Posted
·
Edited by Ingolme Removed advertising link
In unix, with the exception of a few special system process, processes are generated by users (root and others) who have logged onto the system.
• During the login process the system queries the password file to obtain two identifications (ID) numbers.
• The numbers obtained are in the third and fourth fields of the password entry for the user.
• These are respectively , the “real user ID” (UID) and “real group ID”(GID) for the user.
Program displays the process’s real and effective UIDs and GIDs?
in General
Posted · Edited by Ingolme
Removed advertising link
In unix, with the exception of a few special system process, processes are generated by users (root and others) who have logged onto the system.
• During the login process the system queries the password file to obtain two identifications (ID) numbers.
• The numbers obtained are in the third and fourth fields of the password entry for the user.
• These are respectively , the “real user ID” (UID) and “real group ID”(GID) for the user.