Personal Technology Information |
|
Setting File Permissions On A Unix Server
File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below. For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples. Ok, to begin, let's say that we have uploaded some files to a server. We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar. Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear. You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen. What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory. There are three types of 'permissions' available. * User - which means the person signed on who is setting the permissions * Group - which means a specific group of users for whom access to the file has been granted * World - which means everyone. Within these groups of users, there are 3 distinct types of permissions * Read - which means that permission to read a file, but not alter it or run it * Write - which means permission to write to a file and change it * Execute - which means permission to execute a file, which is important in the case of scripts for example. Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain. Read Group 40 World 4 Write Group 20 World 2 Execute Group 10 World 1 Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly. So, lets look at a real example Can you see how the number 755 is made up? Add up the individual values from the value table and see. So hopefully you can see, that setting file permissions with the right tool is not hard at all. Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.
MORE RESOURCES: From personal aircraft to e-bikes to robots: 5 tech innovations seen at CES Las Vegas Review-Journal Minnesota tech on display at country’s biggest consumer electronics show, with 3M leading the way Star Tribune TOP 10 personal tech and gadgets of 2024 Designboom How AI Will Change Personal Tech in 2025 - Tech News Briefing - WSJ Podcasts The Wall Street Journal Time to Finally Organize Your Digital Photos. First You Have to Find Them. - The Wall Street Journal Time to Finally Organize Your Digital Photos. First You Have to Find Them. The Wall Street Journal Shop the best Cyber Monday deals on phones, tablets, smartwatches and more Good Morning America Tech That Will Change Your Life in 2025 The Wall Street Journal Things to Try: Our 9 Top Tech Tips for You The Wall Street Journal The 28 Best Tech Gifts of 2024, According to Our Gadget Gurus The Wall Street Journal I’ve Been Driving an EV for a Year. I Have Only One Regret. The Wall Street Journal How Tech Created a ‘Recipe for Loneliness’ The New York Times Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times The Great AI Challenge: We Test Five Top Bots on Useful, Everyday Skills The Wall Street Journal Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times Android beefs up Bluetooth tag stalker protections The Register The Coolest Tech Gadgets We’ve Tested So Far This Year BestProducts.com Opinion | Why Is Technology Mean to Me? The New York Times The Summer Is So Hot, Workers Are Wearing High-Tech Ice Packs The Wall Street Journal In the City, Personal Safety Starts With Your Smartphone The Wall Street Journal Apple Watch Is Becoming Doctors’ Favorite Medical Device The Wall Street Journal Why Turning It Off and Turning It Back On Is Gadget-Fixing Magic The Wall Street Journal No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom The Register What the Arrival of A.I. Phones and Computers Means for Our Data The New York Times Apple Intelligence Isn’t Very Smart Yet—and Apple’s OK With That The Wall Street Journal How I Got My Attention Span Back The Wall Street Journal Jonathan Haidt Blamed Tech for Teen Anxiety. Managing the Blowback Has Become a Full-Time Job. The Wall Street Journal The Only App That Always Wins the Battle for Your Attention The Wall Street Journal How to Add Extra Security Layers to Your Phone or Tablet The New York Times Foldables Are Becoming Good Enough to Be Your Next Smartphone The New York Times When Did Apple’s Notes App Become an Extension of Our Brains? The Wall Street Journal This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times How to Turn Your Old iPhone Into an A.I. Phone (and Skip the Upgrade) The New York Times Report: Tech misconceptions plague the IT world The Register A Case for Backing Up Your Precious Photos and Files at Home The Wall Street Journal Tech Made Easy AARP How TikTok Is Wiring Gen Z’s Money Brain The Wall Street Journal PC shipments stuck in neutral despite AI buzz The Register Welcome to the Era of the A.I. Smartphone The New York Times Les Paul’s Klunker has been revived as a meticulous one-off replica by Les Paul's personal tech MSN OpenAI Made AI Videos for Us. These Clips Are Good Enough to Freak Us Out. - The Wall Street Journal OpenAI Made AI Videos for Us. These Clips Are Good Enough to Freak Us Out. The Wall Street Journal Don’t Let Your Smartphone Keep You Up at Night The New York Times Instagram Is Restricting Teen Accounts—and Blocking Sneaky Workarounds The Wall Street Journal Why You Shouldn’t Buy an iPhone This Summer. All the Reasons, From A to I. The Wall Street Journal What I Got Wrong in a Decade of Predicting the Future of Tech The Wall Street Journal Exclusive | I Tried Microsoft’s New AI-Focused PCs. Windows Is Exciting Again. The Wall Street Journal Revenge for being fired is best served profitably The Register |
