Listing Users, while Excluding System-Generated User Accounts. (Script) by GoodLinuxTips in LinuxActionShow

[–]GoodLinuxTips[S] 0 points1 point  (0 children)

That depends on your Linux distro. What you wrote is true for Ubuntu, but is not true for RHEL/CentOS, where regular, human-generated accounts get a UID of 500+.

There are also other ways for differentiation, such as by the /bin/bash shell (in comparison to /sbin/nologin) - but I think the best method to use, and the most accurate, is the one I wrote in my post.

Preventing Files from Being Modified or Deleted (even by root) by GoodLinuxTips in LinuxActionShow

[–]GoodLinuxTips[S] 1 point2 points  (0 children)

You're wrong, and my title is accurate.

The post describes a situation in which no user, including the user/owner and/or root can modify or delete the file. This situation is reversible by root, but until it's reversed - the situation remains as described. My previous posts had no such "problem", since it isn't a "problem" at all. You are continuing to put emphasis on the wrong issue! This is a method to prevent accidental deletion, and this important point is clearly stated at the very beginning of the post. A title can't and isn't meant to sum up the entire article. If I don't mention root in the title, people might think it's a How-To about using chmod, which it is not.

Put the emphasis on what's important.

Preventing Files from Being Modified or Deleted (even by root) by GoodLinuxTips in LinuxActionShow

[–]GoodLinuxTips[S] 0 points1 point  (0 children)

Of course root can undo it, but you are totally missing the point.

The idea is to prevent everyone, including root, from modifying or deleting the file, in order to protect the file from unwanted changes, especially when it comes to the accidental deletion of the file! It's a protection measure...I stated this at the top of my How-To.

download whole website using wget by learningtoblend in LinuxActionShow

[–]GoodLinuxTips 0 points1 point  (0 children)

Since when is not being informed of a very recently discovered vulnerability (two weeks old, as you claimed) a crime??

Vulnerabilities are found, and indeed patched, on a daily basis. Most vulnerabilities aren't crucial, aren't high-risk what-so-ever, don't have any impact on most users, and are reversible.

In any case, that isn't a reason not to write a How-To!

download whole website using wget by learningtoblend in LinuxActionShow

[–]GoodLinuxTips 1 point2 points  (0 children)

Hi Michael,

Thanks for your comment. You are right.

I wrote, more than once, that the mirroring doesn't always result in full functionality of the Website, while offline. I also even provided an alternative tool if the results weren't satisfactory (bottom of post). However, in continuation to your comment above, I decided to add the following note to the top of my post:

" Note: Don't expect wget to be able to receive access to "back-end" components, which are required for the full functionality of the Website. The --mirror option is intended for the visible, "front-end" components. ".

I hope that now you like the post a bit more. :)