


In Linux, you can use the chmod command to modify file permissions. It is a command that controls user permissions on files. You can use absolute mode (octal number mode) or symbolic mode to specify file permissions; syntax " chmod [-R] permission value filename".
#The operating environment of this tutorial: linux5.9.8 system, Dell G3 computer.
In Linux, you can use the chmod command to modify file permissions.
The chmod (full English spelling: change mode) command is a command that controls user permissions on files.
Linux/Unix file calling permissions are divided into three levels: file owner (Owner), user group (Group), and other users (Other Users).
Only the file owner and superuser can modify the permissions of a file or directory. You can use absolute mode (octal number mode) and symbolic mode to specify file permissions.
chmod command uses numbers to modify file permissions
In the Linux system, the basic permissions of a file consist of 9 characters. Taking rwxrw-r-x as an example, we can use numbers to represent each permission. The corresponding relationship between each permission and the number is as follows:
r --> 4 w --> 2 x --> 1
Since these 9 characters belong to 3 types of users, each user identity contains 3 permissions (r, w, x). Add up the numbers corresponding to the three permissions, and the final value can be used as the permissions of each user.
Take rwxrw-r-x as an example. The permission values ??corresponding to the owner, the group to which it belongs and other people are:
Owner = rwx = 4 2 1 = 7
Group = rw- = 4 2 = 6
Others = r-x = 4 1 = 5
So, the permission value corresponding to this permission is 765.
The basic format of the chmod command that uses numbers to modify file permissions is:
[root@localhost ~]# chmod [-R] 權(quán)限值 文件名
-R
(note that it is capitalized) The option indicates that together with the subdirectory All files also have modified permissions.
For example, use the following command to modify the permissions of the .bashrc directory file:
[root@localhost ~]# ls -al .bashrc -rw-r--r--. 1 root root 176 Sep 22 2004 .bashrc [root@localhost ~]# chmod 777 .bashrc [root@localhost ~]# ls -al .bashrc -rwxrwxrwx. 1 root root 176 Sep 22 2004 .bashrc
For another example, we usually use Vim to edit the Shell file batch After processing the file, the file permissions are usually rw-rw-r-- (644). Then, if you want to turn the file into an executable file and prevent others from modifying this file, you only need to change the permissions of this file. Just rwxr-xr-x (755).
The chmod command uses letters to modify file permissions
Since the basic permissions of a file are 3 types of user identities (owner, group and others) with 3 Three kinds of permissions (rwx). In the chmod command, u, g, and o are used to represent three identities respectively, and a is used to represent all identities (the abbreviation of all). In addition, the chmod command still uses r, w, and x to represent read, write, and execute permissions respectively.
The chmod command uses letters to modify file permissions. Its basic format is as shown in the figure below.
For example, if we want to set the permissions of the .bashrc file to rwxr-xr-x
, we can execute the following command:
[root@localhost ~]# chmod u=rwx,go=rx .bashrc [root@localhost ~]# ls -al .bashrc -rwxr-xr-x. 1 root root 176 Sep 22 2004 .bashrc
For another example, if you want to increase the writing permissions of each user in the .bashrc
file, you can use the following command:
[root@localhost ~]# ls -al .bashrc -rwxr-xr-x. 1 root root 176 Sep 22 2004 .bashrc [root@localhost ~]# chmod a+w .bashrc [root@localhost ~]# ls -al .bashrc -rwxrwxrwx. 1 root root 176 Sep 22 2004 .bashrc
Related recommendations: "Linux video tutorial》
The above is the detailed content of How to modify file permissions in linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Linux's cost of ownership is usually lower than Windows. 1) Linux does not require license fees, saving a lot of costs, while Windows requires purchasing a license. 2) Linux has low hardware requirements and can extend the service life of the device. 3) The Linux community provides free support to reduce maintenance costs. 4) Linux is highly secure and reduces productivity losses. 5) The Linux learning curve is steep, but Windows is easier to use. The choice should be based on specific needs and budget.