RELATED ARTICLES
Linux Power Tools - Great Tools to Make System Administration Easy World War II - Germany decided to attack Poland.Poland had many great warriors. 10 Tips to Stay Safe and Secure Online The Internet can be a dangerous place.While you're enjoying the convenience of online shopping, Internet banking and subscription websites, nasty people lurk around every corner. Reliable File and Folder Sharing in Windows Xp This tip is on sharing files and folders on a local network in Windows XP. It has been tested on Windows XP Professional (with and without SP2). Learning To Navigate Ciscos Online Documentation When studying for your Cisco CCNA, CCNP, or CCIE exam, you've got a powerful online weapon at your disposal. It's Cisco Connection Documentation, found at www. Top 9 Ways To Speed Up Your Surfing & Computing It seems like fast never quite rates fast enough.No matter how quickly something moves, especially on theInternet, it could always move faster. Healthy Webmasters Choose Ergonomic Computer Products Webmasters usually sit at their computers much longer in a day than most other office workers, sometimes up to 10 and 12 hours. This can bring about the potential for physical discomforts that are attributed to prolonged use and the repetitive tasks that they perform on computers every day. More Cool Web Tricks If you ask most people what frustrates them most about the Internet, many of them will tell you "It's the little things!"It seems like all the great tricks and tips that make people exclaim "STOP! How did you do that?" never make it into any manual (at least where I can find them).My father (and co-author of "Turn Words Into Traffic") calls it the "reverse oral tradition" of computing, where children teach parents the survival skills of PC life. Getting Started with HTML The basic language of the internet is html. If you can do crossword puzzles, if you can write a report for your teacher or boss, you can be creating web pages in a matter of minutes. Mail-merging: The Principles About mail-mergingMail-merging is the process of merging variable data and fixedtext.Using mail-merging, you can create individualised letters,envelopes, labels and other documents without having tolaboriously create each individual one. The Importance Of Email Backup Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. How to Switch to Firefox and Why You should First things first, what is Firefox? Well, it's a browser. Ok but what's that? A browser is a computer program used to view web pages, to browse through the world wide web. Repairing A Corrupt .RAR/.ZIP Archive Step 1:Open WinRAR and browse to the folder with your .rar/. Cisco Certification: The Most Important Cisco Study Youll Ever Do All of us are familiar with the pyramids of Egypt. These magnificent structures have stood for thousands of years, withstanding extreme heat and other factors that would bring down an ordinary structure. How to Protect your PC from Spyware in the Cyber Age Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse.. DVD The Ultimate Consumer Digital Media Digital Video Disc or as it is sometimes referred to Digital Versatile Disc (DVD) has for the last several years been Hollywood's primary video delivery method and with good cause. This inexpensive, compact media delivers excellent video and audio quality. What Exactly are Screensavers? - part I After reading this good article you will know some important information about screensavers and their history. You will find out how screensavers are different from other applications and what advantages you'll have if you use them. Five Simple Steps to Speed up Your Computer Most people download and save so much information on their computer that before long the computer starts slowing down and the user has no idea what the problem is. However, even if you are not a computer whiz there are several things you can easily do to speed up your computer quickly and easily. Cisco Certification: Building Your Home Lab, Part II In the first part of this home lab tutorial, CCNA and CCNP candidates can see that there are a LOT of choices when it comes to what to buy to build your own Cisco practice lab.Having been there myself, I know itâ??s confusing to decide how many routers or switches to buy, and what I need at the minimum to run labs and get some great hands-on practice. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Microsoft Great Plains Dexterity Customizations Microsoft Business Solutions is on the way to popularize it's ERP systems implementation. Right now such products as Microsoft CRM and Small Business Manager (cheap version of Microsoft Great Plains, based on the same Great Plains Dexterity runtime and DYNAMICS. |
home | site map |
© 2006 |