How does unix access files for different users
How does a UNIX file system control access rights on files for different groups of users & these users interfaces of files system for manipulation files?
what is Trojan horses and how does Trojan horses enter in the OS and start attack?








