CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

weekly home cleaning Highland Park ..
In The News:

Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.

Handling Your Email Addresses

--Company Email Addresses--Web hosting companies should provide company email accounts... Read More

Web Hosting: 4 Factors in Choosing a Hosting Company

When choosing a web hosting company there are a whole... Read More

Web Hosting Help ? What?s Bandwidth

Bandwidth can make all the difference when choosing where to... Read More

How To Have Several Websites But Pay For Only One Websites Hosting

Many online entrepreneurs these days are faced with the problem... Read More

Choosing the Right Web Host

So you've decided about your website design and now you... Read More

Use Your Hobby To Launch A Successful Website

When you study the really successful websites, you will quickly... Read More

Where to Get Cheap Web Hosting

First, to see if you can use cheap web hosting... Read More

The Perfect Support

Hosting Support ? An IntroductionImagine yourself as a person running... Read More

Solving Common Problems with Hosting Companies

For those of you with Web sites, you probably know... Read More

Web Hosting Bandwidth -- How Much Bandwidth Is Enough?

Bandwidth in its simplest terms refers to the amount of... Read More

How To Host Several Websites Under One Account

If you operate several websites, each with its own domain... Read More

Internet Domain Registration - Establishing and Transferring Your Domain Name

If you're in business, one of the most important things... Read More

Steps to Becoming a Web Host Reseller

You've decided to get a reseller web hosting account to... Read More

Virtual Web Hosting - What Is Virtual Web Hosting?

If your web site has outgrown its shared hosting solution,... Read More

Thinking About Changing to a New Web Hosting Company? 5 Steps to Plan Ahead for the Move

Perhaps your web hosting company has a technical support group... Read More

Top 6 Ways to Promote Your Web Hosting Business Part 1

Promoting a new company in the crowded industry of web... Read More

Dedicated / Virtual Dedicated Servers and Its Benefits!

What is a Dedicated / Virtual Dedicated server and why... Read More

Web Hosting - Choose Affordable, Cheap Web Hosting

The Basics:Web hosting offers you the opportunity to put your... Read More

Niche Hosting

There is story of David and Goliath where Goliath would... Read More

Is Free Hosting Really Free?

Sooner or later, as everyone finds out, nothing in this... Read More

Adult Web Hosting: The All You Need To Know

What sort of web hosting options should you go for... Read More

Advanced Hosting for the Mission Critical Web Presence

As companies that conduct their business online have proliferated, hosting... Read More

Five Quick Ways to Determine One Hosting Company From Another

These days, web hosting companies are popping up faster than... Read More

Website Sitebuilders: Easy to use Website builders Come with a Price

Professional web designers don't come cheap. A good web designer... Read More

Dont Get Fooled by the Web Hosting Wolves in Sheeps Clothing!

Are you looking for web hosting? If you want to... Read More

whole house cleaning Park Ridge ..