chown, chgrp and chomd --- extra features and functionality

Besides the usual functions that chown , chgrp and chmod can perform (which is mentioned in man pages), is there any other hidden features and functions of the 3 commands mentioned above. (eg. history, sercurity, etc.)
Who is Participating?
wexConnect With a Mentor Commented:
My bet is that you're looking for the so-called "sticky" bits.  You can set these bits on files/executables (e.g. chmod +s <file>) and when they're used they will retain the identity and permissions of the file *creator* not of the file *user*.

In fact, this is one of the biggest security problems with UNIXen since programs are often set to run as user root when they have no need to do so.

I use the sticky bit for group work (mode g+s) so that everyone in my workgroup can read/write a common set of data files.
Depends on the flavour of your UNIX, some don't describe that you can change owner and group with one call: just by calling chown.

To answer your question in details, one need to know what your man pages say about those commands.
Which OS?
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

mwche2Author Commented:
All flavours of UNIX (Linux, Ultrixs, Solaris, BSD, System V(s), etc)
No ... I haven't seen any hidden feature in those commands for
AIX, Linux, Solaris, SunOS 4.1.X. If you're looking for security
holes in those command, you won't find one.

You might note that chmod has a -a flag for use on systems with ACL priveledges.  this flag makes it so that cown does not overrrite ACL's.

your question is extremely general.  possibly you are looking for a specific feature?  don't be surprised if no one can really help you on this, given the vagueness.
mwche2Author Commented:
Probably it'll be interesting to know about the possible implications of these commands, such as for breaching security holes, Trojan horses and hacking.
Given that, the answer is "no".
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.