suid
- 网络设置替代用户标识;设定使用者识别码;婴儿意外猝死;局部识别符;用户标识
-
In this case , no files had the suid bit set .
在此情况下,没有文件设置了suid位。
-
The passwd command is one of the few that must be suid .
passwd命令是少数必须为suid的命令之一。
-
SUID and SGID permissions can give all users access to specific files .
SUID和SGID许可能给所有的使用者对特定的文件存取。
-
You should have as few suid programs as possible .
您要尽量少地使用suid程序。
-
This indicates that , for this particular program , the suid and executable bits are set .
这就表示,对这个特定的程序来说,suid和可执行位已经被设置。
-
One alternative is setting the SUID and the SGID permission bits for a file .
一替代选择正在置位SUID和为一个文件SGID许可位元。
-
Next , we can try to run the program ( again without the suid bit ) under strace .
接下来,我们可以试着在strace之下运行这个程序(同样不设置suid位)。
-
The Linux permissions model has two special access modes called suid ( set user id ) and sgid ( set group id ) .
Linux权限模型有两个特殊的访问模式,名为suid(设置用户id)和sgid(设置组id)。
-
First , you do an audit of your system and make sure that you remove the suid bit from all your network binaries , like ssh
首先,应检查系统,确保已除去了所有网络二进制程序(如ssh)中的suid位
-
In the future , this first number may be usable to allow for new files that automatically include the SUID or SGID bits .
未来,这个第一个数目可能可使用考虑到自动地包括SUID或SGID位元的新的文件。
-
These standard tools are similar in functionality , but they limit the file system integrity control to files with suid and sgid flags .
这些标准工具功能相近,但是,它们把对文件系统完整性的控制限于有suid和sgid标志的文件。
-
Historian Lawrence Suid has said that the film 's action bears little more than a " remote resemblance " to the real event .
历史学家劳伦斯。苏德说过这部电影的情节与真实事件相差甚远。
-
The suid and sgid bits occupy the same space as the x bits for user and group in a long directory listing .
suid和sgid位与长目录清单中用户和组的x占据相同的空间。
-
It is a kind of common technique for a hacker to break into remote systems and to get root privileges using buffer overflow on UNIX suid programs .
通过对UNIX的suid程序使用缓冲区溢出攻击已成为黑客入侵远程系统并获取root权限的常用技术。
-
While suid and sgid are handy , and even necessary in many circumstances , improper use of these access mode can allow breaches of a system 's security .
虽然suid和sgid很便利,甚至在很多环境下是必需的,但是这些访问模式不适当的使用会造成系统安全上的漏洞。
-
For example , one common practice is to set the SUID bit for the KPPP Internet Connection Utility so all users can use it to dial in to the Internet .
举例来说,一个常见的做法将设定KPPP因特网连接公用程式如此所有使用者的SUID位元能使用它拨在对因特网。
-
Given this , you will not be surprised to learn that the crontab command , like the passwd command , is an suid program that runs with root authority .
因此,与passwd命令一样,crontab命令是一个用根权限运行的suid程序。
-
When an executable program has the suid access modes set , it will run as if it had been started by the file 's owner , rather than by the user who really started it .
当可执行的程序设置为suid访问模式,它就会开始运行,好像是由文件所有者启动而不是由真正启动它的用户启动。
-
All the set user ID ( SUID ) bit commands and programs shipped in AIX V7.1 have this feature enabled automatically , and no further configurations are required from an end user .
在AIXV7.1中,所有设置用户ID(SUID)位命令和程序都自动地启用此特性,不需要最终用户进一步配置。
-
If the file is executable , the suid or sgid bits , if set , will be displayed as lowercase s , otherwise they are displayed as uppercase S.
如果文件是可执行的,suid或sgid位如果已设置,将会显示为小写的s,否则就显示为大写的S。
-
Applying data mining algorithm to intrusion detection is a major research direction in computer security . Especially , when using data mining algorithm such as association analysis , sequence mining to analyze suid programs in Unix environment , the future is much promising .
将数据挖掘方法应用于入侵检测中研究的一个重要方向是,对Unix环境下特定程序运用关联、序列等数据挖掘算法。
-
It is displayed in a long directory listing in the place of the executable flag for other users ( the last character ), with the same meaning for upper and lower case as for suid and sgid .
它显示在其他用户的可执行标识中(最后的字符)的长目录清单,而且suid和sgid的大小写意义相同。
-
The suid and sgid bits are set and reset symbolically using the letter s ; for example , u + s sets the suid access mode , and g-s removes the sgid mode .
suid和sgid位使用字母s在符号上进行设置和重设;例如,u+s设置suid访问模式,g-s删除sgid模式。