Content providers and file permissions.
内容提供者和文件权限。
st_mode -- file permissions (user, other, group) and flags
st_mode——文件权限(用户、其他用户、组)和标志
This file should be protected with respective file permissions.
应该用相应的文件权限保护这个文件。
Now, look at the file permissions, because you changed the gid.
由于更改了GID,现在查看一下文件的权限。
Now, look at the file permissions, because you changed the uid.
由于更改了UID,现在我们查看文件的权限。
Multiuser operating systems store file permissions as metadata.
多使用者作业系统商店申请作为metadata的许可。
Therefore, the current file permissions may not match the default permissions.
因此,当前的文件许可可能与默认的许可不一致。
The name of the group that has file permissions in addition to the file's owner.
显示拥有文件权限的用户组(文件所有者拥有文件的权限)。
Can you imagine a user who has 40,000 files whose file permissions need to be changed?
可以想像,在更改一个拥有40,000个文件的用户文件权限时的任务是多么艰巨!
Understand file permissions, access levels, and why machines talk to the domain controllers.
比如文件权限、访问控制以及电脑怎样和域控制器交互。
This means you need to change the file permissions before you can make changes to the file.
这意思是说你对某文件做出更改的时候需要改变文件的许可。
The -p switch indicates that we want to preserve the file permissions, critical for a good backup.
p开关表示我们希望保留文件许可权限,这对良好的备份来说是很关键的。
If you do not have shell access, you can change file permissions with most decent FTP clients.
如果不能通过shell访问,可以通过更正规的FTP客户端更改文件授权。
File ownership in AIX is determined by the UID, and group file permissions are determined by the GID.
AIX中的文件所有权是由UID确定的,组文件权限是由GID确定的。
You may want to read more about Changing File Permissions and seeing hidden files on the server.
你可以在服务器上阅读更多的关于更改文件权限和查看影藏文件的内容。
Try changing the file permissions for BLDRTN, embprep, and spcat using the chmod command. For example.
请使用chmod命令来更改bldrtn、embprep和spcat的权限。
You can also do this by using a custom image in which you have set up the appropriate file permissions.
您也可以使用设置有适当文件权限的一个自定义映像。
The same security, file permissions, and other data is replicated between the NFS client and the NFS server.
将会在NFS客户端和NFS服务器之间复制相同的安全设置、文件权限和其他数据。
Answer: the file permissions on BLDRTN might have changed, depending on how you copied the files to your system.
解答:bldrtn文件的权限可能被更改过了,这与将文件复制到系统中的方法有关。
We have found some limitations, such as file permissions issues, when creating workspaces on the client machines.
我们发现了一些限制因素,例如在创建客户机上的工作区时,面临的文件许可权问题。
Now, you need to determine what the file permissions should be and then change them, as shown in the following sections.
现在,您需要确定应该是什么文件权限,然后更改它们,如以下部分所示。
Other USES such as setuid will be covered in the article Manage file permissions and ownership (see the series roadmap).
诸如setuid之类的用户将在管理文件权限和所有权(参见学习Linux, 101: LPIC - 1路线图)一文中介绍。
You should limit file system access to WebSphere Application Server's files by leveraging operating system file permissions.
应该利用操作系统文件权限来限制对WebSphereApplicationServer文件的文件系统访问。
With the right file permissions, you can set up commands in scripts to run when you want, even in the middle of the night.
借由正确的文件许可,当甚至在夜晚中,你想要的时候,你能建立在脚本中的指令运行。
The permissions field is displayed differently for files and directories, so I'll describe the way file permissions are displayed first.
文件和目录显示的权限字段有些区别。所以我先介绍一下文件权限的情况。
Set very restrictive file permissions — don't let anyone read or write files unless absolutely necessary, and use those special users and groups.
设置非常严格的文件权限——如果不是绝对需要,不要让所有人都可以读或写文件,并且使用那些特定的用户和组。
A DB2 instance may become unavailable for a number of reasons: file permissions mistakenly changed, files deleted, or file systems being unavailable.
DB 2实例可能由于各种原因而不可用:文件许可错误变更,文件删除,或者文件系统不可用。
System file permissions are automatically protected, and updated during Software Updates. The Repair permissions function is no longer necessary.
系统文件的权限被自动保护,并会在软件更新时进行更新。磁盘工具中的修复权限功能已经不再需要。
Listing 2 shows the permission changes needed to make the system compliant with the FPM command's high-level security without changing any actual file permissions.
清单2显示为了使系统遵从fpm命令的high级别安全性,并且不更改任何实际的文件许可,需要做出的许可更改。
Listing 2 shows the permission changes needed to make the system compliant with the FPM command's high-level security without changing any actual file permissions.
清单2显示为了使系统遵从fpm命令的high级别安全性,并且不更改任何实际的文件许可,需要做出的许可更改。
应用推荐