Wtf is this shit how can i have permission denied as LITERALLY SUPERUSER

wtf is this shit how can i have permission denied as LITERALLY SUPERUSER

Attached: 19684654.jpg (797x201, 53K)

Other urls found in this thread:

packages.debian.org/stretch-backports/virtualbox-guest-additions-iso
twitter.com/NSFWRedditGif

You are already superuser you brainlet.

exit life

>sudo su
What?

chmod +x VBoxLinuxAdditions.run

Switches to root without needing to enter the root password.

sudo -s does that

So does sudo su

Can God make a file so that even He cannot access it? Yes; he can set permissions to deny even Himself. Of course, He can also restore them.

Unless, of course, He is a Godlet.

well there should be a chaduser whom doesnt care for permissions

and thus windows was born. tldr: this is how you get viruses user

backports has it
packages.debian.org/stretch-backports/virtualbox-guest-additions-iso

>not knowing what the executable bit is

chmod nigga wtf

Stop trying to pretend to run linux if you don't know shit

>chmod +x
>cdrom0

Maybe you should add a point and slash before it to run?

sudo sh ./VBoxLinuxAdditions.run

>chmod on a readonly medium
Run it in a shell, as it should be.

Then copy the contents to a writable directory first. Wow, so difficult.

lmao

good thread

you win

Attached: 153171095168.png (450x443, 302K)

Maybe because you're trying to become a Nuclear Defensive Supernation like the first and only?

Change the file permissions

Only if you are in sudoers. What retard distro are you using? Can't be debian because there is no sudo in a standard install.

>not checking if the exec bit is set even once
kys

chown root *file here* && chmod 700 *file here*

if that is a NTFS drive you need to install ntfs-3g package to get modify rights

I may have saved you a ton of time OP

> /cdrom/
Sure it's NTFS.

>sudo su
topkek

If it's read-only mounted media:
mount -o remount,exec /media/cdrom0

Also,
>using VirtualBox when QEMU/KVM exists

>sudo su
Just use `su -'.

>Can't be debian because there is no sudo in a standard install.
Please tell me you are joking.

I'm pretty sure Debian still has you set a root password by default.
I happened to actually do a fresh install of Debian 9 instead of an upgrade like usual. I think it comes with sudo but a root password enabled and no users in the sudo group by default.

If you skip setting the root password (leave it blank), it prompts you to set up a regular user, sudo and all...

debian has no sudo
sudo kys

Debian installer always prompts you to create a regular user even when you set a root password. I don't remember any message that you could leave the root password blank but maybe that's because I use the text-based installer.
It doesn't surprise me that leaving the root password blank will cause debian to put the user in the sudo group, but I don't think the installer exactly encourages this like other distros' do.

faggot is not in the sudoers file. This incident will be reported.

this is the only non-brainlet post in the thread

>su
>aaaapt-yeeet sudo
>visudo
>add big wank
wow that was hard

There's plenty of ways for root to get permission denied errors, like with the execute bit in your case, or with SELinux, AppArmor (I assume), networked stuff like NFS etc.
Also, nigga use sudo -i. Are you retarded?

sh VBoxLinuxAdditions.run

If you can access via restoring the access, is that not a file that is truly inaccessible?

Attached: IMG_20190131_195810_426.jpg (866x635, 50K)

>su -
But that needs the root password

> Linux is this confusing
> People still use it because memes

Works on my machine. I mean sure it sucks that you're retarded but that's a you problem. It doesn't stop others from using Linux.

>LITERALLY SUPERUSER
substitute user

> debian has no sudo
> an't be debian because there is no sudo in a standard install.
Seriously it's a brainlet detector. If you enter a root pw, it does not install sudo, because you can enter with su. If you do not enter a root pw, it installs sudo and adds your first user into a sudo group. Wow, what a revelation of mysterious Debian ways, right?

who the fuck does this get reported to

Look at the image. He logged in as root at the end, dumbass.

sudo -s
cp /media/cdrom0/file /tmp/file
chmod +x /tmp/file
./tmp/file

Not really that hard once you actually use your brain.

