Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below.

For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples.

Ok, to begin, let's say that we have uploaded some files to a server.

We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar.

Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear.

You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen.

What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory.

There are three types of 'permissions' available.

* User - which means the person signed on who is setting the permissions

* Group - which means a specific group of users for whom access to the file has been granted

* World - which means everyone.

Within these groups of users, there are 3 distinct types of permissions

* Read - which means that permission to read a file, but not alter it or run it

* Write - which means permission to write to a file and change it

* Execute - which means permission to execute a file, which is important in the case of scripts for example.

Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain.

Read
User 400

Group 40

World 4

Write
User 200

Group 20

World 2

Execute
User 100

Group 10

World 1

Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly.

So, lets look at a real example

Can you see how the number 755 is made up? Add up the individual values from the value table and see.

So hopefully you can see, that setting file permissions with the right tool is not hard at all.

Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.

setting file permissons

interior house cleaning Lincolnshire ...
In The News:

Facebook crypto scams trick users with fake celebrity endorsements and legitimate-looking cryptocurrency exchange ads that install malware on victims' devices.
Create private chat rooms using the iPhone Notes app collaboration feature with instant messaging capabilities and full control over conversation privacy.
Lyft rolled out safety upgrades with a new Safety Hub, driver blocking capability and a favorite driver option to give riders more control over their experience.
New research shows Americans increasingly trust AI for wellness guidance over social media, with 63% finding artificial intelligence reliable for health.
Luxury fashion brand Dior experienced a January 2025 data breach affecting customer personal information, and notifications were sent months after the discovery.
The commercial Unitree H1 humanoid robot weighs 104 pounds with 365 pound-feet torque per joint and demonstrates dangerous potential when software glitches occur.
Americans average 10-plus hours online daily, according to recent survey, splitting time between streaming shows on TV and browsing websites on multiple devices.
Boost your smartphone privacy instantly with these security tweaks for iPhone and Android that limit ad tracking, hide notifications and prevent unauthorized access.
Platforms like Hoax Tech and JS Click Cloaker help cybercriminals bypass detection systems using machine learning to selectively display scam content to victims.
A new battery recycling technique transforms old lithium-ion batteries into high-performance components that retain 88% capacity after 500 cycles with minimal waste.
Google's Android operating system can warn users about earthquakes before the shaking even begins – and there are ways to do it on your iPhone, too.
Meta's new gesture control wristband might just be the most seamless way to control a computer yet. And no, it doesn't require surgery, a camera, or even a touchscreen. All it needs is your wrist.
Long-haul trucks are now being upgraded with a surprising twist, thanks to California-based startup Revoy. Their electric boost doesn't replace diesel but works alongside it to cut emissions and fuel costs without major disruption.
PayPal and Venmo just rolled out something big: AI-powered scam alerts for Friends and Family payments.
As data centers multiply across the United States, energy demand is increasing at a rapid pace. This has not escaped the notice of large investment firms from Wall Street.
The Unicode Consortium, the nonprofit organization that maintains the Unicode Standard to ensure emojis work across devices, has announced Unicode 17.0, which includes nine new emojis slated for release this fall, in September 2025.
OpenAI is one of the world's leading AI research labs. Founded in 2015, it's behind some of today's most talked-about tools, including GPT, DALL·E, and ChatGPT.
Ever catch your dog staring at the screen during movie night and wonder if they're actually watching? Turns out, they might be. A new scientific study from Auburn University found that many dogs really do engage with television, and not all pups react the same way.
Stop the scammers from making contact in the first place. They're getting your parents' contact information and much more personal data besides, from somewhere.
The Walker S2 robot from UBTech autonomously exchanges its batteries in just three minutes, allowing continuous operation in car factories operated by BYD, Nio and Zeekr.
The FX Super One electric MPV from Faraday Future offers flexible seating, zero-gravity recliners and an AI system that creates a personal connection between driver and vehicle.
Practical solutions for reducing unwanted charity mail, political texts and email spam by opting out of shared lists, replying "STOP" and using data removal services.
Delta's new AI pricing system eliminates static airfares for personalized rates based on individual data, raising questions about fairness while promising optimized revenue.
AI data centers are straining the power grid across 13 states, contributing to a $9 billion increase in electricity costs, and PJM customers face monthly bill increases of $25 or more.
Artificial intelligence is transforming the music industry as AI-generated bands like The Velvet Sundown earn substantial streaming revenue, prompting lawsuits from major record labels.

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

What Does That Error Message Really Mean?

Surf the 'Net for about 10 minutes and chances rate... Read More

Compile .BAT Files into Native Windows Applications (.EXE)

Since the DOS days, batch files have been one of... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Freezing - Time To Warm Up Your PC

Freezing is also known as crashing or hanging. It's frustrating.... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Gain Control Over Your Screensavers With These Simple Steps

We all enjoy our favorite screensavers but in the same... Read More

Upgrading Your PC for Non-experts

IntroOne of the big advantages of PCs over earlier types... Read More

10 Tips to Stay Safe and Secure Online

The Internet can be a dangerous place.While you're enjoying the... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Cut Through the Hype and Make the Right Digital Camera Comparisons

There are soooo many choices. With all the styles and... Read More

D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras

Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More

Be Prepared in the Event Computer Disaster Strikes

ComputersBusinesses and individuals alike have all grown to rely on... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

An All Too Familar Pain

Lost & Found for the 21st CenturyIn today's hectic world... Read More

Got Virus?

GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Smart Apple iPod Tips and Techniques

Are you thinking of buying an Apple iPod? Or have... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

professional cleaning service Wilmette ...