I want to create a user on debian which can do following: Login via SSH. Create SVN repo and create post-commit hook. chmod and chown another directory to apache and 777. How I can achieve that? As far as I see I have several tasks to deal with: Create user Enable SSH login for it. Restrict it’s access to several directories and files. Restrict it’s access to several commands. Asked by Jevgeni Smirnov I would [...]Continue Reading »
I have WinXP installed in C:WINDOWS with 2 accounts: Administrator and user. The second one is limited and used for main work, but I also know a password for Administrator. I want to make an alarm clock via task scheduling, but I can’t! AT doesn’t work, saying access is denied under admin as well as under user. Ok, I’ve found an article: http://support.microsoft.com/kb/259907/en-us, stating LocalSystem account should have full access to root directory. No problem… [...]Continue Reading »
Consider following share rights: Security \devprofiles rw – AdministratorsSecurity \devprofilesbambus02 inherited AND rw – bambus02Sharing \devprofiles rw – Everyone as “bambus02″, my access to \devprofiles is denied, but access to \devprofilesbambus02 is allowed with full rights – this is really wished behaviour, but the question is: Why I am allowed to access a subfolder of a share, when on the path the higher folder (profiles) has access denied? Is it not the way how the [...]Continue Reading »
I brought Segate FreeAgent Go drive yesterday. I copied some Virtual Server hdds from my colleague’s hard disk to mine. Now if I try to run VM it says The virtual machine configuration could not be added. User does not have sufficient access rights. If I try to modify permissions from properties I get error that I don’t have access to file/folder. It sounds like you do not have permission to access these files, therefore [...]Continue Reading »
How can I create an FTP folder on my Plesk webserver that will be accessible from everyone without authentification?
I have a webserver running under Plesk 8.6 and I’d like to create a folder on it, where people can drop files and load files, accessible via FTP, but without login. The rest of the files and folders shouldn’t be accessed, just this one particular folder. I thought it would go throught the “Anonymous FTP”, but I can’T activate it using multiple IP. EDIT: I used “Putty” to try to create a group and a [...]Continue Reading »
When running SVN UP against a server some of my ubuntu systems doesn’t want to store a permanent exception. SVN output looks like this: Error validating server certificate for ‘https://aaa.bbb.ccc.se:443′: – The certificate is not issued by a trusted authority. Use the fingerprint to validate the certificate manually! Certificate information: – Hostname: aaa.bbb.ccc.se – Valid: from Tue, 29 Sep 2009 18:58:06 GMT until Thu, 29 Sep 2011 18:58:06 GMT – Issuer: CA, yyy, sss, Somewhere, [...]Continue Reading »
I’m in a bit of a situation. We have our private subversion server that we use for development, but one of our government clients is requesting access to our commit logs so that they can get an up-to-date picture of what we’ve been doing on the system. I don’t have a problem with them reading our commit logs, but what I do have a problem with is them having access to our source code – [...]Continue Reading »
Which security rights should user be given in AD when it should some attributes modification rights?
II would like to give a certain user (that will be used inside a program) access rights to Active Directory to be able to: Change passwords of other users Modify certain attributes of other users (like telephone number, title and so on) How to prepare such limited user in Active Directory 2003? If you right click the the domain root in Active Directory Users and Computers select “Delegate Control…”. It will bring up a wizard [...]Continue Reading »
Is there a way to attach mailbox in Outlook or thru OWA so that supervisor can see the content, monitor user how he/she handles the business with clients without marking the emails as read so they can be processed as normal emails by user? Management want to check how the newly employed people contact clients (users will be notified about possible reading of the emails that they send). Maybe setting some appropriate access rights on [...]Continue Reading »
- Understanding redundant power supplies
- Is there a way for administrators to disable users from installing Firefox extensions?
- Is there research material on NTP accuracy available?
- How to create a limited “domain admin” that does not have access to domain controllers?
- Can Windows RDC admin users be immune from being kicked?