Give the chmod command line that perform the same tasks that mesg n and mesg y commands do. (Hint: Every hardware device, including your terminal, has an associated file in the /dev directory.)
What will be an ideal response?
Take away the write permission from the group and others on your terminal file. Find out the name of your terminal file by using the who command (suppose the name of the terminal file is /dev/pts/0) and then execute the chmod go-w /dev/pts/0. After this command has been executed, nobody could write to your terminal file, i.e., your terminal’s display screen.
You might also like to view...
The guarantees offered by conventional servers may be violated by:
i) physical damage to the host; ii) Errors or inconsistencies by system adminstrators or their managers; iii)successful attacks on the security of the system software; iv)hardware or software errors. Give two examples of possible incidents for each type of violation. Which of them could be described as a breach of trust or a criminal act? Would they be breaches of trust if they occurred on a personal computer that was contributing some resources to a peer-to-peer service? Why is this relevant for peer-to-peer systems?
In the acronym ADA, the D stands for ______.
A. disabilities B. data C. device D. distance