('-. .-.            _ .-') _  _  .-')     ('-.       .-') _
( OO )  /           ( (  OO) )( \( -O )   ( OO ).-.  (  OO) )
,--. ,--. ,--.   ,--.\     .'_ ,------.   / . --. /,(_)----.
|  | |  |  \  `.'  / ,`'--..._)|   /`. '  | \-.  \ |       |
|   .|  |.-')     /  |  |  \  '|  /  | |.-'-'  |  |'--.   /
|       (OO  \   /   |  |   ' ||  |_.' | \| |_.'  |(_/   /
|  .-.  ||   /  /\_  |  |   / :|  .  '.'  |  .-.  | /   /___
|  | |  |`-./  /.__) |  '--'  /|  |\  \   |  | |  ||        |
`--' `--'  `--'      `-------' `--' '--'  `--' `--'`--------'
                          @tilde.guru

Module 2


1. The All-Powerful "Root" and sudo

The Root user is the god-mode account. It can delete the entire operating system with one command. Because that's dangerous, we use sudo (SubUser DO).

Command: sudo [command]

Analogy: It’s like a security guard giving you a temporary master key. You perform one task, then give the key back.


2. Understanding Permissions (ls -l)

When you run ls -l, you see a string like this: -rwxr-xr--

This string is broken into three sets of three:

The Letters:


3. Changing Permissions (chmod)

You change permissions using the chmod command. The easiest way is using numbers:

You add them together to get the permission level.

~

urug.edlit@zardyh