Consider the following case: Alice, Bob, and Eve are all users on a system using the Unix File Access Control system. Alice wants to create a file (that she will own) that she and Eve can both read and edit, but Bob can't.
Assign user IDs to all users and create any groups that are necessary, then use this information to specify the file's access control settings.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here