Capabilities essentially divide the power of the root user into separate privileges, which improves security by limiting the access an attacker would gain by exploiting or abusing a service. This guide will introduce some commonly used capabilities and demonstrate how they can be viewed and modified.
↧