Flashcard Set: Linux Security


Feedback and comments

What do you think?

Sign in to add comments.


0 memorized 78 to go
Help for Help for progress bar
The Progress Bar keeps track of flashcards you have learned using the Memorization Tool.
To take advantage of YoYoBrain's Memorization Tool, click "Memorize and Review."
New Card Training
All not-yet-memorized cards

These work outs focus on cards you've not yet memorized successfully. Try it - works like a charm.
Review Sessions
All previously memorized cards

These work outs focus on cards you have memorized successfully.
Print This Set


Click to filter by divider.
Will Bunker photo by Will Bunker
Used to learn subjects like: Linux
  • Current rating: 0.0/5
  • 1
  • 2
  • 3
  • 4
  • 5
rated by 0 users
Mon, Jun 09 at 06:52 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Wed, Jun 04 at 01:07 AM
Will Bunker
Will Bunker studied 2 Linux Security flashcards
Mon, Jun 02 at 07:24 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Mon, Jun 02 at 01:56 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Mon, Jun 02 at 12:22 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Mon, Jun 02 at 08:24 AM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Mon, Jun 02 at 12:42 AM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Sun, Jun 01 at 04:07 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Fri, May 30 at 09:48 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Fri, May 30 at 06:59 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Tue, May 27 at 12:41 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Thu, May 22 at 10:35 AM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Wed, May 21 at 10:42 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Tue, May 20 at 07:56 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Mon, May 19 at 01:39 PM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Sun, May 18 at 08:09 AM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Sun, May 18 at 12:39 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Wed, May 14 at 09:26 AM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Wed, May 14 at 04:27 AM
Anonymous visitor
Anonymous visitor visited Linux Security flashcards
Mon, May 12 at 12:39 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Sat, May 10 at 01:08 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Fri, May 02 at 11:45 PM
Will Bunker
Will Bunker studied 2 Linux Security flashcards
Sat, Apr 26 at 01:09 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Fri, Apr 18 at 12:10 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Mon, Apr 07 at 12:44 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Wed, Apr 02 at 01:15 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Mon, Mar 24 at 01:33 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Wed, Mar 19 at 12:41 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Wed, Feb 19 at 12:33 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Sat, Feb 15 at 12:46 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
Tue, Feb 11 at 12:46 AM
Will Bunker
Will Bunker studied 1 Linux Security flashcards
More >>

Browse individual flashcards :
Linux - Program that can be used to c...       Program to check to IO activity on di...       Linux: What command can be used to s...       2 criteria used to determine what gro...       How do you get Linux to make new file...       Utility to change the group that owns...       Command to see what groups you belong...       Linux: How do you change your primary...       What does it mean when a files SUID b...       How do you set a files SUID bit       Program used to login in a different ...       How do you disallow logging into a ma...       How do you run a specific command as ...       What file lists users and programs th...       Linux: how to add ssh keys to memory...       Linux - how to create an open ssl RS...       Linux - how to create a public certi...       Linux: how to add a user with no she...       Linux: how to block shell access for...       Linux: how to switch to root user       What octal permissions code would mak...       What octal permission allows others t...       What octal permissions allow owner an...       Who owns a file that you append to       Who owns a file that you move       What is the effect of setting a direc...       How can you set the sticky bit on a f...       What program can be used to verify fi...       Program that allows you to change fil...       Linux: Syntax to change the user and...       Program to change the group owner of ...       What permissions are needed to run a ...       Linux: what permissions are needed to...       What does having execute access to a ...       What does read permissions on a direc...       What does read and execute permission...       How do you set specific permission li...       What is the effect of setting a file'...       What is the effect of the suid bit be...       What is the effect of the setgid bit ...       What is the effect of the setgid (set...       How do you set the setgid bit on a file       Linux: How do you set the setuid bit...       Linux security: Mandatory Access Cont...       Linux security: who developed SELinux       Linux security: what does SELinux sta...       Linux security: SELinux was created b...       Linux security: 2 modes of access con...       Linux security: SELinux targeted policy       Linux security: SELinux MLS policy      





App_store_badge
What's new | About Us | Privacy Policy | Copyright Policy | Contact Us

Copyright 2007-2025 YoYoBrain.com

Managed By W3mg