CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

shuttle to Midway Beardstown .. Lockport Chicago limo O’Hare
In The News:

The FBI has issued a warning that scammers are impersonating doctors, police and banks using spoofed numbers as "smishing" texts surge nationwide.
Communities with unreliable internet service stand to gain after Amazon's Project Kuiper launched its first full batch of satellites into orbit April 28.
Tech expert Kurt “CyberGuy" Knutsson says unsubscribing from spam might actually backfire. Learn when to avoid it and stop junk effectively.
Tech expert Kurt “CyberGuy" Knutsson talks about how the first nonstop beating heart transplant, called zero ischemic time, at Taiwan hospital changes surgery.
Kurt “CyberGuy" Knutsson: FBI warns of "time-traveling" hackers.
Kurt “CyberGuy" Knutsson talks about a soft, vine-like robot called SPROUT that aids safe survivor rescues in collapsed buildings.
Health insurance giant Blue Shield of California confirmed it had been sharing private health data of 4.7 million users with Google for three years without even realizing it.
Delta and JetZero’s blended wing body aircraft marks a meaningful step toward a cleaner, quieter and more efficient future for air travel.
Recent reports show many common passwords can be cracked in literally seconds. Kurt the CyberGuy explains how to strengthen your passwords.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Iron, a robot that stands 5 feet, 8 inches tall and weighs 154 pounds, combines advanced artificial intelligence with human-like movement and exceptional vision.
Hertz, the rental car giant, recently confirmed that customer information was exposed through a cyberattack on one of its software vendors.
There are a number of features with AirPods you may or may not know about to take your listening experience to the next level. Kurt the CyberGuy explains.
These 35 Chrome extensions have privacy and security concerns. Tech expert Kurt “CyberGuy" Knutsson says to delete them now.
Tech expert Kurt “CyberGuy" Knutsson says 329,000 mph fusion rocket promises to be fast, disruptive and enable deep-space missions.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech expert Kurt “CyberGuy" Knutsson says a new autonomous AI is a game changer that also raises privacy risks. Is your data safe?
Tech expert Kurt “CyberGuy" Knutsson says robots and drones are revolutionizing fruit farming with faster picking and smarter handling.
Landmark Admin revises May 2024 cyberattack scope to show twice as many people were affected. Kurt “CyberGuy" Knutsson gives tips to help stay safe from an insurance data breach.
Tech expert Kurt “CyberGuy" Knutsson talks about how Yamaha’s hydrogen outboard motor could revolutionize boating with zero emissions.
Tech expert Kurt “CyberGuy" Knutsson reveals how to memorialize or remove a deceased loved one’s Facebook account and protect their digital legacy from misuse or scams.
Tech expert Kurt “CyberGuy" Knutsson says an Apple Watch saved psychiatrist Amanda Faulkner by detecting deadly leukemia early.
Scammers and fraudsters are increasingly targeting the most vulnerable, especially nursing homes and the personal data of their residents. Kurt the CyberGuy has safety tips.
Infected USB flash drives can spread malware among multiple organizations in ways that can easily bypass traditional security systems.
With a fully automated warehouse system and AI-powered robots, Ocado's Hive picks, packs and delivers grocery store orders in just a few minutes.

Types of Web Site Hosting

First of all we must determine the meaning of the... Read More

How to Know When It is Time for Your Website to Move On to Dedicated Servers

Knowing when it is time to move onto a dedicated... Read More

How Much Bandwidth Does Your Web Site Need?

One of the most common concerns people have when deciding... Read More

How to Choose the Web Site Hosting Service thats Right for You

There are few things as critical to your e-business success... Read More

Buyer Beware: Web Hosting, Registration, and Site Building All in One Package Nightmares

Starting out in any type of online marketing or Internet... Read More

Handling Your Email Addresses

--Company Email Addresses--Web hosting companies should provide company email accounts... Read More

Low Cost Web Hosting Services ? Dont Forget About Uptime

Once you have your company's web site up and running,... Read More

Dedicated / Virtual Dedicated Servers and Its Benefits!

What is a Dedicated / Virtual Dedicated server and why... Read More

Web Hosting Operating Systems Explained

A few time ago appeared a lot disagreements between opinions... Read More

Web Hosting and Development

If you've ever browsed the World Wide Web and wondered... Read More

The Problem with Free Web Hosting Plans

In my opinion, free web hosting is one of the... Read More

Web Design and Hosting - Free Web Hosting Perks That Will Perk Up Your Web Site

If you've got or are considering a web hosting account... Read More

Web Site Hosting For Your Business ? Free or Paid?

It's time to choose! Should you spend some money to... Read More

Cheap Hosting Packages and Low Cost Web Hosting - Watch For Hidden Costs

If you're shopping around for an affordable web hosting plan,... Read More

Windows Hosting versus Linux Hosting

The matter of choosing between the operating system (OS) running... Read More

How to Start Your Own Hosting Services

If your like many another webmasters you might be thinking... Read More

Cheap Internet Hosting, Business Web Hosting - Choosing The Right Web Host Package

With literally hundreds of web hosting providers competing for your... Read More

Hosting Your Way All The Way To The Bank

Let's face it, the Internet is here for good. Today's... Read More

Five Quick Ways to Determine One Hosting Company From Another

These days, web hosting companies are popping up faster than... Read More

In Search of Webhosting: First Understand the Industry

In search of a webhosting company for personal or small... Read More

Unlimited Bandwidth in Web Hosting

Bandwidth explained:Bandwidth is the amount of data transfer that you... Read More

More Profits in Your Website Hosting Business

If you run a website hosting business, you already know... Read More

Elements of Web Hosting

When you first start out trying to get a site... Read More

Business Web Hosting: Which is Right for You?

Business web hosting is what you need. You have a... Read More

Changing to a New Host? No More Worries!

John's online business is expanding. His customers are increasing day... Read More

Green Bay Hummer H2 SUV rentals ..