StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

File management in UNIX - Essay Example

Comments (0) Cite this document
Summary
The reporter describes UNIX file system as a method of managing large amounts of data by storing and organizing them in a chronological manner (Pfleeger et al, 2003). Also known as file access rights, file protection, on the other hand, is a system that allows a user to create a file…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
File management in UNIX
Read TextPreview

Extract of sample "File management in UNIX"

File management in UNIX
A UNIX file system is a method of managing large amounts of data by storing and organizing them in a chronological manner (Pfleeger et al, 2003). Also known as file access rights, file protection on the other hand is a system that allows a user to create a file that has restricted access to only a few selected people. Editing abilities, which involves write and delete privileges are normally the same in a UNIX system since it allows one to overwrite a file with a different one.
An individual who creates a file is considered the owner and thus has the sole permission to manage that file (Garfinkel, et al, 2003). The owner therefore is the only person who can change the protection system of that particular file. However, other individuals often referred to as members, can also access that particular file if only they belong to that particular group. These members can therefore see each other’s file in the system. Groups are generally created for users of a common front, for example a group can be created for staff members of a particular organization.
In order to determine the owner of a particular file, the command ‘Is-I filename’ is typed. This gives the information about the owner and the particular details of the file. These details include;
1) The permission mode
2) The links
3) The owner
4) The group itself
5) The size of the group
6) The last date of modification
7) The file name.
The above data will be represented in the following manner;
drwxr-xr-x 2 sparks sparks 2033 dec 31 2011 saf.
The first column represents the permission mode; the second one is the link, followed by the group owner, then the group name, followed by the last date of modification then lastly the file name.
The permission mode therefore will determine the access rights to the group folder. There are several commands that describe the permission mode and these include:
i. d- directory
ii. r- read
iii. x- execute
iv. w- write
To create a protection scheme for the 4990 users to use one folder, the file permission can be arranged as follows. d-rwx- r-w - ---
From the above we can denote that the file is contained in a directory hence the first‘d’. The owner of the file has the permission to read, write and execute the file or group hence ‘rwx. The group members, which in this case are the 4990 users, have the permission to only read and write hence the commands ‘r-w’. Lastly, the other users, presumably the remaining 10 users, have no permissions or access to the folder, hence the command ‘---‘.
It also important to note that to change the permission of the file, the command ‘chmod’, meaning ‘change mode’ is followed (Jaeger & T., 2008). This can only be used by the owner of the file or group and is used together with the commands ‘ijk’; ‘i’ represents for the users permission, ‘j’ represents thegroups’ permission, while ‘k’ represents the other users permission.This can be illustrated as such; chmodijk file(s)
References
Garfinkel, S., Spafford, G., & Schwartz, A. (2003). Practical UNIX and Internet security. Beijing: O'Reilly
Pfleeger, C. P., &Pfleeger, S. L. (2003). Security in computing. Upper Saddle River, NJ: Prentice Hall PTR
Jaeger, T. (2008). Operating system security. San Rafael, CA: Morgan & Claypool Publishers Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“File management in UNIX Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
File management in UNIX Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/management/1607931-file-management-paper
(File Management in UNIX Essay Example | Topics and Well Written Essays - 500 Words)
File Management in UNIX Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/management/1607931-file-management-paper.
“File Management in UNIX Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/management/1607931-file-management-paper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF File management in UNIX

Practical UNIX Security

...Vulnerabilities and Exposure) provides a database to search for a particular public known vulnerability. The sponsors for CVE are US-CERT and managed by MITRE Corporation. The goal is to provide common names for all publicly known security threats and exposures. In order to extract information from CVE, access of National Vulnerability Database is mandatory (NVD) (Cve. 2011). (CVE) The Standard A comprehensive definition is available on the CVE website, which states as “Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known information security vulnerabilities, while its Common Configuration Enumeration (CCE™) provides identifiers for security configuration...
10 Pages(2500 words)Assignment

Practical UNIX Security

.... Chicago: O'Reilly Media, Inc. 43. Jeff Horwitz (2002). Unix system management: primer plus. London: Sams Publishing. 65. Jamsa Kris A., Klander Lars (2002). Hacker proof: the ultimate guide to network security. 2nd ed. Boston: Cengage Learning. 38. Kopper Karl (2005). The Linux Enterprise Cluster: build a highly available cluster with commodity hardware and free software. London: No Starch Press. 84. Konheim Alan G (2007). Computer security and cryptography. Chicago: Wiley-Interscience. 95. Loney (2005). Oracle Database 10G Dba Handbook. chicago: Tata McGraw-Hill. 64. Long Johnny, Ed Skoudis (2005). Google hacking for penetration testers. Boston: Syngress. 91. Morimoto Rand (2008). Microsoft Exchange...
10 Pages(2500 words)Assignment

