-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Linux File Security Training at the ACLU
,----[ Quote ]
| A couple of weeks ago you learned some user and
| group management basics with âUser and Group
| Management 101.â This week youâre entering the
| Access Control List University (ACLU) for an
| overview of advanced user and group management
| through the use of access control lists (ACLs).
|
| ACLs donât negate standard user and group
| management; they enhance it by expanding and
| simplifying complex permissions needs. User and
| group management, including ACLs, can fill an
| entire book so this introduction attempts to
| whet your appetite for a more in-depth
| investigation and isnât meant to provide a
| treatise on the topic.
`----
http://www.linux-mag.com/id/7772/
Rate your inner Linux geek as easy as ABC ...
,----[ Quote ]
| How geeky are you? How well do you know Linux?
| Give yourself a point for each command in the
| list over page that you know and two points if
| youâve used it.
`----
http://www.itwire.com/opinion-and-analysis/the-linux-distillery/38682-rate-your-inner-linux-geek-as-easy-as-abc-
Recent:
A Reminder to Purveyors of Linux
,----[ Quote ]
| Those who want to use Linux, Unix, or any one
| of the BSD distributions, are expected to know
| how to read with comprehension, know how to
| use a search engine â using actual arguments â
| and, above all else, have some level of
| patience.
|
| Todayâs average user has none of those skills.
`----
http://www.lockergnome.com/theoracle/2010/04/15/a-reminder-to-purveyors-of-linux/
Why I Want My Daughter to be a Hacker
,----[ Quote ]
| Letâs define what I mean by the term
| âhackerâ first. There is so much FUD out
| there around this term. Large controlling
| institutions want you to fear hackers, want
| you to think the hacker mindset is
| dangerous. This could not be farther from
| the truth. Hackers are simply empowered
| individuals that want to figure things out
| for themselves. With hacker properly
| defined, letâs get to the meat, why I want
| my daughter to be a hacker:
|
| 1. Hackers are not consumer lemmings â As
| large institutions continue to brainwash
| American citizens into becoming slaves to
| the systems theyâve created; hackers know
| that there is a life outside these systems
| of user dependence, a better life.
| Institutional dependence is literally
| killing us. Our dependence on the
| institutional food system has left us
| disease ridden and physically incapable.
| Dependence on western medical systems is
| bankrupting us. Our two major political
| parties both preach institutional
| dependence; one insists dependence on big
| government institutions, the other
| dependence on big corporate institutions.
| Hackers preach self and small community
| dependence. i.e. independence.
`----
http://offmygourd.wordpress.com/2010/04/13/why-i-want-my-daughter-to-be-a-hacker/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkvcl3cACgkQU4xAY3RXLo6eGwCglcJQxCJ89Bq5p+AErhEQ8JzY
0EYAn1yhZVXV1bf98aX33c1ehVhLplPT
=kGUz
-----END PGP SIGNATURE-----
|
|