Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below.

For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples.

Ok, to begin, let's say that we have uploaded some files to a server.

We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar.

Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear.

You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen.

What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory.

There are three types of 'permissions' available.

* User - which means the person signed on who is setting the permissions

* Group - which means a specific group of users for whom access to the file has been granted

* World - which means everyone.

Within these groups of users, there are 3 distinct types of permissions

* Read - which means that permission to read a file, but not alter it or run it

* Write - which means permission to write to a file and change it

* Execute - which means permission to execute a file, which is important in the case of scripts for example.

Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain.

Read
User 400

Group 40

World 4

Write
User 200

Group 20

World 2

Execute
User 100

Group 10

World 1

Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly.

So, lets look at a real example

Can you see how the number 755 is made up? Add up the individual values from the value table and see.

So hopefully you can see, that setting file permissions with the right tool is not hard at all.

Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.

setting file permissons

tidy up service Winnetka ..
In The News:

Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.
Survey of 1,000 students shows teens using AI for personal relationships while two-thirds of parents remain unaware of their children's AI usage.
Cybersecurity experts warn about a ShadowLeak vulnerability that weaponized ChatGPT's Deep Research agent to steal personal data from Gmail accounts through hidden commands.
Tesla's Full Self-Driving system faces federal investigation following 58 reports of crashes, with six vehicles running red lights before colliding with other cars.
The Fox News AI Newsletter brings you the latest developments on artificial intelligence, with news on OpenAI moving to soon allow erotica for adult users.
Eric Schmidt alerts that hackers can reverse-engineer AI models to bypass safety measures, citing examples like the jailbroken ChatGPT variant called DAN.
Cybercriminals exploit Microsoft Teams through impersonation, malicious links and fake profiles to gather intel and deliver ransomware to personal and work devices.
Google, Dior, Allianz and dozens of other companies lost sensitive customer data in Salesforce-related breaches affecting millions of records across multiple sectors.
Apple launches iOS 26 with new Preview app that combines document editing, PDF annotation and scanning features into one streamlined iPhone experience.
New AI road monitoring system uses sensor-embedded fabric to predict infrastructure problems, potentially reducing maintenance costs and traffic disruptions for cities.
Holiday charity scams target retirees through lookalike organization names, untraceable payment requests, and data broker information to steal donations.
The Federal Trade Commission says criminals are posing as IRS agents, law enforcement officers or other officials, often over the phone or online, to steal thousands of dollars at a time.
AI phishing scams now use voice cloning and deepfake technology to trick victims, but Kurt "CyberGuy" Knutsson reveals warning signs to watch for.
Inversion Space unveils Arc, a reusable reentry vehicle that can deliver up to 500 pounds of cargo from orbit to anywhere on Earth in under an hour.
Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Nephrology and Dialysis For a PDA

Saving Lives With A Pocket PCFree medical downloads can be... Read More

CCNA 640-801 Certification Primer

The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More

Cisco Certification: The Most Important Cisco Study Youll Ever Do

All of us are familiar with the pyramids of Egypt.... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Tips For Finding Great Deals On Computer Accessories & Supplies

Tip #1. Do a Google search. Don't be to general... Read More

Help, I Need a New HDTV! (Part 4 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

The Many Benefits of Owning a DVR

Has This Ever Happened To You? OK.. it's Friday night,... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

5 Simple Ways To Increase Your Computer Speed & Help Your Computer Run More Efficiently!

If you're a computer expert, you'll probably already know about... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Five Simple Steps to Speed up Your Computer

Most people download and save so much information on their... Read More

What Exactly are Screensavers? - part II

Here are some tips on how to use screensavers:First of... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

Lightning Season: How to Avoid Data Loss

We have just entered the time of year that most... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

kitchen deep cleaning Lake Forest ..