3.6. Exercises

image E3.1

Use the find command with the -perm option to locate five setuid files on your system. For each file, explain why the setuid mechanism is necessary for the command to function properly.

image E3.2

Create three “shocking nonsense” passphrases but keep them to yourself. Run your three passphrases through md5sum and report these results. Why is it safe to share the MD5 results?

image E3.3

Enumerate a sequence of commands ...

Get Linux Administration Handbook, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.