CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

whole house cleaning Highland Park ..
In The News:

Survive flight disruptions with expert travel tips: Book early morning flights, download airline apps and know your refund rights during service cuts.
Apple's iOS 26.1 update delivers major security fixes, performance boosts and enhanced privacy controls for your iPhone. Discover why updating now protects your data.
Russian hackers use fake CAPTCHA tests to spread dangerous malware targeting governments and journalists. Learn how to protect yourself from these deceptive attacks.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Miami-Dade debuts America's first autonomous police SUV with AI cameras, drone deployment and real-time crime detection in groundbreaking law enforcement pilot.
Bank impostor scams cost Americans $2.9 billion as criminals use AI voices and caller ID spoofing to steal life savings. Learn nine essential fraud protection tips.
Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.

Free Web Hosting

There is no concept of free lunch in the world,... Read More

Web Hosting - How To Choose The Right Provider For You

Thousands of companies, tens of thousands of different plans and... Read More

Linux Servers: Do You Understand the Difference?

First of all, some people are worried that they will... Read More

Web Site Hosting For Your Business ? Free or Paid?

It's time to choose! Should you spend some money to... Read More

Internet Domain Registration - Establishing and Transferring Your Domain Name

If you're in business, one of the most important things... Read More

The Web Hosting Industry 2005

For the "big things" to be build it was certainly... Read More

CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based... Read More

Solving Common Problems with Hosting Companies

For those of you with Web sites, you probably know... Read More

Use Your Hobby To Launch A Successful Website

When you study the really successful websites, you will quickly... Read More

The Perfect Support

Hosting Support ? An IntroductionImagine yourself as a person running... Read More

How to Find a Dependable Web Host

Your new website is ready to upload, and now you... Read More

How to Choose a Web Hosting Company?

Nowadays, anybody can afford to order a feature-packed web hosting... Read More

The Top 15 Essential Ingredients of Every WINDOWS HOSTING Plan (Package)

First things First. Why would you like to have Windows... Read More

Adult Web Hosting: The All You Need To Know

What sort of web hosting options should you go for... Read More

Criteria of Choosing an Ideal Web Hosting Company

Before we talk about what it takes to... Read More

Tips About Low Cost Web Hosting Services

Here are some things you should know before finding a... Read More

Dont Get Fooled by the Web Hosting Wolves in Sheeps Clothing!

Are you looking for web hosting? If you want to... Read More

Choosing Your Web Hosting Package

General rule of thumb is not to sign up for... Read More

Reseller Hosting: The Good and The Bad!

Reseller webhosting can be a great way to earn some... Read More

Finding a reliable hosting provider

The website hosting business is very competitive these days with... Read More

Hosting Your Way All The Way To The Bank

Let's face it, the Internet is here for good. Today's... Read More

Multiple Website Hosting - Subdomains are the Answer!

Many business owners find themselves in a quandary over the... Read More

Reseller Hosting Explained

Reseller Defined:The term Reseller according to the dictionary means to... Read More

How to Choose a Hosting Web Package Cheap

If you're looking for a hosting web package cheap there... Read More

Is Free Hosting Really Free?

Sooner or later, as everyone finds out, nothing in this... Read More

pet-friendly home cleaners Glenview ..