CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

personalized cleaning services Des Plaines ..
In The News:

LastPass faces $1.6 million fine from UK regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.

How to Start Your Own Hosting Services

If your like many another webmasters you might be thinking... Read More

Avoid Getting Ripped Off By A Hosting Company

Chances are if you host multiple domains or websites you... Read More

What is a Web Host Reseller Account?

A web host reseller account is a web hosting account... Read More

Does Your Host Fight Spam?

Virtually anyone with an email address knows what Spam is,... Read More

Dedicated Web Hosting Explained

Why is dedicated hosting such a big hit on the... Read More

Dedicated Server vs. Co-location Web Hosting

So - you know shared hosting no longer cuts it,... Read More

CGI Web Hosting ? 3 Essential Scripts for Your Business

If there's one thing that people love it is a... Read More

Cheap Web Hosting Package? eCommerce Web Hosting? - Choosing A Web Hosting Provider

One of the important decisions you'll make when you decide... Read More

Web Hosting Services Absolutely Necessary for Your Websites Success

Web hosting services play a vital part in your website's... Read More

Hosting Options for an Ecommerce Web Site

Deciding how to host your ecommerce Web site and what... Read More

Choosing a Web Hosting Provider from 40 Million Other Web Hosts - Pt1

Discover how to go about choosing a web hosting provider... Read More

How To Find The Best Web Hosting For You

Deciding on the best web hosting company for a web... Read More

Good Web Hosting ? What Is It?

With hundreds of web hosting companies to choose from today... Read More

Web Hosting Operating Systems Explained

A few time ago appeared a lot disagreements between opinions... Read More

The 14 Point Web Hosting Checklist

How To Select A Web Hosting CompanyWhen starting out, it... Read More

How Much Bandwidth Does Your Web Site Need?

One of the most common concerns people have when deciding... Read More

The Problem With Web Hosting Today

When it comes to web hosting, the quality of the... Read More

First Web Hosting Experience

Well? you've purchased a domain name? created a pretty design?... Read More

Windows Hosting versus Linux Hosting ? Which is right for you?

There are literally hundreds of thousands of web hosting companies... Read More

Steps to Becoming a Web Host Reseller

You've decided to get a reseller web hosting account to... Read More

EBay Pictures Make Money

If you have ever used EBay then you know how... Read More

Small And Medium Businesses Embrace Servers Running Linux

Although we are aware of Linux adoption by large enterprises,... Read More

Server Uptimes Revealed: The Hidden Cost of Cheap Hosting

We often see server uptime statistics when looking for hosting... Read More

Web Hosting Bandwidth -- How Much Bandwidth Is Enough?

Bandwidth in its simplest terms refers to the amount of... Read More

Five Quick Ways to Determine One Hosting Company From Another

These days, web hosting companies are popping up faster than... Read More

family-safe home cleaners Arlington Heights ..