This chapter reviewed the basics of traditional Linux filesystem permissions (such as the SUID and sticky bits) as well as some advanced topics such as access control lists, pros and cons and the potential dangers of root SUID programs, and data and filesystem encryption. In the next chapter, you'll find out how to monitor your SLES server performance and learn about basic system management techniques. |