CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

recurring maid service Buffalo Grove ..
In The News:

The iconic Mary Kay pink Cadillac goes electric with the Cadillac Optiq, available only to the company's top 1% of sales force performers.
Cybercriminals abuse trusted Intel driver to gain kernel access and shut down Windows Defender, enabling undetected malware deployment since July 2025.
Using email aliases for online shopping and subscriptions can protect your privacy by preventing companies from linking your activity across websites.
New research shows AI overlap does not equal job replacement, with knowledge-based roles seeing most integration while physical jobs remain least affected.
Scammers target seniors who avoid social media by exploiting public records like obituaries and real estate filings to steal personal information and money
Recovery team in Italy use AI-enabled drones to detect missing hiker's red helmet, leading to successful recovery after months of ground searches
Google Salesforce system breach exposes business data while scammers use incident to target users with fake security calls and phishing attempts.
Google announces Pixel 10 lineup with Tensor G5 chip and Gemini Nano AI, introducing Magic Cue, Pro Res Zoom up to 100x and satellite emergency support features.
C San Diego study reveals 86% of school safety companies monitor students 24/7 on personal devices, raising privacy concerns.
Users can now add their favorite outlets' coverage to the Top Stories section of Google search results by utilizing the 'preferred sources' feature. With just a few clicks, you can add Fox News.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Interstellar object 3I/ATLAS shows an unexpected frontal glow that Harvard's Avi Loeb says cannot be explained by sunlight reflection or standard cometary outgassing.
Receiving order confirmations for purchases you never made could mean your email address is being exploited in fraud operations targeting multiple retailers.
First wireless brain implant works with Apple's official protocol, enabling hands-free control of iPhones, iPads and Vision Pro through thought alone.
Data brokers sell personal details that scammers use to target retirement funds through fake financial advisor calls and convincing phishing attempts
Ten innovative tech solutions from gait sensors to smart pill dispensers help adults 65+ track fall risks and prevent injuries before they happen.
Meta AI internal documents revealed chatbots were allowed to flirt with children and engage in romantic conversations until the company was exposed by Reuters.
ChatGPT will avoid giving direct mental health advice under new OpenAI rules following instances where the AI model provided harmful or misleading responses.
Your phone tracks you in more ways than that little GPS icon suggests. Here’s how to find and clear hidden location logs on iPhone and Android.
Authorities in France and the Netherlands have been notified. Meanwhile, impacted customers are being told to stay alert.
Apple just rolled out a redesigned Blood Oxygen feature to specific models, following a recent victory in a legal dispute.
Kidney dialysis provider DaVita experienced a ransomware breach by the Interlock gang affecting 916,000 people in the second-largest U.S. healthcare attack of 2025.
A Chinese-made Unitree R1 robot walked Manhattan streets and shopped for shoes as part of KraneShares' $28 million AI robotics fund promotion campaign.
The ShinyHunters cybercriminal group breached Google's Salesforce system through vishing attacks, stealing business contact details and customer data.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.

Web Hosting Providers - Find A Newbie Friendly Web Site Host

If you're about to set up your first web site... Read More

Attracting Extra Web Hosting Customers By Targeting Cities, i.e. New York Web Hosting

These searchers are looking for a hosting company in a... Read More

Hosting Your Way All The Way To The Bank

Let's face it, the Internet is here for good. Today's... Read More

Confessions and Tips from a Top Web Hosting Salesman

Have you ever gone car shopping with a former car... Read More

What Some Web Hosts Dont Want You To Know

Many start-up web hosts in their desperate attempt to get... Read More

Web Hosting: 4 Factors in Choosing a Hosting Company

When choosing a web hosting company there are a whole... Read More

Managed Vs. Unmanaged Dedicated Hosting

"Unmanaged dedicated servers" - this is a pretty uninviting term... Read More

Linux Servers: Do You Understand the Difference?

First of all, some people are worried that they will... Read More

Server Host: Where Does My Web Page Go?

For those of you who don't really understand where or... Read More

Free or Paid Web Hosting?

Just finished your first website? So it's the time to... Read More

Web Hosting Woes for Beginners

Every individual when it starts surfing the net for choosing... Read More

How to Achieve # 1 on Free Hosting

A domain name and paid hosting are considered essential for... Read More

Overselling Web Hosting: What Does It Mean To You?

Overselling is a big trend in the web-hosting world at... Read More

Choosing a Web Hosting Provider from 40 Million Other Web Hosts - Pt1

Discover how to go about choosing a web hosting provider... Read More

How VOIP Has Helped Change Web Hosting

There is really no stopping VOIP (voice over internet protocol)... Read More

7 Key Ingredients for Rock Solid Website Hosting

Every website needs a great web host, however when you... Read More

Small And Medium Businesses Embrace Servers Running Linux

Although we are aware of Linux adoption by large enterprises,... Read More

How To Find The Best Web Hosting For You

Deciding on the best web hosting company for a web... Read More

Getting The Best Web Hosting For Your Business

After the dot.com bubble burst a few years back I... Read More

Steps to Becoming a Web Host Reseller

You've decided to get a reseller web hosting account to... Read More

The Problem with Free Web Hosting Plans

In my opinion, free web hosting is one of the... Read More

Setting up Your Personal Server

There are many things to consider when setting up your... Read More

Questions To Ask a Hosting Company Before You Start

There are several types of hosting. Among them are:Free hosting... Read More

Best Website Hosting is One Thats Reliable

If you are looking for a solid, reliable web host,... Read More

Choosing the Perfect Deluxe Web Site Hosting Plan

If you are looking for a deluxe web site hosting... Read More

premium house cleaning Glenview ..