Библиотека сайта rus-linux.net
The security chapter is designed to give the user a very basic level of understanding of security within the GNU/Linux operating system. This chapter also has information on the UNIX system style file permissions used on most GNU/Linux machines.
There are also sites such as Linux Security. If your looking for a program to assist in locking down your operating system you may want to check Bastille Linux that runs on RPM based distributions (Redhat/Mandriva/SuSE).
This trick works well if you have forgotten your superuser password, type linux single at a LILO/Grub prompt. Then passwd once the system has started and you are at a console.
If you are using grub go to the relevant line (the one with the kernel and various options) then press 'e' for edit and add “single” on to the end of the lines that boot the kernel. Then hit [Enter] and press 'b' (to boot).
If you are using lilo press escape and type “ linux single” and then hit [Enter] to boot.
This is also a basic security hazard if you have others using your computer and security is a concern, you may like to add a password to your LILO or Grub prompt to stop this from being done.
The umask is a value set by the shell. It controls the default permissions of any file created during that shell session. This information is inherited from the shell's parent and is normally set in some configuration file by the root user (in my case /etc/profile).
umask has an unusual way of doing things ...to set the umask you must describe file permissions by saying what will be disabled.
You can do this by doing 777 minus the file permissions you want. Note that umask works with numbers only, for an explanation please see, Section 14.2
You want the default during a particular shell session to be equivalent to chmod 750 (user has r/w/x, group has r/x and other has no permissions), then the command you would use would be: