When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. MAC times - Wikipedia

    en.wikipedia.org/wiki/MAC_times

    MAC times are pieces of file system metadata which record when certain events pertaining to a computer file occurred most recently. The events are usually described as "modification" (the data in the file was modified), "access" (some part of the file was read), and "metadata change" (the file's permissions or ownership were modified), although the acronym is derived from the "mtime", "atime ...

  3. stat (system call) - Wikipedia

    en.wikipedia.org/wiki/Stat_(system_call)

    st_atime – time of last access; st_mtime – time of last modification; st_ctime – time of last status change; st_blksize – preferred block size for file system I/O, which can depend upon both the system and the type of file system [4] st_blocks – number of blocks allocated in multiples of DEV_BSIZE (usually 512 bytes).

  4. File-system permissions - Wikipedia

    en.wikipedia.org/wiki/File-system_permissions

    When a file with setuid is executed, the resulting process will assume the effective user ID given to the owner class. This enables users to be treated temporarily as root (or another user). The set group ID, setgid, or SGID permission. When a file with setgid is executed, the resulting process will assume the group ID given to the group class ...

  5. inode - Wikipedia

    en.wikipedia.org/wiki/Inode

    The inode number indexes a table of inodes on the file system. From the inode number, the kernel's file system driver can access the inode contents, including the location of the file, thereby allowing access to the file. A file's inode number can be found using the ls -i command.

  6. Time-of-check to time-of-use - Wikipedia

    en.wikipedia.org/wiki/Time-of-check_to_time-of-use

    Here, access is intended to check whether the real user who executed the setuid program would normally be allowed to write the file (i.e., access checks the real userid rather than effective userid). This race condition is vulnerable to an attack:

  7. Access time - Wikipedia

    en.wikipedia.org/wiki/Access_time

    Access time is the time delay or latency between a request to an electronic system, and the access being initiated or the requested data returned.. In computer and software systems, it is the time interval between the point where an instruction control unit initiates a call to retrieve data or a request to store data, and the point at which delivery of the data is completed or the storage is ...

  8. File locking - Wikipedia

    en.wikipedia.org/wiki/File_locking

    File locking is a mechanism that restricts access to a computer file, or to a region of a file, by allowing only one user or process to modify or delete it at a specific time, and preventing reading of the file while it's being modified or deleted.

  9. Filesystem in Userspace - Wikipedia

    en.wikipedia.org/wiki/Filesystem_in_Userspace

    At the time the file system is mounted, the handler is registered with the kernel. If a user now issues read/write/stat requests for this newly mounted file system, the kernel forwards these IO-requests to the handler and then sends the handler's response back to the user. Unmounting a FUSE-based file system with the fusermount command