Attached: 1540606595682.jpg (320x211, 13K)

Stop gatekeeping people from learning to use a new OS hoping to increase productivity

Yes, because it's a login shell so you're actually using the root account.

See, this is why Linux will never catch on. In windows you can just DO shit you know? Why do I have to get permission from my own fucking PC to run shit, lmao

'Who' indeed...

Attached: 1537376952012.jpg (514x323, 11K)

the text based installer has a message that says exactly that - you can leave the root password blank and if you do it'll lock out the root account and add your regular user to sudoers. Actually I think the text in the graphical and text installer is exactly the same, the former just looks fancier.

you can tell sudo to email reports to somewhere, though I don't think Debian turns it on by default. If you do turn it on I'm pretty sure the default location is root's local mailbox.

Terry was right about file permissions

>not doing 777 instead of 700 like you don't give a fuck

look mate, you mounted an read only filesystem, so you cant chmod +x it, and you cant just run it with ./vbox.run but you can actually sudo sh '/path/to/run.file' to run it. This is covered by the vbox manual from what i remember.

*sigh*

>though I don't think Debian turns it on by default
This is wrong, it's definitely on by default. You can access it with the mail command. You are shown the number of new messages when you log in.

>one file
it's an entire folder with shitloads of files you retard

mount /media/cdrom0 -o remount,exec

>sudo su
super sayan power, make up!

Then copy the whole directory bud.

>Linux """""security"""""

Doesn't ntfs-3g come installed by default in virtually every mainstream distro?

>being this dumb
eat borger

sudo echo permission denied

kek
the fact thatthis was made in ubuntu is even better.

>what is UAC

You can only do it as a sudoer, which means you've been given explicit permission by the root user to execute commands as root

This.

no
its anti minimalism
at least doesn't come in arch and void which I know of

Attached: Access denied!.jpg (728x643, 150K)

You guys know that you don't need to mark a file executable to run it, right?

$ /lib/ld-linux-x86-64.so.2 /bin/ls /
bin boot dev etc home lib lib64 media misc mnt net opt proc root run sbin srv sys tmp usr var

>Not using /lib/ld-linux.so

>Can God make a file so that even He cannot access it? Yes; he can set permissions to deny even Himself.
That sounds like self destructive behaviour, he should see a therapist.

>Godlet

Attached: 4bfe45db50ec588fe7b6691c06dd269b0aff13d99729a8e872350e49bd5efdec.jpg (261x212, 13K)

If it is truly inaccessible, does it even exist? It's like a parallel universe that no one knows exists as you have no access to or from it.
With regards to computers, you can always physically access this material. Alternatively, I presume this is the reason why quantum computation methods are being made.

He can create a figment of a file in a userspace filesystem which will deny even Himself under the correct permissions.
This, however, comes down to the question whether such a file really exists. Is there more to a file than an inode and a non-negative number of directory entries?

It's also how you get pussy, bicth.

>thus windows was born
And it was good, until it became a gimp over time.

>sudo su
This is the dumbest thing to have on your sudo list.
Right up there with having sudo -s enabled.

777 stands for big time win
If there were mode bits that read "BAR" I'd set them

fucking brainlets. there's no need to add an execute bit to execute a shell script, which is a waste of time when the whole ISO is mounted mounted noexec anyway. just do "sh script.sh" or "bash script.sh", or remount as exec.

the only unix-knowledgeable people in this entire thread

honorable mention but implies it's not executable because it's mounted read-only, but it's actually because it's mounted noexec. still, knowing to rtfm makes you better than most

god can destroy himself completely and still be okay

God made the concept of himself.

LOL what a joke. Windows doesn't just have root permissions, it has trusted installer which is extremely hard to deal with without using third party software. If you actually try to do something low-level with your OS then Linux makes it way easier than Windows.

so this is the true power of linux

nigger i told him to install ntfs-3g which is absolutely necessary to write on ntfs drives and doesn't come by default in many distros

You think a device called cdrom0 is formatted NTFS?

Good to know, literally breaking into your computer as you read this, thanks for the heads up on vulnerability user.

It's not a vuln, you retard. See

was a joke desu

A pretty dumb one