Solved

Redhat9 hidden folder - Howto

Posted on 2004-03-24
3
279 Views
Last Modified: 2010-04-20
How to hidden the folder in Redhat9 without using GUI such as GNOME or KDE...i mean in command line...thanks
0
Comment
Question by:learner79
3 Comments
 
LVL 12

Expert Comment

by:paullamhkg
ID: 10673850
normally you can create a hidden folder by add a dot infont of the folder name like this

mkdir .hiddenfolder

so the folder can not be see in normal way, but still can see using ls -al

if the folder already exist, try create as mentioned above and copy the data inside .

but why hidden it, try to thinking of protect it, that's mean restrict users to access other folders except his own by using chroot, have a check here http://www.tjw.org/chroot-login-HOWTO/
0
 
LVL 12

Accepted Solution

by:
stefan73 earned 20 total points
ID: 10675667
Hi learner79,

You can use all kinds of weird file names for your folder. For example, you can use the "cursor up" escape sequence in your file name:

perl -e 'rename "old file", "old file\x1b[A"'


Resulting in a different ls output:
sns452!mnstefan:~/other_stuff/hiding [107]> touch A B C
sns452!mnstefan:~/other_stuff/hiding [108]> ll
total 0
-rw-r--r--   1 mnstefan mnmaf          0 Mar 25 12:25 A
-rw-r--r--   1 mnstefan mnmaf          0 Mar 25 12:25 B
-rw-r--r--   1 mnstefan mnmaf          0 Mar 25 12:25 C
sns452!mnstefan:~/other_stuff/hiding [109]> perl -e 'rename "B", "B\x1b[A"'
sns452!mnstefan:~/other_stuff/hiding [110]> ll
total 0
-rw-r--r--   1 mnstefan mnmaf          0 Mar 25 12:25 A
-rw-r--r--   1 mnstefan mnmaf          0 Mar 25 12:25 C
sns452!mnstefan:~/other_stuff/hiding [111]>





More sequences:
http://www.inwap.com/pdp10/ansicode.txt

But that won't keep someone determined off your directory.

Cheers,

Stefan
0
 

Author Comment

by:learner79
ID: 10684199
Thank you
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
How many times have you wanted to quickly do the same thing to a list but found yourself typing it again and again? I first figured out a small time saver with the up arrow to recall the last command but that can only get you so far if you have a bi…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now