The key to installing dual systems in Linux and Windows is partitioning and boot settings. 1. Preparation includes backing up data and compressing existing partitions to make space; 2. Use Ventoy or Rufus to make Linux boot USB disk, recommend Ubuntu; 3. Select "Coexist with other systems" or manually partition during installation (/at least 20GB, /home remaining space, swap optional); 4. Check the installation of third-party drivers to avoid hardware problems; 5. If you do not enter the Grub boot menu after installation, you can use boot-repair to repair the boot or adjust the BIOS startup sequence. As long as the steps are clear and the operation is done properly, the whole process is not complicated.

The key to enabling EPEL repository is to select the correct installation method according to the system version. First, confirm the system type and version, and use the command cat/etc/os-release to obtain information; second, enable EPEL through dnfinstallepel-release on CentOS/RockyLinux, and the 8 and 9 version commands are the same; third, you need to manually download the corresponding version of the .repo file and install it on RHEL; fourth, you can re-import the GPG key when encountering problems. Note that the old version may not be supported, and you can also consider enabling epel-next to obtain the test package. After completing the above steps, use dnfrepolist to verify that the EPEL repository is successfully added.

Newbie users should first clarify their usage requirements when choosing a Linux distribution. 1. Choose Ubuntu or LinuxMint for daily use; programming and development are suitable for Manjaro or Fedora; use Lubuntu and other lightweight systems for old devices; recommend CentOSStream or Debian to learn the underlying principles. 2. Stability is preferred for UbuntuLTS or Debian; you can choose Arch or Manjaro to pursue new features. 3. In terms of community support, Ubuntu and LinuxMint are rich in resources, and Arch documents are technically oriented. 4. In terms of installation difficulty, Ubuntu and LinuxMint are relatively simple, and Arch is suitable for those with basic needs. It is recommended to try it first and then decide.

The steps to add a new hard disk to the Linux system are as follows: 1. Confirm that the hard disk is recognized and use lsblk or fdisk-l to check; 2. Use fdisk or parted partitions, such as fdisk/dev/sdb and create and save; 3. Format the partition to a file system, such as mkfs.ext4/dev/sdb1; 4. Use the mount command for temporary mounts, such as mount/dev/sdb1/mnt/data; 5. Modify /etc/fstab to achieve automatic mount on the computer, and test the mount first to ensure correctness. Be sure to confirm data security before operation to avoid hardware connection problems.

Logs in Linux systems are usually stored in the /var/log directory, which contains a variety of key log files, such as syslog or messages (record system logs), auth.log (record authentication events), kern.log (record kernel messages), dpkg.log or yum.log (record package operations), boot.log (record startup information); log content can be viewed through cat, tail-f or journalctl commands; application logs are often located in subdirectories under /var/log, such as Apache's apache2 or httpd directory, MySQL log files, etc.; at the same time, it is necessary to note that log permissions usually require s

Have problems uploading files in Google Chrome? This may be annoying, right? Whether you are attaching documents to emails, sharing images on social media, or submitting important files for work or school, a smooth file upload process is crucial. So, it can be frustrating if your file uploads continue to fail in Chrome on Windows PC. If you're not ready to give up your favorite browser, here are some tips for fixes that can't upload files on Windows Google Chrome 1. Start with Universal Repair Before we learn about any advanced troubleshooting tips, it's best to try some of the basic solutions mentioned below. Troubleshooting Internet connection issues: Internet connection

SELinux context errors will cause the service to fail to access the file. The solution is as follows: 1. Use chcon to temporarily modify, such as chcon-thttpd_sys_content_t/var/www/html/index.html, but it is invalid after restart; 2. Use semanagefcontext to set permanent rules, such as semanagefcontext-a-thttpd_sys_content_t"/opt/myapp(/.*)?", and then run the restorecon application rules; 3. View the file context through ls-Z and analyze the process context in combination with ps-eZ; 4.
