¡@

Home 

c++ Programming Glossary: setuid

Programmatically drop Linux cache as non-root user

http://stackoverflow.com/questions/14861880/programmatically-drop-linux-cache-as-non-root-user

any user can run it with root permissions. This is called setuid . For safety reasons you cannot setuid a shell script. Extracting.. This is called setuid . For safety reasons you cannot setuid a shell script. Extracting from the wiki how to use it The setuid.. a shell script. Extracting from the wiki how to use it The setuid and setgid bits are normally set with the command chmod by setting..

Fork and core dump with threads

http://stackoverflow.com/questions/18488598/fork-and-core-dump-with-threads

mean the parent process does not even have to be setuid as CAP_SYS_NICE alone suffices. I think it'd be safe enough..

How to programmatically gain root privileges?

http://stackoverflow.com/questions/2483755/how-to-programmatically-gain-root-privileges

this question Original answer You might consider the setuid switch on the executable itself. Wikipedia has an article on.. e.g. Fedora has a feature to completely remove setuid binaries with indiscriminate root access. This matters because..

how to find the location of the executable in C

http://stackoverflow.com/questions/933850/how-to-find-the-location-of-the-executable-in-c

occasions when the calling process cannot be trusted ex. setuid executable . On Windows use GetModuleFileName NULL buf bufsize..