ABSTRACT

As root lies at one end of the spectrum of access rights, soware accounts typically are at the other end. Most soware does not require its own account. However, if the soware has its own les and directory space that the user should not directly access, then the soware is oen given its own account. Soware, unlike users, usually has no login shell. us, if hackers attempt to log into a Linux system under a soware account, the hackers would nd themselves unable to issue commands. You might recall from Chapter 3 that we can

assign the execution permission to be ‘s’ rather than ‘x’ so that the soware runs under the le owner’s permissions rather than the user’s permissions. e soware account is another approach to running processes whereby the soware has its own directory space and access rights.