modifying the file mode bits associated with the file. For example, you might need to make a Bash script executable. This is easily done with the +x option, but what does this do? It changes the permissions for the user, the group, and other entities, and includes the executable option for all three of those. And we'll talk about those entities a little bit more in a little bit. So, let's move over to the lab. And this is Lab 29, File Permissions. In this lab, we're going to show chmod basics. We'll get into chmod permissions and a configuration table and some increased security with chmod. So we'll go to our Debian client here and we'll clear the screen of our rsync information, and we'll start with the lab. First, I want to make a directory…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)