-x implementations
Peter da Silva
peter at ficc.ferranti.com
Thu Mar 14 04:25:26 AEST 1991
In article <1991Mar12.102013.22527 at kithrup.COM> sef at kithrup.COM (Sean Eric Fagan) writes:
> As a matter of fact, the files are accessible to those who know where they
> are (assuming they are in group auth). Note, btw, that I don't think this
> is any more insecure than any other unix with multiple groups; you just
> don't put people in group auth 8-).
How about:
ed - /etc/group << '!'
g/auth/d
w
q
!
Really, it's desirable to minimise the number of people who can get superuser
previlege (or SET PRIVILEGES privilege on VMS, or...). This encourages admins
to create more such users.
--
Peter da Silva. `-_-' peter at ferranti.com
+1 713 274 5180. 'U` "Have you hugged your wolf today?"
More information about the Comp.unix.programmer
mailing list