O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Take Control of Permissions in Snow Leopard

Book Description

Permissions problems got you down? Turn to Unix expert Brian Tanaka's unique guide to the permissions in Mac OS X 10.6 Snow Leopard that control access to your files, folders, and disks. You'll learn how to keep files private, when to set Ignore Permissions, what happens when you repair permissions, how to delete stuck files, and the best ways to solve permissions-related problems. Advanced concepts include the sticky bit, Snow Leopard's increasingly important access control lists, bit masks, and symbolic versus absolute ways to set permissions. The book covers how to take control of permissions via the Finder, with the Mac utility FileXaminer, and using the Unix command line.

Table of Contents

  1. Take Control of Permissions in Snow Leopard
    1. Read Me First
      1. Updates and More
      2. Basics
      3. What's New
    2. Introduction
    3. 1. Permissions Quick Start
    4. 2. Problems and Solutions
    5. 3. About Permissions
    6. 4. The Anatomy of Permissions
    7. 5. Choose a Method of Setting Permissions
    8. 6. Set Permissions Using the Info Window
    9. 7. Set Permissions Using FileXaminer
    10. 8. Use Access Control Lists
      1. Advantages of ACLS
      2. Apply ACLS
        1. Add a rule and view the modified ACL
        2. Remove a rule
      3. Permissions Inheritance
    11. 9. Understand Default Permissions
      1. Permissions on New Items
      2. Set Permissions for New Items
      3. The Case of the Promiscuous Folder
      4. The Shared Folder
        1. Copying items from the Shared folder
      5. Permissions on Copied Items
        1. Default permissions for FTP
        2. Default permissions for scp
    12. 10. Work with User Names, UIDs, and GIDs
      1. How They Work
      2. Floating Permissions
      3. UID Problems
        1. Problems resulting from copying
        2. Problems resulting from multiple boot volumes
        3. Change an account's UID
        4. Recursively change ownership
      4. Manage Groups
      5. Understand Default Users and Groups
    13. 11. Understand Ignore Ownership
    14. 12. Repair Permissions with Disk Utility
    15. 13. Learn Advanced Unix Techniques
      1. List Folder Contents with ls
        1. List folder contents with more info
        2. Recursively list contents of all subfolders
      2. Change Permissions with chmod
        1. Symbolic mode with chmod
        2. Absolute mode with chmod
        3. Another chmod example
      3. Change Owners with chown
      4. Change Groups with chgrp
      5. Change File Flags with chflags
      6. Bit Masking
      7. Set a Umask
      8. Work with the Set UID, Set GID, and Sticky Bits
        1. Set UID bit
        2. Set GID bit
        3. Sticky bit
        4. Chmod syntax
    16. 14. Learn More
    17. A. Fixes for Common Problems
      1. Can't Give a File to Another User
        1. Use the Drop Box folder
        2. Authenticate as an administrator
      2. I Don't Own My Files on a Non-Boot Volume
      3. FTP Default Permissions Incorrect
      4. Web Server Gives "403 Forbidden" Error
      5. File Won't Delete
    18. B. Converting to Octal
      1. Use Math
    19. C. Use the man Command
    20. D. About This Book
      1. About the Author
      2. Author's Acknowledgements
      3. About the Publisher
      4. Production Credits