Stack Exchange Network

Stack Exchange network consists of 174 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Visit Stack Exchange

Questions tagged [access-control]

The tag has no usage guidance.

0
votes
1answer
27 views

Is it safe to remove read rights from all /var/log files for others?

Am I supposed to be able to revoke read access recursively to /var/log/ for others or will it break some applications which rely on being able to read from /var/log/ with other rights?
2
votes
2answers
78 views

TP-Link Access Control targets

I want to configure an access control rule target on my TP-Link router (Archer C-7). I want a target I can use to blocks access to any Internet IP. I thought I could tell it "block IP address range 0....
0
votes
0answers
15 views

Terminal - Create ftp server with access control (user accounts)

I use this command for creating a user account in terminal: tcpsvd -vE 0.0. 0.0 1024 ftpd  It simply creates an ftp server. Today, when I tried connecting a text editor app(Android - Quoda Text Editor)...
0
votes
0answers
119 views

Prevent users from accessing USB Drive while maintaining access for powershell script

I have created a powershell script that maps a USB drive into a specific folder, at the same time remove the regular access path from MY COMPUTER so it does not show there. $usbAccessPath = "PATH\TO\...
1
vote
1answer
709 views

chmodding files with an SELinux security context / ACL

Okay, so I have a bunch of bash & python scripts that I've written, all just chilling together in one big directory. Well, actually there are separate subdirectories, but they're all nested in ...
-1
votes
1answer
31 views

Applying IT Sarbanes–Oxley (SOX) to a tool management application [closed]

Does an application that manages access controls to a suite of tools (Jenkins, Nexus, BitBucket) in a SOX environment need to be considered a SOX application? The app itself only deals with data in ...
0
votes
1answer
45 views

Completely hiding a dir, but leaving its descendants accessible via symlinks, in Samba

Due to the way Samba handles symlinks and wide links (it can only distinguish "within the share root" or "outside the share root") I want to create fixed symlinks in the share root to the "actual" ...
0
votes
0answers
577 views

libzklog.dll is missing from your computer

My zkTeco Biometric Access Control Attendance Manager software shows the below error in one machine. The other machine it's working fine. I tried searching for this dll everywhere in working PC, but ...
0
votes
1answer
47 views

Ubuntu user access restrictions

I want to create an user account for each users at our office, where 2 users can have the full permission, whereas other users have limited access, say /var/www/html/ or /home/username.
2
votes
1answer
91 views

Struggling with OpenLDAP configuration

I've been configurating a LDAP server on a linux instance using AWS EC2. Up to now, I successfully set up LDAP and phpLDAPadmin to work together. I've created Users and Groups "Organisation Units". I'...
0
votes
1answer
66 views

Can I seperate users in VmWare to only access their own VM's by default?

I am trying to create a practise enviroment in VmWare EXSi 6.0 using a single host where students could login using vSphere and create VM's for server install practise. However, I want to prevent ...
2
votes
2answers
2k views

Restricting a program's access to the Windows registry

Is it possible to prevent a certain program from accessing the Windows registry? I know there are ACLs to lock out a user, but what about per-executable control?
4
votes
0answers
2k views

Impossible to modify Windows 10 drives from other OSs

I'm here to describe an interesting issue I've been facing today, in order to get some hints or solutions. My goal : access and modify one of my computer's Windows (10) system hard drive in order to ...
1
vote
2answers
89 views

How to make a network be fail-deadly upon physical tampering?

I wish to no longer allow my roommate usage of my internet line. While the router I have gives me surprisingly powerful administrative control over my network, any blocks I put in place can be ...
0
votes
3answers
3k views

Inbound/Outbound ACLs?

I do understand the basic difference but I find it confusing. One processes packet first then routes it and other routes first and then it's processed in ACL. If I want to save routers resources then ...

15 30 50 per page