Questions tagged [access-control]
66 questions
40
votes
7 answers
Temporarily disable WLAN internet access for children, but allow it for adults
We use a WLAN access point for internet access. I need the internet access to be turned off at 10pm for my children, but still be able to use it for myself.
Can I have 2 passwords? Or does anyone know another way around this, please?
Sue Jones Yates
- 399
17
votes
2 answers
Lock your computer after 5 minutes of inactivity
I know you can automatically Sleep and Hibernate your computer with a timer. But these affect running programs and stop downloads ... so I was wondering if there is a way to automatically Lock your computer with a timer?
Robin Rodricks
- 2,532
7
votes
2 answers
Unknown Contact has full access to folder?
Is anyone able to take any educated guess(es) about what this "Unknown Contact" is, which has access to a few shared folders on my computer?
The concerned machine is connected to another via a crossover cable, and I sometimes set "advanced sharing…
Rok
- 247
7
votes
1 answer
Know the identity behind an AWS canonical ID
Today while auditing a friends security settings, I found that an Amazon Folder (s3 bucket) with his most personal files had an unrecognised ACL entry.
A person (with id ending in f6995f) had "Write" access to the bucket. Weirdly no read or list…
american-ninja-warrior
- 311
- 3
- 9
5
votes
3 answers
SELinux transition from unconfined_r to user_r
On a Fedora 18 machine, I have the following SELinux context as a regular user created during installation:
$ sestatus
SELinux status: enabled
Loaded policy name: targeted
Current mode: enforcing
Mode…
ArjunShankar
- 375
5
votes
1 answer
How to restrict other programs from reading a certain file on Windows 10?
Secret files such as ssh private keys are stored in plain on the disk.
There is only one user account on my computer.
Programs like ssh.exe need to read these files, and I want to view them by text editors like Visual Studio Code, too.
However,…
Kane Green
- 53
4
votes
1 answer
git management - user rights
I have to set up git for a development team. The team members must have different rights.
Some roles should have read rights only, some should be able to push but not to create new branches or tags. Only a selected group of people should be allowed…
BetaRide
- 2,359
4
votes
3 answers
Restricting a program's access to the Windows registry
Is it possible to prevent a certain program from accessing the Windows registry? I know there are ACLs to lock out a user, but what about per-executable control?
4
votes
1 answer
Impossible to modify Windows 10 drives from other OSs
I'm here to describe an interesting issue I've been facing today, in order to get some hints or solutions.
My goal : access and modify one of my computer's Windows (10) system hard drive in order to run the "utilman bypass" scenario under this fresh…
paftiem
- 51
3
votes
1 answer
Reversing AppArmor log line to rule
I am looking for a way to easily reverse a single line from /var/log/syslog reported by AppArmor for a profile in complain mode. I have seen that using aa-genprof that it uses what is reported to the syslog to help generate rules. For the most part…
flungo
- 284
3
votes
2 answers
TP-Link Access Control targets
I want to configure an access control rule target on my TP-Link router (Archer C-7). I want a target I can use to blocks access to any Internet IP. I thought I could tell it "block IP address range 0.0.0.0 - 255.255.255.255. However, I get errors…
ahoffer
- 365
3
votes
1 answer
chmodding files with an SELinux security context / ACL
Okay, so I have a bunch of bash & python scripts that I've written, all just chilling together in one big directory. Well, actually there are separate subdirectories, but they're all nested in this main directory.
So for argument's sake, the…
voices
- 2,881
2
votes
1 answer
How to increase delay of ssh root access every time login fails
Is there a way in Linux to delay, for example double the delay time, of the ssh root access every time an ssh root login fails from a given IP and them let the delay expire after X minutes of no login attempts or success?
The aim is to mitigate…
Wulfire
- 21
2
votes
1 answer
Is it possible to limit remote administration accesses of an admin using Selinux?
Suppose and admin needs to access a machine remotely.Root logins are disabled but he belongs to the sudoers list. I read that "sudo command" is good practice because you don't forget you are using root and also, sudo logs commands (this was the…
BrunoMCBraga
- 135
2
votes
2 answers
"In valid argument" when removing permissions with Access Control Lists (ACL)?
This website explains giving and removing the ACL. I have given the permission to another user, and now I want to remove it.
In the screenshot below, the getfacl is used to show that another user has been given the r and x accesses.
Then, I tried to…
lanselibai
- 469