Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below.

For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples.

Ok, to begin, let's say that we have uploaded some files to a server.

We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar.

Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear.

You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen.

What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory.

There are three types of 'permissions' available.

* User - which means the person signed on who is setting the permissions

* Group - which means a specific group of users for whom access to the file has been granted

* World - which means everyone.

Within these groups of users, there are 3 distinct types of permissions

* Read - which means that permission to read a file, but not alter it or run it

* Write - which means permission to write to a file and change it

* Execute - which means permission to execute a file, which is important in the case of scripts for example.

Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain.

Read
User 400

Group 40

World 4

Write
User 200

Group 20

World 2

Execute
User 100

Group 10

World 1

Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly.

So, lets look at a real example

Can you see how the number 755 is made up? Add up the individual values from the value table and see.

So hopefully you can see, that setting file permissions with the right tool is not hard at all.

Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.

setting file permissons

limousine airport Glendale Heights .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Recycling robots are using artificial intelligence to learn how to sort recyclables by recognizing patterns in colors, textures, shapes and logos.
The Reachy 2 robot is designed to be friendly and approachable, inviting natural interaction and is perfect for research, education and experimenting with embodied AI.
Kurt "CyberGuy" Knutsson shares several easy ways to keep your credit cards safe from digital thieves while you're traveling this summer.
Arcturus sets up cameras around the edges of baseball stadiums to capture real-time action and generate a 3D digital clone of the game.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The CyberGuy explains why healthcare organizations are vulnerable to hackers after there have been a half dozen data breaches this year.
Developed at two California universities, the innovative technology combines brain-computer interfaces with advanced AI to decode neural activity into audible speech.
Microsoft patches 12 critical flaws, but six have already been exploited by criminals. Kurt “CyberGuy" Knutsson says updating your system is only a short-term fix.
Tech expert Kurt “CyberGuy" Knutsson discusses how robots can milk, feed and clean cows on dairy farms, boosting efficiency and comfort.
Tech expert Kurt “CyberGuy" Knutsson says quantum internet ensures unhackable security and redefines online privacy and speed.
Kawasaki's CORLEO is a hydrogen-powered, AI-driven rideable robot. Tech expert Kurt “CyberGuy" Knutsson reports on this new way of thinking about off-road transportation.
The CyberGuy breaks down five mobile privacy terms that could make a difference when it comes to keeping your personal information safe.
A groundbreaking robot that's like a real-life Wall-E uses advanced artificial intelligence to replicate natural gestures and deliberate actions with striking accuracy.
If not properly managed, Windows Defender Application Control, a security feature with Windows, could be a potential security vulnerability.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
FlashBot Arm, a semi-humanoid robot, acts more like a human than traditional robots, and you may see it working at a restaurant, healthcare center or hotel.
There are multiple ways to find your missing Android phone after it goes missing. One method involves using a smartwatch to ping your phone.
The NeuroOne OneRF Ablation System is a new device with FDA-cleared technology designed for both diagnosing and treating neurological disorders in one procedure.
The CyberGuy provides tips to protect yourself from criminals who use various methods to make unauthorized transactions using your account information.
New drone technology maps land and water with stunning accuracy, giving researchers and conservationists a new way to understand our planet.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
X hit with massive data breach with 200 million records leaked, including emails. Tech expert Kurt “CyberGuy" Knutsson offers seven tips to help protect yourself.
Atlas robot by Boston Dynamics amazes tech expert Kurt “CyberGuy" Knutsson with its breakdancing moves.
Tech expert Kurt “CyberGuy" Knutsson talks about how Google kept Android SafetyCore details quiet until it scanned users' photos.

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Review of Rio MP3 Players

Below you will find some useful information and comments about... Read More

5 Steps to Removing PC Clutter

It's hard enough as it is these days to get... Read More

Selecting the Perfect Big Screen TV

Selecting a TV isn't as easy as it used to... Read More

The Ipod Mini: Why Its Not that Hot

I got my eyes set on a iPod mini, as... Read More

How to Save an Image in a SQL Server Database?

Most of the web applications have a lot of images... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

What are the Main Components of Any Computer, and Which are the Most Critical to Its Performance?

Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More

Computer Viruses are Bad Luck

OK, so you caught a computer virus and your system... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

Enhanced Web Browsing With Toolbars

As the Web grows more crowded and just plain "noisy"... Read More

Tips For Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

DVD The Ultimate Consumer Digital Media

Digital Video Disc or as it is sometimes referred to... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

Lincoln Stretch rentals Willowbrook ..