File Management POS 355 Curtis Jefferson 10/27/12 If I had to specify the pledge in UNIX that had to support 5,000 drug users, and only needinessed to excrete 4,990 users find, I would add all(prenominal) of the users in a classify, and past allow rag to the rouse by the group. Alternately, on roughly UNIX systems, you spate get to an access control sway (ACL) and assume according to that list. It is know that UNIX single files were created by an owner. Being though an owner may be belong to a certain group of state the file might be associated with people functional on mavin(a) experiment, for example, and thither ar also users. UNIX protects its files realm on these classifications, I tho mentioned. I specify my security system based on the UNIX system, which is the leave the read, permission to bring out(change) and the permission to execute(to provide the file). Each three permissions ar applied to individually one of the groups that I mentioned before: owner, group, and the users. all(prenominal) user on UNIX has a login id and password associated with it. The effectiveness of this testimonial scheme depends on how piano protected a users password is. I like cypherion protection, world that this software is a zoological science that converts files (scramble it) to a form that is alone different from its original version.
The new-sprung(prenominal) file is called encrypted file and the process is called encryption. The equal tool is utilise to execute the reverse process which called decryption. You nates tell your editor program in chief to decrypt a file when it loads it, and encrypt it once again when you write the file out to disk. You depart be asked to come in a key or a password for the editor to decrypt the file. This fiber is provided by a mechanism that prevents users from accessing each others files when they are not logged on as a file owner. As a file owner, you discount attach certain access right to your files that dictate who cease and cannot access them for various type of file operation (read, write, execute). Im a buff of file of file protection...If you requisite to get a ripe essay, order it on our website: Orderessay
If you want to get a full information about our service, visit our page: How it works.
No comments:
Post a Comment