Latest in the Section
- HTC Android 4.2.2 One will arrive in two weeks
- Spain, how to market experimental mobility?
- Chops (and XXXVIII) - Change the resolution of a video with ffmpeg
- Individuality of identical twins
- goal: augmented reality interface world's most advanced
- Apple retira Bang with Friends para iPhone de la App Store
- Telcel What is the plan that suits you?
- Apple strikes back and removes Bang With Friends from the App Store
- Apple retira Bang With Friends de la App Store
- IFTTT Recipes to take advantage of LinkedIn
Popular in the Section
- Uncharted 2 was one of the best games of 2009
- Synergy-Plus program, which allows us to control with a single keyboard and mouse several machines
- VBulletin case: "This decision is a true cross-Shirt to Spanish sovereignty"
- Inadvisable online mode of FIFA 2010 with Gamblers Anonymous
- Blood Moon, the adventures of the undead
- Olloclip brings the iPhone's camera to the next level
- Sasha Grey, Hulk Hogan y Daniel Dae Kim protagonizarán Saints Row: The Third
- Heavy Rain, Quantic Dream ultimate
- Party at home with friends and a dealer hand of Four Roses
- Dragon Age: Origins and the mod called "Natural Bodies"
|Technology - Software|
|Wednesday, 08 August 2012 00:01|
One of the issues that often cause confusion among users of virtually any operating system are the permissions of the folders and files, a property that is used to ensure that specific users or user groups have access to certain files or folders or may make modifications. Whether in Unix, Linux or Mac OS X, any file is subject to some permissions that are checked every time we tried to access it and, if our user has fewer privileges, we may run into that annoying "Access Denied".
If you are an experienced user, probably all you're going to comment it sounds familiar but, in my view, is an issue worth reviewing and, especially, can help all those who are beginning to manage equipment or dare to take their first steps with a GNU / Linux.
What are file permissions? What are they?
Although today the permissions of files and folders we can prove something in everyday life, operating systems like MS-DOS , Windows 95 or Windows 98 lacked this access control files. By tuning a little, we will focus on the scheme usually gives more headaches for users, ie, which has traditionally been in Unix and compatible systems POSIX , such as Linux and Mac OS X.
Permissions define, in a simple and effective access rules in reading (r), write (w) or execute (x) certain files (if they are not enforceable, the execution is not necessary as is the case with the folders or directories). As its name suggests, some read permissions allow us to open a file or folder to "eyeball" your content, but we can not make any changes until we give write permissions (which are what allow us to make changes .)
Permits, owners and user privileges
Unless a user is an administrator of a system (and therefore can handle at will any file or folder), all users are subject to permission rules when working on your computer or server (eg the hosting of our blog). In fact, permits scheme distinguishes between three types of extent from the viewpoint of the user:
As you can imagine, the owner of the file (or folder) is the user who created the file and, therefore, usually permissions to access and modify it. User groups can understand them as a grouping of permissions and privileges, therefore, define the extent to which user groups can have within a system (administrators, users with certain privileges, etc.) and serve to narrow the options that they can not having to make individual configurations.
Therefore, combining all 3 types of permissions (read, write and execute) to the 3 perspectives of user (owner, group and other users, which is generally known as UGO, User, Group, Others), all files and folders Unix systems, GNU / Linux and Mac OS X computers are subject to strict access control system to ensure the integrity and access only to "authorized personnel".
Illustrating with an example, imagine we have a text file created by user A (belonging to the user group AA) has the following outline permission:
With such a scheme, the landlord may make changes, other users could access group for reading and other non-users could not access it, much less make modificiaciones (except the administrator user who has permissions to do you want).
Permissions and Security
And what have to do the permissions and security 's a good configuration permits our files can not prevent someone with good intentions make changes to our system and, for example, access to more information or put in proper the integrity of our system or one of our applications. Therefore, a good permission management is a key contributing factor to enhance the security of a system.
Now what? After learning a little theoretical foundation of the permissions on files and folders, the next step will give you delve into the notation and symbols normally used (and we can see on many operating systems) and then pass a practical approach and analyze some details to consider, for example, to improve the security of our web server.