Personal Technology Information |
|
Setting File Permissions On A Unix Server
File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. There are several layers of control, and these will be discussed below. For the purpose of this series of tutorials, I have been using a free FTP program called Core FTP Lite to upload files to my server. I am using this program to describe my examples. Ok, to begin, let's say that we have uploaded some files to a server. We are discussing uploading scripts in general here, and certainly for many scripts, the creators may well specify certain 'permissions' that need to be set in order for the scripts to operate correctly. Let's take a look at a set of files on a server. In Core FTP Lite, the server files are shown in the right hand pane. Select one and then right click on the highlighted file.If you use a different FTP client, I expect that the layout will be very similar. Run the mouse down to the bottom of the menu and select the item marked 'Properties'. Click on this option, and another dialog will appear. You will see that the file in question (in this case a directory) is being shown in the 'File' field at the top of the screen. What we are really interested in, is the tick boxes in the bottom half of the screen. These hold the file 'privileges' or 'permissions' for this file or directory. There are three types of 'permissions' available. * User - which means the person signed on who is setting the permissions * Group - which means a specific group of users for whom access to the file has been granted * World - which means everyone. Within these groups of users, there are 3 distinct types of permissions * Read - which means that permission to read a file, but not alter it or run it * Write - which means permission to write to a file and change it * Execute - which means permission to execute a file, which is important in the case of scripts for example. Permissions are sometimes called by these names (read, write, execute) but are more commonly referred to using letters 'rwx'. In addition, permissions are sometimes referred to by a single number '755' for example. In the picture above, you will see a value box. This is the number being referred to. How is this number made up? Well let me explain. Read Group 40 World 4 Write Group 20 World 2 Execute Group 10 World 1 Each value for each setting is shown. Try them out by ticking them, and see the number in the 'Value' field change accordingly. So, lets look at a real example Can you see how the number 755 is made up? Add up the individual values from the value table and see. So hopefully you can see, that setting file permissions with the right tool is not hard at all. Charlie Cory worked or many years running a HelpDesk for a software house, and has experience in many operatng systems and technologies. The online aticle contains many pictures which help bring this tutorial to life.
MORE RESOURCES: What I Got Wrong in a Decade of Predicting the Future of Tech The Wall Street Journal ‘Data is the new oil’: Virginia Tech professor wants to protect the personal data of marginalized communities WRIC ABC 8News Smartphones Can Now Last 7 Years. Here's How to Keep Them Working. The New York Times iPad Pro vs. MacBook: The Great Apple Laptop Trade-Off The Wall Street Journal Opinion | Technology Hates Me The New York Times In the City, Personal Safety Starts With Your Smartphone The Wall Street Journal Jonathan Haidt’s ‘The Anxious Generation’: Tech, Smartphones Cause Teen Anxiety The Wall Street Journal Tech That Will Change Your Life in 2024, From AI to EV - WSJ The Wall Street Journal Want to Get More Done? That Podcast in the Background Is Holding You Back The Wall Street Journal Apple's New iPad Pro vs. New iPad Air vs. iPad: Why Are There So Many? The Wall Street Journal How TikTok Is Wiring Gen Z's Money Brain The Wall Street Journal OpenAI Made AI Videos for Us. These Clips Are Good Enough to Freak Us Out. - WSJ The Wall Street Journal The Invisible $1.52 Trillion Problem: Clunky Old Software The Wall Street Journal After a Sugar High of Free Money, These Billion-Dollar Technologies Need a Nap The Wall Street Journal Huawei's latest smartphone mostly made in China The Register We Aren't Posting on Social Media as Much Anymore. Will We Ever? The Wall Street Journal The Tech to Help You Beat Your Tech Addictions The Wall Street Journal Tech Hubs