Why can setting the CentOS 7 SUID bit to s be dangerous?
What will be an ideal response?
This permission can be dangerous because the ability to run someone else's programs allows other users to enjoy the permissions for the duration of the program run. This is how hackers get superuser rights; they break out of the running program and keep the resource permissions.
You might also like to view...
You can embed video ________ code manually into a document
Fill in the blank(s) with correct word
Excel automatically recalculates any formula when the input cells to that _______ are changed.
A. function B. formula C. format D. references
What are some of the features offered by current whole disk encryption tools?
What will be an ideal response?
The set of organizational guidelines that dictates certain behavior within the organization is called __________.
Fill in the blank(s) with the appropriate word(s).