CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

shuttle from Midway Glen Ellyn ..
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.
Learn how to secure social media accounts, implement legacy contacts, and create a digital estate plan to protect your online assets from 'ghost hackers' after your death.
A ported phone number scam is leading to more people having their identities stolen by sophisticated scammers. Kurt “CyberGuy" Knutsson tells you what you need to know.
The Great Pacific Garbage Patch, a vast marine debris vortex, is being tackled by The Ocean Cleanup’s innovative technologies. Kurt “CyberGuy" Knutsson explains.
Discover easy solutions to tame autocorrect frustration on iOS and Android devices. Turn off, customize and add personal touches to your typing experience.

What to Look for in a Web Host

The first questions you have to ask yourself are: how... Read More

Reseller Hosting Explained

Reseller Defined:The term Reseller according to the dictionary means to... Read More

Cheap Web Hosting ? Choose The Right Company

You have carried out the hard part and that's creating... Read More

Linux Servers: Do You Understand the Difference?

First of all, some people are worried that they will... Read More

Free or Paid Web Hosting?

Just finished your first website? So it's the time to... Read More

Importance of Educated Choice While Choosing A Web Hosting Provider

There are many attributes that makes a web hosting provider... Read More

Web Hosting: Shared or Dedicated - Which Should You Choose?

Before you begin your search for a web host you... Read More

Sender Policy Framework (SPF) ? How to use it to Fight Email Forgery

Spam is a real problem today. Forged email is a... Read More

Useful Tips When Applying For A Web Host Provider

Once you have considered the design for your website and... Read More

Choosing Between Free or Paid Web Hosting

There are a number of things to consider when choosing... Read More

Webhosting Explained

Web hosts are service companies that provide space on their... Read More

How To Build A Successful Hosting Company

There are a couple of key things to look at... Read More

Best Website Hosting is One Thats Reliable

If you are looking for a solid, reliable web host,... Read More

Web Hosts: Helping Us Navigate Through This Future Techno-World

Computers, Internet, Web sites?what do they all mean? Hey, you're... Read More

Web Hosting Solutions In Birmingham

Once you have a website you then need to think... Read More

Choosing The Wrong Server Will Literally Make Or Break You

Choosing the right web server will be one of the... Read More

Switching Web Host

Moving a web site to a new host is not... Read More

Buyer Beware: Web Hosting, Registration, and Site Building All in One Package Nightmares

Starting out in any type of online marketing or Internet... Read More

What Is Web Hosting?

The best way to explain this is by comparing it... Read More

Reseller Web Hosting - A Cheaper Alternative?

There comes a time when the internet bug hits us... Read More

The Problem with Free Web Hosting Plans

In my opinion, free web hosting is one of the... Read More

Who Should Become a Web Host Reseller?

You're the webmaster of more than one website. You design... Read More

Internet Domain Registration - Establishing and Transferring Your Domain Name

If you're in business, one of the most important things... Read More

Shared Web Hosting Service Explained!

The next concern for you after designing and developing web... Read More

Web Hosting: 4 Factors in Choosing a Hosting Company

When choosing a web hosting company there are a whole... Read More

shuttle from O'Hare North Chicago ..