From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
chown and chgrp - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
chown and chgrp
- Let's talk about ownership. We're going to be working with the chown command and the CHGRP, or CH group command in Linux, and we're going to be hovering around Lab 30, and so if you want to follow along, it's Lab 30 within the repository called Ownership. And I'm going to be working at my Debian client and working with ownership of the files that we created in the previous sub lesson. So we're going to work with ownership basics, and also the chown and chgrp commands. And we talked about assigning permissions to files. We mentioned how they can be assigned to the user, the group, and the other entities. The question is, who or what is the owner of these files? Well, in Linux, the answer is twofold. There is user ownership and there's group ownership. So let's look at this file once again, if you go past the permissions, you'll see the username twice here. So I created the file as my user account, so I get ownership of the file. This is known as user ownership right here. This is…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)