SELinux (read as S.E.Linux)
The main purpose of using SELinux is to protect the system from “unpredictable” security breaches.
It provides a kernel-level security protection based on a white-list policy and can protect from things like application bugs and application misconfigurations.
(Buggy/misconfigured FTP/HTTP/other daemons may give the users more privileges than they should)
When troubleshooting SELinux related permission issues, “ls -Z” is the command to view the “label”, which defines the access privileges.
… In fact, each
RFC has a status, relative to its relation with the Internet
standardization process: Informational, Experimental, or Standards
Track (Proposed Standard, Draft Standard, Internet Standard), or
[root@clnt2 bin]# python -V
[root@clnt2 bin]# which python
[root@clnt2 bin]# /usr/local/bin/python -V
[root@clnt2 local]# hash -r
[root@clnt2 local]# python -V