![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
I'm forwarding this one on because this is a subject that frustrates new *NIX users, and it was well-written. Alpha geeks can delete it. ---- Original Message ---- From: Linux Tips at TechRepublic.com Date: Tue 4/10/01 7:47 Subject: Changing file ownership TechRepublic: www.techrepublic.com Presents your LINUX TECHMAIL <-----------------Advertisement------------> Need Development Help? The Developer NetNote brings great news and information direct to your e-mail inbox. From the latest columns to the most useful downloads, we've got you covered. Don't be left behind. Click here to sign up for this great resource now. http://click.techrepublic.com/Click?q=91-EZypQAzsXfOPSalPzKYpVdRR <-------------------------------------------> LINUX TIPS FOR APRIL 10, 2001 LINUX SKILLS REVIEW: CHANGING FILE OWNERSHIP In the Linux filesystem, every file has an owner. Normally, the owner of a file is the user who creates the file. By default, you are the owner of all the files you create in your home directory. But there are times when you'll need to change a file's ownership. Should you need to do so, you can use the chown command. To change a file's ownership, switch to superuser by typing su and pressing [Enter]. The chown command uses the following syntax: chown [ file owner] [ file name ] To change the ownership of the file named document1.doc to a user named ferret, type the following code and press [Enter]: chown ferret document1.doc As with most file utilities, you can specify a list of files or use wildcards, as in these examples: chown ferret document1.doc document2.doc document3.doc chown ferret document?.doc To change file ownership recursively (throughout the current directory and within all associated subdirectories), use the recursive (-R) option: chown -R ferret * The above example changes the ownership of all the files in the working directory and all associated subdirectories to ferret. LINUX SKILLS REVIEW: CHANGING FILE PERMISSIONS To change the permissions assigned to a file, use the chmod command. If you're the owner of the file, you can change the permissions while logged in to your user account. If the file belongs to someone else, you'll need to switch to superuser by typing su and pressing [Enter] at the command prompt. Permissions affect the ability of the following user classes to access or change the file: * u: User (owner of the file) * g: Group (group owner of the file) * o: Other (all other users) * a: All (includes user, group, and others) You can change permissions by specifying relative changes from the current permissions or by specifying absolute permissions. To specify relative changes to the current permissions, use the chmod command's symbolic mode. Absolute permissions can be set with the symbolic mode or the numeric mode. (A subsequent tip will cover absolute permissions.) In the chmod command's symbolic mode, you can specify a user class, an operation, and a permission type. Here is how the operations are indicated: * +: Adds the specified permission to the current setting * =: Specifies an absolute permission setting (overrides the current permissions) * -: Removes the specified permission from the current setting Permission types include the following: * r: Read permission (the file is read-only) * w: Write permission (the file can be altered or deleted) * x: Execute permission (the script or program can be executed) In the symbolic mode, you use the chmod command with the following syntax: chmod [ user class ] [ operation ] [ permission ] [ file ] Examples: * chmod g-w autobiography.doc: (removes Write permissions from autobiography.doc for members of the file owner's group) * chmod a+r README.TXT: (makes README.TXT readable for all users) These examples show how you can combine user classes and permissions: * chmod ug+rx myscript: For the file owner and group owners, add Read and Execute permissions to the existing permissions for the file named myscript. * chmod go-wx myscript: For group owners and others, remove Write and Execute permissions from the file named myscript. In place of a single filename, you can supply a file list or use wildcards: chmod u+x script1 script2 script3 or chmod u+x script? To change permissions throughout a directory and all associated subdirectories, you can use the recursive option (indicated by typing - R or --recursive before the user class): * chmod -R u+w *: Adds Write permissions to the owner's files throughout the working directory and all associated subdirectories ------------------------------------------ Read more about IT at TechRepublic WHEN LINUX PANICS: MANAGING AN OS EMERGENCY What would you do if your Linux OS crashed? Have you made any backups? Have you even considered the possibility? Jack Wallen, Jr. has. He discusses the value of boot floppies and fsck, and lists some important files and directories. http://click.techrepublic.com/Click?q=b7-FOzPQ8JmgO4mlqzZN-N0BRRR LINUX 101: BASIC NETWORK SECURITY New to Linux? Here are the basics you'll need to know in order to protect your Linux machine from unwanted visitors. http://click.techrepublic.com/Click?q=d8-XWv3QWLUI7bOdzROkkMQfRRR ------------------------------------------ Today @ TechRepublic DOWNLOAD OUR FILL-IN-THE-BLANK PRIVACY POLICY Every organization should have a privacy policy in place to protect the valuable personal data that customers entrust to your Web site. Download our fill-in-the-blank version to help you beef up your existing policy or use it to build one from scratch. http://click.techrepublic.com/Click?q=fe-xkOgQwgVyCP5UukwEyRYO9RR WHAT TO DO WHEN IMPOSSIBLE PROJECT DEADLINES ARE COMMON PROCEDURE It happens with almost every project--the business unit demands an impossible time frame to complete the work required. Columnist Tom Mochal offers advice to a TechRepublic member who's struggling to meet project deadlines. http://click.techrepublic.com/Click?q=fa-Fm5NQhO3Y5MUBOulvGSamRRR EVALUATING MICROSOFT'S ISA SERVER FIREWALL PRODUCT If your organization is looking for a firewall product to integrate with your Windows 2000 network, you should consider Microsoft's Internet Security and Acceleration Server, a full-featured upgrade to Proxy Server 2.0. Here's a look at what it offers. http://click.techrepublic.com/Click?q=cc-h4WQQ0ObtVjQqqXjqlnkmsRR ------------------------------------------ ERP SUPERSITE NEWSLETTER Each week, the ERP SuperSite NewsLetter keeps you up-to-date on the latest developments in enterprise resource planning technology. Who's saying what, who's buying whom, what stock is hot--sign up and you'll get the straight story. Get on the list now! http://click.techrepublic.com/Click?q=74-VA08IZZvNaxiEiCQYD7bndRR ------------------------------------------ TechRepublic TechMails may contain links to sites on the Internet which are owned and operated by third parties. TechRepublic, Inc. is not responsible for the content of any such third-party site. Questions or comments: mailto:ecomments at techrepublic.com?subject=Linux Copyright 1999-2001 TechRepublic, Inc. All rights reserved. - Subcription/unsubscription/info requests: send e-mail with "subscribe", "unsubscribe", or "info" on the first line of the message body to discuss-request at blu.org (Subject line is ignored).
![]() |
|
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |