Solved

How to rename directories under another user...

Posted on 2006-11-08
1
222 Views
Last Modified: 2013-12-15
I just installed SUse 10.0  and am learning to use it.  i'm a noob.

so, under root, in the GUI interface, I think i can rename directories... like i went into my public_html directory, and could create new one, and rename it....

but when logging in as a user... i don't have access to do that.  why not?  how do i set it up?  why's it not setup by default that way? (yeah sounds wierd, but for a pc that sits at home and is used by only me and my wife.... i wouldn't want to fiddle with settings that mundane)
0
Comment
Question by:alenknight
1 Comment
 
LVL 45

Accepted Solution

by:
sunnycoder earned 500 total points
ID: 17903978
Hi alenknight,

> but when logging in as a user... i don't have access to do that.  why not?  how do
> i set it up?  why's it not setup by default that way?
Files and directories in Linux have three sets of permissions -
1. For the owner
2. For the owner's group (of users)
3. For everyone else

Only exception is root user who can access everything ... Root account is normally used only for system configuration kind of tasks and typically system files can be modified only by root ... Also permissions are set up in such a way that file created by or present in root's directories are accessible only to root ... This is by design to keep the information of each user safe from other users and to protect the system configuration from accidental/malacious alteration by a new/rougue user.

highly recommended that you use a normal user account for normal use and "su" to superuser account whenever you need superuser permissions ...
man su for more details on su

Further reading
http://www.zzee.com/solutions/linux-permissions.shtml
http://www.comptechdoc.org/os/linux/usersguide/linux_ugfilesp.html
http://www.ahinc.com/linux101/permission.htm

Cheers!
sunnycoder
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Over the last ten+ years I have seen Linux configuration tools come and go. In the early days there was the tried-and-true, all-powerful linuxconf that many thought would remain the one and only Linux configuration tool until the end of times. Well,…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now