CHMOD - Undertanding File Permissions on a Unix-Based Server

The basic command for changing file permissions in unix based operating systems is the 'chmod' command. This command is executed with a set of parameters after it. With most FTP clients, you can simply select the filename you want to change the permissions of, right click, and choose the chmod command.

There are three main groups of permissions when dealing with the chmod command. The three groups are yourself or owner, your unix group, and everyone else. A typical chmod command would look like this - 'chmod 755' This allows you to add, remove or rename files as well as read or edit a file. It also specifies that your unix group and everyone else can only read and edit the file in question. They can't add, delete, or rename the file.

How the numbers in the chmod command work

There are three types of permissions that can be given to a file. They are read, write, and execute. The read permission is assigned a value of 4, the write permission is assigned a value of 2 and the execute permission is assigned a value of 1. So when a chmod command specified the digit 7 as the first number, it means that all three types of permissions are to be assigned to it. If a party is assigned a value of '0' then it means it has no rights whatsoever to a file. '6' tells the server that the user can read and write to the file but can't execute it. I think you get the idea.

Common permissions to set

Most of your html files will do fine with a permission of 644. Most script files will need a permission of 755. Any configuration files in a script package will often need a file permission of 777. Be very careful about assigning a file permission of '777' for everyone. With this permission, it means that anyone who gains access to your server will be able to add, remove, rename, read or edit the file. It is always a good idea with security in mind to assign the least amount of permissions necessary to get the job done.

An FTP client can keep things simple

Most people on shared servers will not have access to a command line to be able to use the chmod command. For most people, changing file permissions will be done through an FTP client. To do this, right click on the file you want to alter, and choose the chmod command. You will usually get a popup that will show nine checkboxes. The will be arranged in three rows. On the left you will usually see Read, Write, and Execute for the row headings. You can accomplish the same thing as typing in the numbers above by clicking on one, two or three boxes for each party. Once you're done, you click the apply or ok button and the file permissions will be changed.

If you keep in mind that you need to always go with the most restrictive file permissions possible that still allows your files to execute, and that there are three parties to define permissions for, you'll do fine. The three parties again are the owner, group, and everyone else.

This article was written by Joe Duchesne, president of http://www.yowling.com/, a web hosting company that specializes in helping online business owners increase their website traffic. Copyright 2004 Yowling. Reprint Freely as long as you link back to my website from this resource box.

whole house cleaning Deerfield ..
In The News:

Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.

Questions To Ask a Hosting Company Before You Start

There are several types of hosting. Among them are:Free hosting... Read More

Cheap Web Hosting Package? eCommerce Web Hosting? - Choosing A Web Hosting Provider

One of the important decisions you'll make when you decide... Read More

Setting up Your Personal Server

There are many things to consider when setting up your... Read More

Tips About Low Cost Web Hosting Services

Here are some things you should know before finding a... Read More

Cheap Web Hosting - When Cheaper is Better

Anyone who has ever shopped for web hosting knows that... Read More

Where to Get Cheap Web Hosting

First, to see if you can use cheap web hosting... Read More

Beware of the Hidden Perils of Low Cost Hosting

Some folks classify low cost web hosting on the same... Read More

Low Cost Web Hosting Services ? Dont Forget About Uptime

Once you have your company's web site up and running,... Read More

A Simple Guide to Web Hosting

Personal Computers, Servers Or ISP?You need a server to host... Read More

Benefits of Web Hosting and Choice of a Web Host

Well let me start this way, a lot of people... Read More

What Is Web Hosting?

Many businesses, from one-man-bands to multi-national corporations, have a web-presence... Read More

Finding the Right Web Host

Choosing the right Web Hosting service for your website can... Read More

How To Build A Successful Hosting Company

There are a couple of key things to look at... Read More

How to Get Better Technical Support

Whenever you have a technical question that needs answering, you... Read More

Which Is The Better Server Operating System, Unix or Windows?

Anybody who decides to get a web hosting service or... Read More

How To Choose A Reliable Web Host For Your Website

A client of mine paid for a solo advert to... Read More

Battle Of The Hostings

There are literally thousands of hosting solutions on the internet... Read More

Useful Tips When Applying For A Web Host Provider

Once you have considered the design for your website and... Read More

How to Choose a Web Hosting Company?

Nowadays, anybody can afford to order a feature-packed web hosting... Read More

Dedicated Web Hosting : The Executive Summary

What is Dedicated Web Hosting? Dedicated web hosting can alleviate... Read More

Will All The $1.95 And Free Hosts Survive?

The main thing wrong today with trying to find a... Read More

Web Hosting Services Absolutely Necessary for Your Websites Success

Web hosting services play a vital part in your website's... Read More

What You Should Know About Your Web Host

Yesterday I received a nice email in my inbox, I... Read More

Back To School Web Hosting

Every year as school starts web hosts see an up... Read More

Windows Hosting versus Linux Hosting ? Which is right for you?

There are literally hundreds of thousands of web hosting companies... Read More

home cleaning services Des Plaines ..