Useful Links
1. Introduction to Linux and System Administration
2. The Command-Line Interface (CLI)
3. User and Group Management
4. File Permissions and Ownership
5. Process Management
6. Software and Package Management
7. System Services and Daemons
8. Networking
9. Storage Management
10. System Security
11. Shell Scripting and Automation
12. System Monitoring and Performance
13. Backup and Recovery
14. Advanced Topics
  1. Computer Science
  2. Operating Systems
  3. Linux

Linux Administration

1. Introduction to Linux and System Administration
2. The Command-Line Interface (CLI)
3. User and Group Management
4. File Permissions and Ownership
5. Process Management
6. Software and Package Management
7. System Services and Daemons
8. Networking
9. Storage Management
10. System Security
11. Shell Scripting and Automation
12. System Monitoring and Performance
13. Backup and Recovery
14. Advanced Topics
  1. File Permissions and Ownership
    1. The Linux Permission Model
      1. Permission Types
        1. Read
          1. Write
            1. Execute
            2. Permission Classes
              1. User
                1. Group
                  1. Other
                  2. Default Permissions (umask)
                  3. Viewing and Modifying Permissions
                    1. Listing Permissions
                      1. Changing Permissions
                        1. Symbolic Notation
                          1. Octal Notation
                          2. Recursively Changing Permissions
                          3. Changing File Ownership
                            1. Changing Owner
                              1. Changing Group
                                1. Recursive Ownership Changes
                                2. Special Permissions
                                  1. SUID (Set User ID)
                                    1. SGID (Set Group ID)
                                      1. Sticky Bit
                                        1. Use Cases and Security Implications
                                        2. Access Control Lists (ACLs)
                                          1. Purpose and Use Cases
                                            1. Viewing ACLs
                                              1. Setting ACLs
                                                1. Removing ACLs

                                              Previous

                                              3. User and Group Management

                                              Go to top

                                              Next

                                              5. Process Management

                                              © 2025 Useful Links. All rights reserved.

                                              About•Bluesky•X.com