Are Losing the Talent War to Everywhere Else The Wall Street Journal What Kind of Driver Will Your Kid Be? This Test Can Tell. The Wall Street Journal iPhone Fixes to Make if You're the Family IT Department This Year The Wall Street Journal AT&T, Verizon, Sprint, T-Mobile US fined $200M for selling off people's location info - The Register I Bought the World's Hottest High-Tech E-Bike. Then Its Maker Went Bankrupt. The Wall Street Journal Hands Off! With $3500 Headsets in the Wild, New Social Norms Apply The Wall Street Journal Apple's New Face Computer Is for Work The Wall Street Journal Schools Want to Ban Phones. Parents Say No. The Wall Street Journal Niklaus Wirth, Who Inspired a Generation of Computer Programmers, Dies at 89 The Wall Street Journal Vision Pro Review: Apple's First Headset Lacks Polish and Purpose The New York Times He Stole Hundreds of iPhones and Looted People's Life Savings. He Told Us How. The Wall Street Journal The Accounting Technology Lab Podcast: Personal Tech at CES 2024 CPAPracticeAdvisor.com Boys Are Struggling. It Can Take Coaches, Tutors and Thousands a Month to Fix That. The Wall Street Journal 12 Apps We Can't Stop Using, for Better or Worse The Wall Street Journal 100 Cool Tech Gadgets in 2024, According to a Tech Expert BestProducts.com Best Tech Gifts of 2023 to Buy This Holiday Season, an Updated List - WSJ The Wall Street Journal Yun-Hee Kim promoted to Tech Editor, Corporate and Personal Technology The Washington Post The Four Steps to Better Password Security The Wall Street Journal Testing Apple’s Vision Pro The New York Times Turn On Your iPhone’s Stolen Device Protection Now to Secure Your Money and Photos in iOS 17.3 Update The Wall Street Journal Meta’s Ray-Ban Smart Glasses Use AI to See, Hear and Speak. What Are They Like? The New York Times Snapchat's Friend-Ranking Feature Adds to Teen Anxiety The Wall Street Journal A Pain-Free Way to Secure All Your Online Accounts The Wall Street Journal Is the $139 Amazon Prime Subscription Still Worth It? The Wall Street Journal The Apple Video Feature Awkwardly Crashing Your Meetings - WSJ The Wall Street Journal What if You Never Had to Charge Your Gadgets Again? The Wall Street Journal The most personal technology | Jul 22nd 2023 The Economist Quick Tips to Save Time on the Telephone The New York Times Apple’s iOS 17.3 Stolen Device Protection Update Aims to Stop iPhone Thieves The Wall Street Journal Don't rent out that container ship yet: CIOs and biz buyers view AI PCs with some caution The Register Do You Have Painful 'Tech Neck?' This Expert-Approved Gadget Might Help The Wall Street Journal The Most Important Tech Company You've Never Heard of Is a Major Reason Computers Keep Getting Faster The Wall Street Journal Faster, Beefier, Cheaper: The Next-Generation Electric Skateboards Have Arrived The Wall Street Journal Sluggish Wi-Fi? Weird Party Smells? 8 High-Tech Helpers for Harried Holiday Hosts The Wall Street Journal Meta Welcomes Headset War With Apple - WSJ The Wall Street Journal Meta and Google Are Betting on AI Voice Assistants. Will They Take Off? The New York Times Distracted, Forgetful and Hooked on Smartphones: Why More Women Are Being Diagnosed With ADHD The Wall Street Journal Ten years ago Microsoft bought Nokia's phone unit – then killed it as a tax write-off The Register Yes, It's Rude to Use Your Laptop During Meetings—and More Tech Etiquette Rules You Might Be Breaking The Wall Street Journal You're Brewing It Wrong: The Coffee-Making Myths That Might Be Holding You Back The Wall Street Journal How to Cut Down Your Screen Time but Still Get Stuff Done The New York Times Why Tech Companies Are Not Your Friends: Lessons From Roku The New York Times EU duties might not hold off flood of China EVs The Register BASICally still alive: Classic language celebrates 60 years with new code and old quirks The Register New Tech That Asks 'Are You Sure About Sending a Nude Photo?' The Wall Street Journal How to Make Your Phone Last Forever: 6 Simple Tips The Wall Street Journal |
RELATED ARTICLES
Linux Power Tools - Great Tools to Make System Administration Easy World War II - Germany decided to attack Poland.Poland had many great warriors. 10 Tips to Stay Safe and Secure Online The Internet can be a dangerous place.While you're enjoying the convenience of online shopping, Internet banking and subscription websites, nasty people lurk around every corner. Reliable File and Folder Sharing in Windows Xp This tip is on sharing files and folders on a local network in Windows XP. It has been tested on Windows XP Professional (with and without SP2). Learning To Navigate Ciscos Online Documentation When studying for your Cisco CCNA, CCNP, or CCIE exam, you've got a powerful online weapon at your disposal. It's Cisco Connection Documentation, found at www. Top 9 Ways To Speed Up Your Surfing & Computing It seems like fast never quite rates fast enough.No matter how quickly something moves, especially on theInternet, it could always move faster. Healthy Webmasters Choose Ergonomic Computer Products Webmasters usually sit at their computers much longer in a day than most other office workers, sometimes up to 10 and 12 hours. This can bring about the potential for physical discomforts that are attributed to prolonged use and the repetitive tasks that they perform on computers every day. More Cool Web Tricks If you ask most people what frustrates them most about the Internet, many of them will tell you "It's the little things!"It seems like all the great tricks and tips that make people exclaim "STOP! How did you do that?" never make it into any manual (at least where I can find them).My father (and co-author of "Turn Words Into Traffic") calls it the "reverse oral tradition" of computing, where children teach parents the survival skills of PC life. Getting Started with HTML The basic language of the internet is html. If you can do crossword puzzles, if you can write a report for your teacher or boss, you can be creating web pages in a matter of minutes. Mail-merging: The Principles About mail-mergingMail-merging is the process of merging variable data and fixedtext.Using mail-merging, you can create individualised letters,envelopes, labels and other documents without having tolaboriously create each individual one. The Importance Of Email Backup Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. How to Switch to Firefox and Why You should First things first, what is Firefox? Well, it's a browser. Ok but what's that? A browser is a computer program used to view web pages, to browse through the world wide web. Repairing A Corrupt .RAR/.ZIP Archive Step 1:Open WinRAR and browse to the folder with your .rar/. Cisco Certification: The Most Important Cisco Study Youll Ever Do All of us are familiar with the pyramids of Egypt. These magnificent structures have stood for thousands of years, withstanding extreme heat and other factors that would bring down an ordinary structure. How to Protect your PC from Spyware in the Cyber Age Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse.. DVD The Ultimate Consumer Digital Media Digital Video Disc or as it is sometimes referred to Digital Versatile Disc (DVD) has for the last several years been Hollywood's primary video delivery method and with good cause. This inexpensive, compact media delivers excellent video and audio quality. What Exactly are Screensavers? - part I After reading this good article you will know some important information about screensavers and their history. You will find out how screensavers are different from other applications and what advantages you'll have if you use them. Five Simple Steps to Speed up Your Computer Most people download and save so much information on their computer that before long the computer starts slowing down and the user has no idea what the problem is. However, even if you are not a computer whiz there are several things you can easily do to speed up your computer quickly and easily. Cisco Certification: Building Your Home Lab, Part II In the first part of this home lab tutorial, CCNA and CCNP candidates can see that there are a LOT of choices when it comes to what to buy to build your own Cisco practice lab.Having been there myself, I know itâ??s confusing to decide how many routers or switches to buy, and what I need at the minimum to run labs and get some great hands-on practice. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Microsoft Great Plains Dexterity Customizations Microsoft Business Solutions is on the way to popularize it's ERP systems implementation. Right now such products as Microsoft CRM and Small Business Manager (cheap version of Microsoft Great Plains, based on the same Great Plains Dexterity runtime and DYNAMICS. |
home | site map |
© 2006 |