![]() | |
![]() | |
![]() |
Personal Technology Information |
|
![]() |
Setting File Permissions On A Unix Server
File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below. For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples. Ok, to begin, let's say that we have uploaded some files to a server. We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar. Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear. You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen. What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory. There are three types of 'permissions' available. * User - which means the person signed on who is setting the permissions * Group - which means a specific group of users for whom access to the file has been granted * World - which means everyone. Within these groups of users, there are 3 distinct types of permissions * Read - which means that permission to read a file, but not alter it or run it * Write - which means permission to write to a file and change it * Execute - which means permission to execute a file, which is important in the case of scripts for example. Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain. Read Group 40 World 4 Write Group 20 World 2 Execute Group 10 World 1 Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly. So, lets look at a real example Can you see how the number 755 is made up? Add up the individual values from the value table and see. So hopefully you can see, that setting file permissions with the right tool is not hard at all. Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.
MORE RESOURCES: I Quit Google Search for AI—and I’m Not Going Back The Wall Street Journal If TikTok Is Here to Stay, What Does That Mean for Us? The New York Times TOP 10 personal tech and gadgets of 2024 Designboom The Latest Personal Tech at CES 2025- The Accounting Technology Lab Podcast - Jan. 2025 CPAPracticeAdvisor.com The Five Things You Shouldn’t Tell ChatGPT The Wall Street Journal Personal Enrichment Courses Wake Tech Newsroom Tech for Babies Is Booming. Here’s What One Parent Found Helped the Most. The New York Times Not a Coder? With A.I., Just Having an Idea Can Be Enough. The New York Times AI Solves My Most Annoying Chore: Meal Planning for a Toddler The Wall Street Journal How Workplace Tech Has Changed Over the Years, From the WSJ Archives The Wall Street Journal How Tech Created a ‘Recipe for Loneliness’ The New York Times iRobot may be iDead in iYear The Register Tech That Will Change Your Life in 2025 - WSJ The Wall Street Journal The Trouble With Searching Google for ‘the Best’ The Wall Street Journal The Snapchat Move That Leaves Teen Girls Heartbroken The Wall Street Journal When Cell Service Is Down, You Can Send iPhone Texts via Satellite The Wall Street Journal How to Create a Multimedia Digital Journal of Your Life The New York Times Office Technology Comes to the Movies: Test Your Knowledge With Our Quiz The Wall Street Journal Top 10 Personal Gadgets For Tech-Savvy Individuals Designed To Revolutionize Their Routine Yanko Design Your iPhone Storage Is Full Again. Do This to Reclaim Space. The Wall Street Journal How a Little-Known Finnish Company Became One of the World’s Hottest Gadget Startups - WSJ The Wall Street Journal Shop the best Cyber Monday deals on phones, tablets, smartwatches and more Good Morning America The 28 Best Tech Gifts of 2024, According to Our Gadget Gurus - WSJ The Wall Street Journal ChatGPT vs. Claude vs. DeepSeek: The Battle to Be My AI Work Assistant - WSJ The Wall Street Journal Tech Made Easy AARP Things to Try: Our 9 Top Tech Tips for You The Wall Street Journal Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times How to Make Typing Easier on the Phone and Leave the Laptop at Home The New York Times The Summer Is So Hot, Workers Are Wearing High-Tech Ice Packs The Wall Street Journal Touch Screens Are Over. Even Apple Is Bringing Back Buttons. - WSJ The Wall Street Journal Apple Intelligence Isn’t Very Smart Yet—and Apple’s OK With That - WSJ The Wall Street Journal I Replied ‘Stop’ to a Political Text Message. I Got 100 More. - WSJ The Wall Street Journal The Coolest Tech Gadgets We Recommend for 2025 BestProducts.com Wozniak: I didn't reduce chip count for manufacturing. I wanted to prove I was clever - The Register The Year Everyone Started ‘Manifesting.’ Does It Work? The Wall Street Journal Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times User said he did nothing that explained his dead PC – does a new motherboard count? - The Register What the Arrival of A.I. Phones and Computers Means for Our Data The New York Times Want an iPhone 16 Review? Just Ask Joannabot The Wall Street Journal Can an App Replace a Personal Trainer? I Tested Nearly a Dozen to Find Out - The Wall Street Journal Can an App Replace a Personal Trainer? I Tested Nearly a Dozen to Find Out The Wall Street Journal Apple Watch Is Becoming Doctors’ Favorite Medical Device - WSJ The Wall Street Journal This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times How to Download Your Videos and Other Data From TikTok The New York Times Apple Headset Stalls, Struggles to Attract Killer Apps in First Year The Wall Street Journal The Only App That Always Wins the Battle for Your Attention The Wall Street Journal No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom The Register Exclusive | Wanted: Weekend Warriors in Tech The Wall Street Journal Android beefs up Bluetooth tag stalker protections The Register The Great AI Challenge: We Test Five Top Bots on Useful, Everyday Skills The Wall Street Journal Laptop makers stalled on repairability improvements The Register PC shipments stuck in neutral despite AI buzz The Register Exclusive | Google’s Gemini Live AI Sounds So Human, I Almost Forgot It Was a Bot The Wall Street Journal I’ve Been Driving an EV for a Year. I Have Only One Regret. - WSJ The Wall Street Journal Why You Might Suddenly Be Following Trump on Instagram and Facebook The New York Times Running Your Household Is a Second Job, but It Doesn’t Have to Be The Wall Street Journal |
