File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below.
For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples.
Ok, to begin, let's say that we have uploaded some files to a server.
We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar.
Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear.
You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen.
What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory.
There are three types of 'permissions' available.
* User - which means the person signed on who is setting the permissions
* Group - which means a specific group of users for whom access to the file has been granted
* World - which means everyone.
Within these groups of users, there are 3 distinct types of permissions
* Read - which means that permission to read a file, but not alter it or run it
* Write - which means permission to write to a file and change it
* Execute - which means permission to execute a file, which is important in the case of scripts for example.
Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain.
Read
User 400
Group 40
World 4
Write
User 200
Group 20
World 2
Execute
User 100
Group 10
World 1
Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly.
So, lets look at a real example
Can you see how the number 755 is made up? Add up the individual values from the value table and see.
So hopefully you can see, that setting file permissions with the right tool is not hard at all.
Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.
interior house cleaning Lincolnshire ...The battle is heating up for market share, home movie... Read More
By using your computer today you can find a lot... Read More
So you've got some spyware, ad-ware, or viruses on your... Read More
For those seeking to buy their first flat panel TV... Read More
Surf the 'Net for about 10 minutes and chances rate... Read More
Since the DOS days, batch files have been one of... Read More
Computer is an electronic machine work on the instructions of... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
Freezing is also known as crashing or hanging. It's frustrating.... Read More
Wouldn't you be shocked to find that your personal sensitive... Read More
We all enjoy our favorite screensavers but in the same... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
The Internet can be a dangerous place.While you're enjoying the... Read More
Projectors have come a long way in the past few... Read More
When browsing the internet you are likely to come across... Read More
There are soooo many choices. With all the styles and... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
MMC and SDFlash memory is available in so many formats... Read More
Those small USB drives have so many names, pocket drives,... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More
1. Let your PC boot up completely before opening any... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
File permissions are one of the strengths that the Unix... Read More
professional cleaning service Wilmette ...1. Before sitting down for coding, you must have formal... Read More
Do you use Windows standard uninstall feature? How do you... Read More
Having two operating systems is not as difficult as many... Read More
Below you will find some useful information and comments about... Read More
Many computer users are worried about their computer's performance. After... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
If you're like me, you occasionally find the ubiquitous mouse... Read More
As the Web grows more crowded and just plain "noisy"... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
Most people download and save so much information on their... Read More
CCNAs and CCNA candidates hear it all the time: ???Get... Read More
PDA Medical BenefitsIf you are concerned about your medical history,... Read More
That desk in front of you and everything else around... Read More
Plenty! When we made the decision to be our own... Read More
System File Checker is a great utility that is typically... Read More
"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More
Peoples' private information needs to stay private, even after it... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
This tip is on sharing files and folders on a... Read More
Ad Blocking is getting to be a common sport on... Read More
No matter how fast your processor and regardless of how... Read More
There are plenty of articles out there about how to... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
Personal Technology |