CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

one time home cleaning Highland Park ..
In The News:

Privacy risks are hiding in plain sight, as your personal data is likely being collected, tracked, and sold without your knowledge.
VenHub, a fully autonomous, AI-powered smart store just opened at the LAX/Metro Transit Center in Los Angeles.
A woman's Facebook account takeover reveals dangerous social engineering tactics and provides lessons on recovery, avoiding scams and enacting stronger security measures.
Shanghai engineers are using 432 walking robots to relocate a complex, preserving Shikumen architecture while creating space for a modern underground hub and cultural center.
Major healthcare data analytics firm Episource had a cybersecurity incident exposing 5 million patients' medical records and personal information in recent breach.
A new sophisticated PayPal scam sends legitimate-looking emails from official PayPal addresses, using phone numbers instead of links to convince victims to download remote access tools.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
The innovative Kara Pod device extracts moisture from air to create mineral-rich water and brew coffee, featuring UV sterilization and compatibility with Nespresso pods.
Gov. Hochul unveiled New York's nuclear power plant project to power a million homes, which faces permit challenges while promising jobs and a cleaner energy future.
SAFE introduces Aerie, an underground luxury bunker combining high-end living with advanced security, wellness amenities and interactive walls simulating panoramic views.
A Facebook scammer posing as Elon Musk tricked a victim with promises of a Tesla and $250,000, requesting gift cards that become untraceable once the codes are shared.
Experience hands-free golfing with the Robera Neo smart caddie that uses AI to follow you, navigate obstacles and carry your clubs with GPS course mapping.
Cybersecurity alert: 16 billion passwords exposed in massive credential database affecting major platforms. Protect your accounts with password managers
The innovative BeBot robot uses electric power to remove pollution from shorelines, covering 20-30 times more area than manual collection while preserving wildlife.
A new ClickFix campaign targets macOS users with fake Spectrum support sites, tricking victims with CAPTCHA failures to paste commands that install information-stealing malware.
AI-powered autonomous trucks from Plus Automation are being tested across the U.S., Europe and Asia to solve logistics challenges while facing regulatory hurdles and labor concerns.
Your health information might feel private and secure with your doctor, but the reality is far more complicated. Data brokers collect a wide range of sensitive health data, from diagnoses and prescription details to personal identifiers, and sell this data to marketers, insurers, and other third parties.
Kepler Robotics has officially introduced its Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant in Shanghai, marking a significant moment in the real-world deployment of advanced robotics.
Scammers never seem to be running out of new ways to try and get their hands on your money – and lately, they've been getting sophisticated.
Thirty people were injured and killed, though the exact number remains currently unknown, when a suicide bomber blew himself up in a Damascus church.
Unexpected password reset alerts signal potential hacking attempts or phishing scams. Learn how to respond and establish stronger security measures for your accounts.
A historic electric airplane flight landed at JFK with passengers, marking a milestone as Beta Technologies demonstrates the practicality and efficiency of electric air travel.
The Chaos ransomware group breached Optima Tax Relief in a double-extortion attack, stealing sensitive customer case files and corporate documents with personal information.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The first human brain-computer interface by Paradromics was completed in 20 minutes, featuring microelectrodes to help paralyzed individuals control computers with thoughts.

Virtual Web Hosting - What Is Virtual Web Hosting?

If your web site has outgrown its shared hosting solution,... Read More

Web Site Hosting For Your Business ? Free or Paid?

It's time to choose! Should you spend some money to... Read More

Avoid Getting Ripped Off By A Hosting Company

Chances are if you host multiple domains or websites you... Read More

Web Hosting Services Absolutely Necessary for Your Websites Success

Web hosting services play a vital part in your website's... Read More

Web Site Design and Hosting

If you're looking for a professionally designed web site at... Read More

Will All The $1.95 And Free Hosts Survive?

The main thing wrong today with trying to find a... Read More

CGI Web Hosting ? 3 Essential Scripts for Your Business

If there's one thing that people love it is a... Read More

Web Hosting: 4 Factors in Choosing a Hosting Company

When choosing a web hosting company there are a whole... Read More

Where to Get Cheap Web Hosting

First, to see if you can use cheap web hosting... Read More

Business Web Hosting: Which is Right for You?

Business web hosting is what you need. You have a... Read More

Does Your Host Fight Spam?

Virtually anyone with an email address knows what Spam is,... Read More

Overselling Web Hosting: What Does It Mean To You?

Overselling is a big trend in the web-hosting world at... Read More

How Can I Get The Web Host Services And Support I Need, Hassle-free?

Choosing a host or switching hosts can be an agonizing... Read More

Windows vs Linux : Hosting

The Basics of Linux & Windows :Linux (and its close... Read More

Dedicated Web Hosting Is Easy When You Know These 3 Timesaving Secrets

Dedicated web hosting has its difficulties and problems from time... Read More

Reseller Hosting Explained

Reseller Defined:The term Reseller according to the dictionary means to... Read More

The Problem with Free Web Hosting Plans

In my opinion, free web hosting is one of the... Read More

Web Hosts: Helping Us Navigate Through This Future Techno-World

Computers, Internet, Web sites?what do they all mean? Hey, you're... Read More

The Problem With Web Hosting Today

When it comes to web hosting, the quality of the... Read More

Choosing a Web Hosting Provider from 40 Million Other Web Hosts - Pt1

Discover how to go about choosing a web hosting provider... Read More

Fun with DNS: Three Useful Commands

The DNS is a distributed, hierarchical database where authority flows... Read More

Five Quick Ways to Determine One Hosting Company From Another

These days, web hosting companies are popping up faster than... Read More

Linux vs. Windows Web Hosting, Does It Make A Difference?

One of the most confusing decisions someone new to web... Read More

Internet Domain Registration - Establishing and Transferring Your Domain Name

If you're in business, one of the most important things... Read More

Choosing the Right Web Host

Whatever type of website you want to host, choosing the... Read More

licensed cleaning services Park Ridge ..