![]() |
![]() |
![]() |
RELATED ARTICLES
Linux Power Tools - Great Tools to Make System Administration Easy World War II - Germany decided to attack Poland.Poland had many great warriors. 10 Tips to Stay Safe and Secure Online The Internet can be a dangerous place.While you're enjoying the convenience of online shopping, Internet banking and subscription websites, nasty people lurk around every corner. Reliable File and Folder Sharing in Windows Xp This tip is on sharing files and folders on a local network in Windows XP. It has been tested on Windows XP Professional (with and without SP2). Learning To Navigate Ciscos Online Documentation When studying for your Cisco CCNA, CCNP, or CCIE exam, you've got a powerful online weapon at your disposal. It's Cisco Connection Documentation, found at www. Top 9 Ways To Speed Up Your Surfing & Computing It seems like fast never quite rates fast enough.No matter how quickly something moves, especially on theInternet, it could always move faster. Healthy Webmasters Choose Ergonomic Computer Products Webmasters usually sit at their computers much longer in a day than most other office workers, sometimes up to 10 and 12 hours. This can bring about the potential for physical discomforts that are attributed to prolonged use and the repetitive tasks that they perform on computers every day. More Cool Web Tricks If you ask most people what frustrates them most about the Internet, many of them will tell you "It's the little things!"It seems like all the great tricks and tips that make people exclaim "STOP! How did you do that?" never make it into any manual (at least where I can find them).My father (and co-author of "Turn Words Into Traffic") calls it the "reverse oral tradition" of computing, where children teach parents the survival skills of PC life. Getting Started with HTML The basic language of the internet is html. If you can do crossword puzzles, if you can write a report for your teacher or boss, you can be creating web pages in a matter of minutes. Mail-merging: The Principles About mail-mergingMail-merging is the process of merging variable data and fixedtext.Using mail-merging, you can create individualised letters,envelopes, labels and other documents without having tolaboriously create each individual one. The Importance Of Email Backup Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. How to Switch to Firefox and Why You should First things first, what is Firefox? Well, it's a browser. Ok but what's that? A browser is a computer program used to view web pages, to browse through the world wide web. Repairing A Corrupt .RAR/.ZIP Archive Step 1:Open WinRAR and browse to the folder with your .rar/. Cisco Certification: The Most Important Cisco Study Youll Ever Do All of us are familiar with the pyramids of Egypt. These magnificent structures have stood for thousands of years, withstanding extreme heat and other factors that would bring down an ordinary structure. How to Protect your PC from Spyware in the Cyber Age Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse.. DVD The Ultimate Consumer Digital Media Digital Video Disc or as it is sometimes referred to Digital Versatile Disc (DVD) has for the last several years been Hollywood's primary video delivery method and with good cause. This inexpensive, compact media delivers excellent video and audio quality. What Exactly are Screensavers? - part I After reading this good article you will know some important information about screensavers and their history. You will find out how screensavers are different from other applications and what advantages you'll have if you use them. Five Simple Steps to Speed up Your Computer Most people download and save so much information on their computer that before long the computer starts slowing down and the user has no idea what the problem is. However, even if you are not a computer whiz there are several things you can easily do to speed up your computer quickly and easily. Cisco Certification: Building Your Home Lab, Part II In the first part of this home lab tutorial, CCNA and CCNP candidates can see that there are a LOT of choices when it comes to what to buy to build your own Cisco practice lab.Having been there myself, I know itâ??s confusing to decide how many routers or switches to buy, and what I need at the minimum to run labs and get some great hands-on practice. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Microsoft Great Plains Dexterity Customizations Microsoft Business Solutions is on the way to popularize it's ERP systems implementation. Right now such products as Microsoft CRM and Small Business Manager (cheap version of Microsoft Great Plains, based on the same Great Plains Dexterity runtime and DYNAMICS. ![]() |
home | site map |
© 2006 |