1 00:00:01,110 --> 00:00:07,240 So our in this that we will be seeing the expert discretion using the shade of distinction. 2 00:00:07,650 --> 00:00:13,410 So before going into the details, so let's add a new user. 3 00:00:18,380 --> 00:00:21,530 So I'm adding a new user at. 4 00:00:27,760 --> 00:00:29,020 Let's take the for. 5 00:00:31,130 --> 00:00:40,970 And those who don't know this, we need to go to the soldiers fired. 6 00:00:57,670 --> 00:01:02,510 OK, so this here, what we are going to do is we are going to add this right. 7 00:01:03,160 --> 00:01:08,050 So this line I have already heard it before, environment press is equal to. 8 00:01:09,100 --> 00:01:17,530 So what this means is actually this file tells of its user should run with comments as other users. 9 00:01:17,840 --> 00:01:22,570 So such as you can see here, wrote how ah ah ah. 10 00:01:22,720 --> 00:01:25,270 So here this hour stands for our users. 11 00:01:25,450 --> 00:01:30,550 And these four groups are groups and this is for comments. 12 00:01:36,040 --> 00:01:41,680 So that means this user can run as any user and as a newcomer. 13 00:01:41,710 --> 00:01:46,210 So that is why this has the very highest profile purchase. 14 00:01:46,330 --> 00:01:47,830 So I really added this. 15 00:01:47,830 --> 00:01:48,040 Right. 16 00:01:48,050 --> 00:01:49,180 So you can see here. 17 00:01:49,450 --> 00:01:58,130 So this is the environment where there content the share of the social objects, contents, the code. 18 00:01:58,330 --> 00:02:05,020 So whenever you write a program, you can directly import the code from the share libraries so you don't 19 00:02:05,050 --> 00:02:07,380 need to write the same code in your program. 20 00:02:07,660 --> 00:02:10,440 So, uh, you can see here environment research. 21 00:02:10,690 --> 00:02:15,570 So whenever I am performing the operation, the the environment will be reset. 22 00:02:15,820 --> 00:02:18,190 But if you specify environment keep. 23 00:02:18,460 --> 00:02:20,510 So this will be preserved. 24 00:02:21,760 --> 00:02:30,790 So that's why if this has been preserved, so then we can take advantage of this and we can load a code 25 00:02:30,790 --> 00:02:36,180 that used as, uh, reversion to normal sherbert with the highest perugia's. 26 00:02:36,910 --> 00:02:37,870 So let's see. 27 00:02:37,870 --> 00:02:47,710 I have added the straight arrow are run everything as if every user but limited to only one common user 28 00:02:47,890 --> 00:02:48,400 user. 29 00:02:49,210 --> 00:02:54,880 So this arrow can run only the ping command, but with no password, no possibility. 30 00:02:54,910 --> 00:03:00,760 So that means whenever the arrow is trying to attempt this ping binary with the pseudo permissions, 31 00:03:01,090 --> 00:03:02,820 the parser will not be prompted. 32 00:03:02,920 --> 00:03:05,500 So he can run without the password. 33 00:03:05,980 --> 00:03:09,470 So these two changes you need to make in this search for. 34 00:03:13,430 --> 00:03:14,990 So let me switch to Arrow. 35 00:03:21,110 --> 00:03:30,770 So let me, uh, reset the permissions types to try to restore permissions for this user so you can 36 00:03:30,770 --> 00:03:32,720 see in and keep a library. 37 00:03:32,750 --> 00:03:38,040 So that means we are preserving this variable and also we have the access to the Pinkberry. 38 00:03:38,390 --> 00:03:40,970 So I need to go to this home territory. 39 00:03:44,850 --> 00:03:46,980 Go to the home territory of Arrow User. 40 00:03:50,130 --> 00:03:55,890 So we are here, we are going to create a sequel that September. 41 00:03:59,640 --> 00:04:01,050 It's a bond that. 42 00:04:03,790 --> 00:04:12,890 So you can go to Google and search for this expert and you'll get this sequel Sopchoppy this. 43 00:04:13,330 --> 00:04:16,790 So here we are up and setting this up. 44 00:04:17,140 --> 00:04:24,670 So if there are any libraries which are finding a way to celebrate, those will be answered. 45 00:04:24,760 --> 00:04:27,190 And then we're setting our group to zero. 46 00:04:27,370 --> 00:04:28,750 That is crucial to that group. 47 00:04:29,020 --> 00:04:31,350 And also, we are setting our user to zero. 48 00:04:31,660 --> 00:04:35,910 So then we will be executing this comment as a route to that. 49 00:04:36,070 --> 00:04:37,710 So system of benefits. 50 00:04:38,620 --> 00:04:41,980 So that's copied and pasted in here and service. 51 00:04:42,910 --> 00:04:49,420 So we need to compare this as a share a library and we need to do some comments. 52 00:04:51,950 --> 00:05:05,510 And then we'll at the output or go and pond that see, so we need to fish further north to north, start 53 00:05:05,510 --> 00:05:06,110 first. 54 00:05:09,160 --> 00:05:16,960 So you get the warning about these functions, so I'll get it on the screen now we have the object file, 55 00:05:18,280 --> 00:05:28,610 so orange trees you need to run Soula only underscore is zikos to and we need to specify the fruit. 56 00:05:28,630 --> 00:05:33,920 But on Arrow Fondacaro. 57 00:05:34,360 --> 00:05:39,880 And then what you need to do is we need to use our bing, bing, bing. 58 00:05:46,300 --> 00:05:55,360 And he can tell, so you can see we are richer, so the cold in this pondered object file, it is loaded 59 00:05:55,360 --> 00:06:00,140 into the memory and executed before, uh, accessing this Pinkman. 60 00:06:00,280 --> 00:06:07,470 So that is preloading the coding object file before using our actual program. 61 00:06:07,690 --> 00:06:12,460 So that's why the code got executed and we got the Brookshire.