A other question in this forum talked about using ACL under Linux, this made me realize I did not know how this worked.
I Have used ACL under VMS would like to test/try this on linux ... have read the man page, but have not figured out how to use/manipulate the posix linux ACL!
Could someone hold my hand and walk me from shadow to light ?
What I don't need is a discussions on why use acl's
But what i would appreciate is a simple example with a directory populated with acl protected files
J-P (any security expert's out there ? :-) )
Smile I will feel the difference