CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

cleaning help near Mundelein ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

Webhosting for Blogs - Free or Paid Service

Blogging is an abbreviation of "web-logging". The simplest definition of... Read More

Where to Get Cheap Web Hosting

First, to see if you can use cheap web hosting... Read More

How to Get Better Technical Support

Whenever you have a technical question that needs answering, you... Read More

The Top 15 Essential Ingredients of Every WINDOWS HOSTING Plan (Package)

First things First. Why would you like to have Windows... Read More

Transferring Your Existing Website to a New Hosting Provider

You've already got a website, but your current hosting provider... Read More

Thinking About Changing to a New Web Hosting Company? 5 Steps to Plan Ahead for the Move

Perhaps your web hosting company has a technical support group... Read More

Bound To Your Old Expensive Web Host by Fear?

You're not alone! Many people are bound to the old... Read More

Getting The Best Web Hosting For Your Business

After the dot.com bubble burst a few years back I... Read More

Server Uptimes Revealed: The Hidden Cost of Cheap Hosting

We often see server uptime statistics when looking for hosting... Read More

Shared Web Hosting Service Explained!

The next concern for you after designing and developing web... Read More

Dedicated Server vs. Co-location Web Hosting

So - you know shared hosting no longer cuts it,... Read More

Best Website Hosting is One Thats Reliable

If you are looking for a solid, reliable web host,... Read More

Top 5 Mistakes that May Drive Your Visitors Away in Less Than 2 Minutes

You took the leap. You set up a website to... Read More

Web Hosting Solutions In Birmingham

Once you have a website you then need to think... Read More

Web Design and Hosting - Free Web Hosting Perks That Will Perk Up Your Web Site

If you've got or are considering a web hosting account... Read More

4 Critical Things To Look Out For In A Web Hosting Service

1. The reputation of the web hosting company.Most web hosting... Read More

UNIX vs. Windows- What Server Operating System Should You Use for Your Web Hosting?

So you've decided to create a website? The most obvious... Read More

Managed Vs. Unmanaged Dedicated Hosting

"Unmanaged dedicated servers" - this is a pretty uninviting term... Read More

The Big Secret of Fabulous and Mediocre Web Site Hosting Companies

Most web site hosting services like the one you're probably... Read More

Finding a Reliable Host

Finding reliable hosting for your business opportunity is no small... Read More

Use Your Hobby To Launch A Successful Website

When you study the really successful websites, you will quickly... Read More

Web Site Design and Hosting

If you're looking for a professionally designed web site at... Read More

How to Know When It is Time for Your Website to Move On to Dedicated Servers

Knowing when it is time to move onto a dedicated... Read More

Personal Web Hosting ? Free Or Cheap?

After you have spent some time and creativity on designing... Read More

Web Hosts: Helping Us Navigate Through This Future Techno-World

Computers, Internet, Web sites?what do they all mean? Hey, you're... Read More

reliable maid service Wilmette ..