CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

Barrington South Lincoln Stretch rentals .. Lockport Chicago limo O’Hare
In The News:

Kurt the CyberGuy explains how to protect yourself from malicious Chrome extensions that can steal sensitive information like password managers, crypto wallets and banking apps.
Stellantis' innovative STLA AutoDrive 1.0 system allows drivers to safely take their eyes off the road and their hands off the steering wheel.
Here are some travel hacks to save money on your next vacation including setting up price alerts, remaining flexible and checking for 24-hour price drops.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
One report claims at least 25 million people were targeted by infostealer malware between the beginning of 2023 and the end of 2024, capturing bank card details and passwords.
The LaserWeeder G2 uses lasers, artificial intelligence and advanced robotics to offer an alternative to chemicals traditionally used in farming.
Tech expert Kurt “CyberGuy" Knutsson says a malware app called SpyLend is posing as a financial tool, hitting 100,000-plus downloads.
Tech expert Kurt “CyberGuy" Knutsson says Clone Robotics’ Protoclone mimics humans with 1,000 muscles – too human for comfort.
Tech expert Kurt “CyberGuy" Knutsson urges you to use Apple’s App Privacy Report to see what your apps are really up to.
Tech expert Kurt “CyberGuy" Knutsson talks about how to smoothly transfer your data from an old laptop to a new one using cloud storage or external drives.
Kurt the CyberGuy offers tips to safeguard your personal information as scammers become more sophisticated with scam texts and other methods.
WeRide's unmanned electric delivery van, the Robovan W5, has 194 cubic feet of cargo space and can carry payloads up to about 2,205 pounds
Kurt the CyberGuy recommends deleting 16 browser extensions immediately in response to a report saying more than 3.2 million web users were affected by a security breach.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A robotics firm in China claims a robot has performed the world's first humanoid robot front flip, which is significantly more difficult than a backflip.
A digital ID may be even more secure than a physical ID. Storing your driver's license in your Apple Wallet is an ideal solution for commuters.
A cybersecurity firm has shed some light on just how common tax scams have become. Kurt the CyberGuy offers his advice for how to protect your refund.
Lifesize Plans offers immersive walk-throughs that allow customers the opportunity to tour a home's design before construction actually begins.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A man invested $4 million in bitcoin and lost it all with a single click when he was targeted by a vishing scam, which uses phone calls to trick people.
Expandable's Touchdown is a designer trailer that promises a luxury off-grid living experience and unfolds into a home in about 15 minutes.
Major employee screening company data breach affects 3.3 million people. Tech expert Kurt “CyberGuy" Knutsson explains what happened and gives five ways to protect your data.
Kurt “CyberGuy" Knutsson reveals mind-blowing tech that gives you sunlight on demand.
New malware "FrigidStealer" targets Mac computers. Tech expert Kurt “CyberGuy" Knutsson offers four ways to stay safe from infostealer malware.
Kurt “CyberGuy" Knutsson talks about how lab-grown muscles power a biohybrid hand for scalable prosthetics and research.

The Problem With Web Hosting Today

When it comes to web hosting, the quality of the... Read More

Reseller Hosting: The Good and The Bad!

Reseller webhosting can be a great way to earn some... Read More

4 Critical Things To Look Out For In A Web Hosting Service

1. The reputation of the web hosting company.Most web hosting... Read More

How to Choose the Web Hosting Provider?

1. Does the company offer telephone support or 24/7 email... Read More

A Beginners Guide to Web Hosting

What is web hosting? Whenever you visit a website, what... Read More

Importance of Educated Choice While Choosing A Web Hosting Provider

There are many attributes that makes a web hosting provider... Read More

Unique Features that Leading Web Hosts are Now Offering

Some web hosts are offering more than others for the... Read More

Setting up Your Personal Server

There are many things to consider when setting up your... Read More

How to Transfer Your Web Site to a New Web Hosting Service?

There are various reasons why an online business owner like... Read More

Dedicated Web Hosting Explained

Why is dedicated hosting such a big hit on the... Read More

Beware of the Hidden Perils of Low Cost Hosting

Some folks classify low cost web hosting on the same... Read More

Free or Paid Web Hosting?

Just finished your first website? So it's the time to... Read More

Choosing a Right Hosting Solution

You must have done all the hard works for developing... Read More

How to Start Your Own Hosting Services

If your like many another webmasters you might be thinking... Read More

Small And Medium Businesses Embrace Servers Running Linux

Although we are aware of Linux adoption by large enterprises,... Read More

The Perfect Support

Hosting Support ? An IntroductionImagine yourself as a person running... Read More

Benefits of Web Hosting and Choice of a Web Host

Well let me start this way, a lot of people... Read More

Provide A Good Home For Your Website

Selecting a web hosting company is like sending one of... Read More

Dont Get Fooled by the Web Hosting Wolves in Sheeps Clothing!

Are you looking for web hosting? If you want to... Read More

What is a Web Host Reseller Account?

A web host reseller account is a web hosting account... Read More

What Is Web Hosting?

The best way to explain this is by comparing it... Read More

What Is Web Hosting?

Many businesses, from one-man-bands to multi-national corporations, have a web-presence... Read More

CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based... Read More

Web Hosting Data Transfer: How Much Is Too Much?

Bandwidth in its simplest terms refers to the amount of... Read More

Will All The $1.95 And Free Hosts Survive?

The main thing wrong today with trying to find a... Read More

Downers Grove limo Chicago ..