You are not logged in.
Pages: 1
Sorry, This contained false information.
Last edited by bai4Iej2need (2023-09-16 04:16:09)
The devil, you know, is better than the angel, you don't know. by a British Citizen, I don't know too good.
One generation abandons the enterprises of another like stranded vessels. By Henry David Thoreau, WALDEN, Economy. Line 236 (Gutenberg text Version)
broken by design :
https://bugs.debian.org/cgi-bin/bugrepo … bug=958390
Offline
This thread
I do two things on each new install:
1. security
chmod 700 /home/*/
The main problem I can think of is that that command will set the execute bit on all files, even those that aren’t executable. So, if you have a file called foo, and someday you want to do cat foo or print foo and you accidentally type just foo, the shell will try to execute foo; i.e., interpret it as a shell script.
This will probably just explode in your face harmlessly, but if foo contains anything that looks like a shell command, you could get harmful results.
A lesser issue is that if you have a file that you want to preserve, and last year you did a
chmod 444
to protect it from yourself,
the chmod 700
will restore your write bit, and make it easier for you to clobber the file accidentally.
The solution to both issues is to do
chmod go= -R ~
or
chmod go-rwx -R ~
which will turn off all bits for group and others, but leave your access alone.
Offline
Pages: 1