search

What are the linux permissions?

Nov 29, 2021 pm 05:12 PM
linuxPermissions

There are four types of Linux permissions: 1. Read permission, which is the permission to read the contents of the file; 2. Write permission, which is the permission to write data to the file; 3. Executable permission; 4. Special permission .

What are the linux permissions?

#The operating environment of this tutorial: linux5.9.8 system, Dell G3 computer.

There are three identities for accessing files/directories in Linux:

  • u: The owner of the file

  • g: The group to which the file belongs

  • o: Other users

For each identity, there are four more permissions

  • r: Read permission (read)

    For files, it is the permission to read its contents. For directories, it is impossible to view the contents in the directory. Content (ls failed)

  • w: Write permission (write)

    Write permission: For files, data can be written to the file, for directories It is said that the files in the directory cannot be deleted

  • x: Executable permission (execute)

    cannot be used for executable files (you can see the color have changed), the directory cannot be entered (cd fails)

  • #s: Special permissions

Linux permissions Representation method

What are the linux permissions?

#When it comes to permissions, then we must talk about users under Linux!

There are only two types of Linux users: ordinary users, and super users

  • Super users: have all the permissions under this system and can do anything you want. Without any restrictions

  • Ordinary users: only have some permissions, and the things they can do are also limited (but usually we can use sudo to perform things that require root permissions, but root is required. Password)

Change permissions in numerical form

chmod 755 test.sh

Convert 755 into character form, which is rwxr -xr-x, which means that the owner of the file, the group to which it belongs, and other users can read and run the test.sh file, but only the owner can write to the file, which means that other people have no rights to modify test. .sh file.

(Of course root users do not have this restriction, whoever wants to change can do it. This is also an experience that reflects the supreme power of the root account!)

Change files in character form Permissions

chmod +x test.sh

The mathematical form can change the four permissions of all three identities of the file at one time, while the character form is more flexible and can be set individually for a certain permission of a certain identity. , for example, the above command is to grant execution permissions to all three identities. You can also set them separately:

chmod u+x test.sh  只给拥有者加上可执行权限
chmod g+x test.sh  只给群组身份加上可执行权限
chmod o+x test.sh  只给其他人身份加上可执行权限

The above three commands combined are equivalent to the above command, which is given to all identities. All enable executable permissions. You can also operate as follows:

chmod a+x test.sh

The a here represents all 3 identities!

If you want to remove a certain permission of a certain identity, you only need to change it to -, for example, to remove the executable permissions of other people's identities:

chmod o-x test.sh

Related recommendations: " Linux video tutorial

The above is the detailed content of What are the linux permissions?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Maintenance Mode in Linux: When and Why to Use ItMaintenance Mode in Linux: When and Why to Use ItApr 25, 2025 am 12:15 AM

The timing and reasons for using Linux maintenance mode: 1) When the system starts up, 2) When performing major system updates or upgrades, 3) When performing file system maintenance. Maintenance mode provides a safe and controlled environment, ensuring operational safety and efficiency, reducing impact on users, and enhancing system security.

Linux: Essential Commands and OperationsLinux: Essential Commands and OperationsApr 24, 2025 am 12:20 AM

Indispensable commands in Linux include: 1.ls: list directory contents; 2.cd: change working directory; 3.mkdir: create a new directory; 4.rm: delete file or directory; 5.cp: copy file or directory; 6.mv: move or rename file or directory. These commands help users manage files and systems efficiently by interacting with the kernel.

Linux Operations: Managing Files, Directories, and PermissionsLinux Operations: Managing Files, Directories, and PermissionsApr 23, 2025 am 12:19 AM

In Linux, file and directory management uses ls, cd, mkdir, rm, cp, mv commands, and permission management uses chmod, chown, and chgrp commands. 1. File and directory management commands such as ls-l list detailed information, mkdir-p recursively create directories. 2. Permission management commands such as chmod755file set file permissions, chownuserfile changes file owner, and chgrpgroupfile changes file group. These commands are based on file system structure and user and group systems, and operate and control through system calls and metadata.

What is Maintenance Mode in Linux? ExplainedWhat is Maintenance Mode in Linux? ExplainedApr 22, 2025 am 12:06 AM

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

Linux: A Deep Dive into Its Fundamental PartsLinux: A Deep Dive into Its Fundamental PartsApr 21, 2025 am 12:03 AM

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

Linux Architecture: Unveiling the 5 Basic ComponentsLinux Architecture: Unveiling the 5 Basic ComponentsApr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux Operations: Utilizing the Maintenance ModeLinux Operations: Utilizing the Maintenance ModeApr 19, 2025 am 12:08 AM

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

Linux: How to Enter Recovery Mode (and Maintenance)Linux: How to Enter Recovery Mode (and Maintenance)Apr 18, 2025 am 12:05 AM

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)