Chapter 15. Shell Security

System security can often be a two-edged sword. Many companies spend large sums of money on system administration tools; often then inadequately train their admin staff. The first word of system resource shortages invariably comes from the programmers themselves.

At one company I worked for, the official policy was to prevent the programmers on the system from accessing the performance monitoring utilities. When head of administration discovered the tools were accessible, he ordered them to be made secure. After a couple of weeks, the staff silently enabled the utilities again because disabling them bottled up the company's first line of defense.

Security in a shell script, like system security, is a matter not of tightening ...

Get Linux Shell Scripting with Bash now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.