CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

family-safe home cleaners Lincolnshire ..
In The News:

Texas family reunites with missing 11-year-old cat Grayson after 103 days using Petco Love Lost's AI photo matching technology and community help.
Tired of AI customer service loops? These insider tricks help you escape "frustration AI" and get real human help when you need it most for urgent issues.
Unlock richer audio from your streaming apps with simple tweaks to volume normalization, equalizer settings, and quality preferences for cleaner sound.
Scammers are sending fake Facebook settlement payout emails that mimic legitimate notices from the privacy settlement administrator to deceive users.
Holiday shopping scams surge as fake refund emails target distracted consumers during Black Friday and holiday seasons, costing Americans billions annually.
The AI-powered IRMO M1 exoskeleton features four modes, including turbo, eco, training and rest for hiking, running, cycling and sports with eight-hour battery life.
OpenAI announced upgrades for its ChatGPT Images platform on Tuesday, saying the program can now make more precise edits and produce images more quickly.
Chrome for Android now turns web articles into AI-powered podcast conversations. Get hands-free browsing with Google Gemini's natural audio summaries.
LastPass faces $1.6 million fine from U.K. regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.

Top 6 Ways to Promote Your Web Hosting Business Part 2

Here are the following three methods that can help you... Read More

Handling Your Email Addresses

--Company Email Addresses--Web hosting companies should provide company email accounts... Read More

Virtual Web Hosting - What Is Virtual Web Hosting?

If your web site has outgrown its shared hosting solution,... Read More

Website Sitebuilders: Easy to use Website builders Come with a Price

Professional web designers don't come cheap. A good web designer... Read More

40,000 New Blogs Are Started Daily - How Your Web Hosting Business Can Cash in

The fact that an estimated 40,000 new blogs are being... Read More

Web Hosts - Not All Are Created Equal

Many people think that all web hosts offer the same... Read More

Monitor Your Web Site for Downtime

For those in the Internet business the availability of their... Read More

Useful Tips When Applying For A Web Host Provider

Once you have considered the design for your website and... Read More

How To Host Several Websites Under One Account

If you operate several websites, each with its own domain... Read More

The Big Secret of Fabulous and Mediocre Web Site Hosting Companies

Most web site hosting services like the one you're probably... Read More

Tips on Finding a Hosting Service for Your Business Website

There are so many hosting companies offering to host your... Read More

Web Hosting Solutions In Birmingham

Once you have a website you then need to think... Read More

Provide A Good Home For Your Website

Selecting a web hosting company is like sending one of... Read More

Choose A Host That Matches Your Home Business Needs

With plethora of hosting companies offering services, choosing a good... Read More

Web Hosting; Make Them Work for You

There are two main types of host providers. They are... Read More

Choosing a Quality Web Host

If you are anything like me, you'd probably like to... Read More

Webhosting Explained

Web hosts are service companies that provide space on their... Read More

Reseller Hosting: The Good and The Bad!

Reseller webhosting can be a great way to earn some... Read More

Choosing the Right Web Host

Whatever type of website you want to host, choosing the... Read More

Budget Web Hosting - Dirty Secrets That Can Squash Your Websites Chance of Success

When it comes to budget web hosting, there are a... Read More

Top 5 Mistakes that May Drive Your Visitors Away in Less Than 2 Minutes

You took the leap. You set up a website to... Read More

What to Look for in a Free Hosting Provider

The first thing that you must realize when looking for... Read More

How to Choose the Web Site Hosting Service thats Right for You

There are few things as critical to your e-business success... Read More

Switching Web Host

Moving a web site to a new host is not... Read More

What is a Web Host Reseller Account?

A web host reseller account is a web hosting account... Read More

maide service in Buffalo Grove ..