In this lesson, you will learn more details about how Unix-like systems deal with user permissions and how to diagnose, control, and possibly terminate unresponsive programs.
By the end of this lesson, you will:
- Understand how the permissions system imparts system security.
- Know how to utilize various permissions-based commands, such as
id, umask, sudo,
etc. - Understand how to use various process-based commands, such as
ps, top, bg, kill,
etc.
Approximately 2 hours.
- Read chapters 9-10 from the free book The Linux Command Line (PDF) and follow along by entering the commands as directed into a terminal window within your virtual machine.
- Wikipedia article covering malware
- Chapters 2.16 and 2.17 of How Linux Works, which covers permissions and processes.
- Chapter 2.7 of The Linux Programming Interface which covers processes.
When you have completed and worked through the above readings, please take the Week 3 Lesson 1 Assessment.