• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Part: IV Introduction to BSD on Tiger > Using File Permissions and Access Contr...

Chapter 11. Using File Permissions and Access Control Lists

IN THIS CHAPTER

Because Unix is an inherently multiuser environment, it's important for there to be a way to record who owns what, who can look at it, run it, or change it. In Unix, this is accomplished with metadata flags that tell the system what permissions exist for each file. Because the system doesn't actually know a text file from a word processor, these flags are also used to indicate whether the file should be considered executable (and therefore a runnable program or application).


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint