O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Take Control of Permissions in Mac OS X

Book Description

Solve quirky problems, increase privacy, and share files better by managing Mac OS X permissions.

Permissions problems got you down? Turn to Unix expert Brian Tanaka's unique guide to the permissions that control access to your files, folders, and disks. Learn how to keep files private, set Ignore Permissions, repair permissions, and delete stuck files. Advanced concepts include the sticky bit, access control lists, bit masks, and symbolic vs. absolute ways to set permissions. Take control of permissions via the Finder, with Mac utilities, and using the command line.

Read this ebook to learn the answers to questions like:

  • Why do so many problem-solving procedures suggest that I repair permissions?

  • Why can't I always access my own files when I boot from an external drive?

  • What should I do if someone tells me to "set the permissions to -rw-r--r--"?

  • What are promiscuous permissions, and should I be informing the vice squad?

  • What Mac utilities can change permissions, if I don't want to learn Unix?

  • How do I use the Unix command line to control permissions?

  • What's an access control list, and why should I care?

Table of Contents

  1. Copyright
  2. Read Me First
    1. Onscreen Reading Tips
    2. Printing Tips
    3. Basics
  3. Introduction
  4. Permissions Quick Start
  5. Problems and Solutions
  6. About Permissions
  7. The Anatomy of Permissions
  8. Choose a Method of Setting Permissions
  9. Set Permissions Using the Info Window
  10. Set Permissions Using Third-Party Tools
    1. FileXaminer
    2. Super Get Info
    3. XRay
  11. Use Access Control Lists
    1. Advantages of ACLs
    2. Apply ACLs
      1. Add a rule and view the modified ACL
      2. Remove a rule
    3. Permissions Inheritance
  12. Understand Default Permissions
    1. Permissions on New Items
    2. Set Permissions for New Items
    3. The Case of the Promiscuous Folder
    4. The Shared Folder
      1. Permission inconsistencies in the Shared folder
      2. Copying items from the Shared folder
    5. Permissions on Copied Items
      1. Default permissions for FTP
      2. Default permissions for scp
  13. Work with User Names, Uids, and Gids
    1. How They Work
    2. Floating Permissions
    3. UID Problems
      1. Problems resulting from copying
      2. Problems resulting from multiple boot volumes
      3. Change an account’s UID
      4. Recursively change ownership
    4. Manage Groups
    5. Understand Default Users and Groups
  14. Understand Ignore Ownership
  15. Repair Permissions with Disk Utility
  16. Learn Advanced Unix Techniques
    1. List Folder Contents with ls
      1. List folder contents with more info
      2. Recursively list contents of all subfolders
    2. Change Permissions with chmod
      1. Symbolic mode with chmod
      2. Absolute mode with chmod
      3. Another chmod example
    3. Change Owners with chown
      1. Change Groups with chgrp
      2. Change File Flags with chflags
    4. Bit Masking
    5. Set a Umask
    6. Work with the Set UID, Set GID, and Sticky Bits
  17. A. Fixes for Common Problems
    1. Can’t Give a File to Another User
      1. Use the Drop Box folder
      2. Authenticate as an administrator
    2. Classic Won’t Run
    3. I Don’t Own My Files on a Non-Boot Volume
    4. FTP Default Permissions Incorrect
    5. Web Server Gives “403 Forbidden” Error
    6. File Won’t Delete
  18. B. Converting to Octal
    1. Use Math
  19. C. Use the man Command
  20. ABout This Ebook
    1. About the Author
    2. Author’s Acknowledgements
    3. Take Control: The Series
    4. About TidBITS Electronic Publishing
    5. Production Credits