[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 31: Traditional Unix security model

Page 31

  
  Traditional Unix security model
  Root is god
  Certain actions require root privileges
  Binding low ports (<1024)
  Configuring network interfaces
  Mounting/unmounting filesystems
  Changing kernel parameters
  Loading kernel modules
  Accessing raw devices
  Suid/Sgid bits created to allow normal users to access privileged resources.

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at ISSA Puget Sound, 2003.

Presentation created using vim and MagicPoint.