Give the chmod command line that perform the same tasks that mesg n and mesg y commands do. (Hint: Every hardware device, including your terminal, has an associated file in the /dev directory.)

What will be an ideal response?

Take away the write permission from the group and others on your terminal file. Find out the name of your terminal file by using the who command (suppose the name of the terminal file is /dev/pts/0) and then execute the chmod go-w /dev/pts/0. After this command has been executed, nobody could write to your terminal file, i.e., your terminal’s display screen.

Computer Science & Information Technology

You might also like to view...

The guarantees offered by conventional servers may be violated by:

i) physical damage to the host; ii) Errors or inconsistencies by system adminstrators or their managers; iii)successful attacks on the security of the system software; iv)hardware or software errors. Give two examples of possible incidents for each type of violation. Which of them could be described as a breach of trust or a criminal act? Would they be breaches of trust if they occurred on a personal computer that was contributing some resources to a peer-to-peer service? Why is this relevant for peer-to-peer systems?

Computer Science & Information Technology

In the acronym ADA, the D stands for ______.

A. disabilities B. data C. device D. distance

Computer Science & Information Technology