Linux vs HP-UNIX

...will compile and run on Linux and is backward compatible. The "core, though, works exactly like the core API for every version of UNIX." (Harvard, 2000) File Management The UNIX file system are organized in a hierarchical fashion very similar to the fashion in which many corporations are organized (a tree structure) and similar files are clustered into a directory which then have subdirectories. This is the same concept as what is found in the Windows X and Macintosh systems. At the base of file hierarchy is the root directory which is accessed by a designated single slash (/). There are certain major directories...
4 Pages(1000 words)Essay

UNIX

...in their desktop models. Now however we are presented with the 3D interface that somehow accusingly is deemed not viable. The 3D interface has been hailed as the road to incredible virtual landscape discovery. It couples sound and graphic and enables a faster multiple file copying and file location. The purpose of this paper is to examine the phenomenon of 3D feature in the operating systems of Mac OS, the widespread Linux, Windows and more emphatically UNIX. Apart from its impact on the IT world we will consider a review and evaluation of multiple desktops, program launchers, file browsers, task switchers from a 3D standpoint. 3D Browser Screenshot 3D INTERFACE IN...
8 Pages(2000 words)Essay

Project Management(file one)

...Project management Number: Lecturer: Project Management Task Total Cost Baseline Variance Actual Remaining Planning $20,224.80 $17,844.00 $2,380.80 $12,733.20 $7,491.60 Identify partners $2,592.00 $3,240.00 ($648.00) $2,592.00 $0.00 Product listed budget $3,628.80 $2,160.00 $1,468.80 $3,628.80 $0.00 Marketing $5,424.00 $3,864.00 $1,560.00 $5,424.00 $0.00 Engineering design $5,720.00 $5,720.00 $0.00 $1,088.40 $4,631.60 Manufacture $2,860.00 $2,860.00 $0.00 $0.00 $2,860.00 Section 2: Baselining for Triple Constraint Variances Table 1 below on Cost Variance for new product launch, shows the required tasks to complete the deliverable for the shared drives work package were...
4 Pages(1000 words)Essay

File

...Russian Transformations and Various Social Responses Introduction Crimean war is considered disastrous in the history of Russia, and according to some authors this was the turning point that ultimately culminated in reforms which are considered the great reforms of 18601. The happenings of the war exposed the deficiencies of Russia in technological and scientific terms. The ultimate result of this happening was a war ridden Russia isolated at the international level. Russia was seen to be lagging far behind the other nations. The realization that the older system of governance is not effective for the future, forced the ruling class to think about alternatives. The civil society of that time participated actively in bringing about...
6 Pages(1500 words)Essay

File Management

... to as command-based file manager. The program comprises of three windows; one command line and two panels. This is among the oldest class of file managers. The developers create applications which extend and duplicate the Norton Commander interface for DOS. Such file managers have been developed extensively for use in Microsoft Windows, UNIX and DOS. Figure 3.2: Orthodox File Manager The panel windows of the orthodox file managers are found at the top of the screen while the command line is a minimized shell (command) window that is expansible to full screen. At any one time, only one screen can be active. The active panel contains a file cursor and is normally resizable. Files within the active panel serve as source files... Table of...
4 Pages(1000 words)Essay

File

... (9) assert that in the Great War, the western front played the role played by the eastern front in World War II which is the theatre where the outcome of the war was decided and France was the country where virtually the entire western front was located. The position of the western front and the character of the fighting that took place there made the Great War a life or death struggle for France and as such France to be sure had lost two large and prosperous provinces of Alsace and Lorraine in its defeat by Prussia in 1871. These regions were borderlands where people spoke German and Alsatian dialects at least as much as they spoke French though France managed to remain the same without these two territories. For the large swath... quick...
7 Pages(1750 words)Essay

File

...but managed to gain some of the land lost during the Franco-Prussian War. Although France was victorious in some sense, by the time the war ended the country had been left without an economic support system something which meant that it took longer to recover as compared to the other nations. In addition to this, the country suffered heavy civilian and military casualties. Even after the way, the treaties that were set up did not favor France and the world nations failed to recognize it as a major player. The World War I had brought about an unprecedented suffering on the French people, and the country had lost over 10% of its entire population. The impacts of the war became evident to the solders and even civilians,...
7 Pages(1750 words)Essay

UNIX SHELLS

...numerous commands at ago, hence manage to accomplish extremely intricate tasks that would have taken competing systems involvement of other extra resources. It has heightened stability and flexibility, which is an extremely helpful trait to global ventures that seek for effectiveness in powering respective web as well as mail services or products. It characterizes numerous devices due to its compatibility (UNIX, 2009). References (2009). Remote users connect to UNIX with reflection x advantage 2.0. (cover story). UNIX Update, 20(6), 1-3. Liu, Y., Yue, Y., & Guo, L. (2011). UNIX operating system: The development tutorial via UNIX...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic File management in UNIX for FREE!

Contact Us