CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

quick home cleaning Glenview ..
In The News:

Instagram's new 'Your Algorithm' tool lets you control your Reels feed in real time. The app now gives you power to customize what videos you see.
Major Marquis fintech breach exposes 400,000-plus Americans' data through unpatched SonicWall vulnerability, with Texas hardest hit at 354,000 affected.
Free up iPhone storage fast by clearing large photos and videos from Messages app. Simple steps for iOS users to delete attachments without losing chats.
Scammers are flooding inboxes with fake tracking alerts that mimic real carriers, exploiting the holiday rush to steal logins and personal data.
The Fox News AI Newsletter brings you the latest news on AI technology advancements and the challenges and opportunities AI presents now and for the future.
Texas family reunites with missing 11-year-old cat Grayson after 103 days using Petco Love Lost's AI photo matching technology and community help.
Tired of AI customer service loops? These insider tricks help you escape "frustration AI" and get real human help when you need it most for urgent issues.
Unlock richer audio from your streaming apps with simple tweaks to volume normalization, equalizer settings, and quality preferences for cleaner sound.
Scammers are sending fake Facebook settlement payout emails that mimic legitimate notices from the privacy settlement administrator to deceive users.
Holiday shopping scams surge as fake refund emails target distracted consumers during Black Friday and holiday seasons, costing Americans billions annually.
The AI-powered IRMO M1 exoskeleton features four modes, including turbo, eco, training and rest for hiking, running, cycling and sports with eight-hour battery life.
OpenAI announced upgrades for its ChatGPT Images platform on Tuesday, saying the program can now make more precise edits and produce images more quickly.
Chrome for Android now turns web articles into AI-powered podcast conversations. Get hands-free browsing with Google Gemini's natural audio summaries.
LastPass faces $1.6 million fine from U.K. regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.

Choosing Your Web Hosting Package

General rule of thumb is not to sign up for... Read More

Niche Hosting

There is story of David and Goliath where Goliath would... Read More

Attracting Extra Web Hosting Customers By Targeting Cities, i.e. New York Web Hosting

These searchers are looking for a hosting company in a... Read More

Webhosting for Blogs - Free or Paid Service

Blogging is an abbreviation of "web-logging". The simplest definition of... Read More

The Big Secret of Fabulous and Mediocre Web Site Hosting Companies

Most web site hosting services like the one you're probably... Read More

The #1 Factor New Webmasters Forget to Consider when Choosing a Web Hosting Plan

The ProblemToo often new webmasters sign-up with the first good... Read More

Server Host: Where Does My Web Page Go?

For those of you who don't really understand where or... Read More

Effectiveness of Web Hosting Directories (WHDs)

John is very happy today, for the first time in... Read More

Web Hosts: Helping Us Navigate Through This Future Techno-World

Computers, Internet, Web sites?what do they all mean? Hey, you're... Read More

Monitor Your Web Site for Downtime

For those in the Internet business the availability of their... Read More

Choosing a Web Host Based On Price? Dont!

It's tempting. There are so many companies offering cut-rate hosting... Read More

The Problem with Free Web Hosting Plans

In my opinion, free web hosting is one of the... Read More

EBay Pictures Make Money

If you have ever used EBay then you know how... Read More

How To Choose The Best Web Host For You

Web Hosting is a service. Auto mechanics also provide a... Read More

How to Find Good Web Hosting for Your Site!

When building your first site the main things that you... Read More

Finding the Right Web Host

Choosing the right Web Hosting service for your website can... Read More

Dedicated Server vs. Co-location Web Hosting

So - you know shared hosting no longer cuts it,... Read More

How to Start Your Own Hosting Services

If your like many another webmasters you might be thinking... Read More

Dedicated Web Hosting Is Easy When You Know These 3 Timesaving Secrets

Dedicated web hosting has its difficulties and problems from time... Read More

Dedicated Web Hosting : The Executive Summary

What is Dedicated Web Hosting? Dedicated web hosting can alleviate... Read More

Does Your Host Fight Spam?

Virtually anyone with an email address knows what Spam is,... Read More

Webhosting Explained

Web hosts are service companies that provide space on their... Read More

The Domain Name Gold Rush

All the good ones are taken. The really good ones,... Read More

Finding a Reliable Host

Finding reliable hosting for your business opportunity is no small... Read More

The Web Hosting Industry 2005

For the "big things" to be build it was certainly... Read More

scheduled maid service Winnetka ..