CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

limousine Ackley .. Lockport Chicago limo O’Hare
In The News:

A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.
Tech expert Kurt “CyberGuy" Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy.
Beware of these six sneaky holiday scams. Tech expert Kurt “CyberGuy" Knutsson gives you tips to avoid falling victim.
Tech expert Kurt “CyberGuy" Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data.
Artificial intelligence is making life easier for cybercriminals, allowing them to create elaborate scams to trick people. Kurt the Cyberguy explains how to protect yourself.
Cut through all the digital clutter and delete multiple emails from your Android simultaneously. Kurt the CyberGuy explains how it's done.
Tips to prevent your holiday decorations from being stolen
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson lays out the immediate steps you should take if your phone has been hacked and your personal information becomes vulnerable.
Fraudsters are sending people bogus invoices through PayPal as part of a sneaky scam that is going around; here's how to protect yourself from being fooled.
A former Colgate-Palmolive employee was shocked to discover $750,000 had been drained from her 401(k) account. "CyberGuy" offers tips on how to prevent identity theft.
Electric vehicle maker Harbinger recently showed its electric delivery truck can handle icy roads with agility and stability in winter.
To make the busiest time of year more manageable, here are some tricks for tracking your packages, taking quality family photos and curating the perfect Christmas playlist.
Kurt "CyberGuy" Knutsson explains how to keep your online Amazon gift purchases a secret from loved ones or friends this holiday season.

Web Design and Hosting - Free Web Hosting Perks That Will Perk Up Your Web Site

If you've got or are considering a web hosting account... Read More

Overselling Web Hosting: What Does It Mean To You?

Overselling is a big trend in the web-hosting world at... Read More

Dedicated Web Hosting Is Easy When You Know These 3 Timesaving Secrets

Dedicated web hosting has its difficulties and problems from time... Read More

Web Hosting: Shared or Dedicated - Which Should You Choose?

Before you begin your search for a web host you... Read More

Advanced Hosting for the Mission Critical Web Presence

As companies that conduct their business online have proliferated, hosting... Read More

Choosing Your Web Hosting Package

General rule of thumb is not to sign up for... Read More

Free Or Not Free -- Its Your Choice

The internet is one of the world's top sources of... Read More

Internet Domain Registration - Establishing and Transferring Your Domain Name

If you're in business, one of the most important things... Read More

Five Quick Ways to Determine One Hosting Company From Another

These days, web hosting companies are popping up faster than... Read More

How to Choose the Web Hosting Provider?

1. Does the company offer telephone support or 24/7 email... Read More

Dedicated Server Price Check

The price of dedicated hosting services has really come down... Read More

Web Site Hosting ? An Easy Guide

Web Hosting ? Made Simple What is web hosting... Read More

Choosing The Wrong Server Will Literally Make Or Break You

Choosing the right web server will be one of the... Read More

Free Web Hosting - Why Might It Be A Bad Idea

When talking about free anything the legitimate question that first... Read More

Free Web Hosting

There is no concept of free lunch in the world,... Read More

Finding a Reliable Host

Finding reliable hosting for your business opportunity is no small... Read More

Does Your Host Fight Spam?

Virtually anyone with an email address knows what Spam is,... Read More

Cheap Web Hosting - When Cheaper is Better

Anyone who has ever shopped for web hosting knows that... Read More

Top 6 Ways to Promote Your Web Hosting Business Part 2

Here are the following three methods that can help you... Read More

Server Host: Where Does My Web Page Go?

For those of you who don't really understand where or... Read More

Changing to a New Host? No More Worries!

John's online business is expanding. His customers are increasing day... Read More

Use Your Hobby To Launch A Successful Website

When you study the really successful websites, you will quickly... Read More

Benefits of Web Hosting and Choice of a Web Host

Well let me start this way, a lot of people... Read More

Top 6 Ways to Promote Your Web Hosting Business Part 1

Promoting a new company in the crowded industry of web... Read More

Webhosting for Blogs - Free or Paid Service

Blogging is an abbreviation of "web-logging". The simplest definition of... Read More

shuttle from O'Hare Alexander ..