From the course: CompTIA Linux+ (XK0-005) Cert Prep
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
File ownership - Linux Tutorial
From the course: CompTIA Linux+ (XK0-005) Cert Prep
File ownership
- [Instructor] Before we talk about setting permissions, we need to talk about file ownership. A file is owned by exactly one user, and one group. If we do an LS dash L on a file, we'll see that the long listing includes the file's owners. I'm using a fictitious file named file.txt as an example. You can do a long list on any file in your operating system to see similar data. The user owner is the third column from the left. The group owner is the fourth column. The command that we use to change the ownership of a file is chown. The syntax is chown, space, options, space, username, colon, group name, space, file name. To set the user owner, we just use one name. For instance, chown, space, user1, space, file.txt, which would change the user owner to user1. Keep in mind that in order to change the ownership of a file, you need to be root or elevated privileges with sudo. To set the group owner, the syntax would be chown…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
What is a file?4m 59s
-
(Locked)
Get information about files5m 28s
-
(Locked)
About extended attributes3m 54s
-
(Locked)
Get extended attributes4m 14s
-
(Locked)
Linux permissions overview1m 52s
-
(Locked)
File and directory modes1m 16s
-
(Locked)
File ownership3m 14s
-
(Locked)
Permissions using numeric method3m 2s
-
(Locked)
Permissions using symbolic method4m 44s
-
(Locked)
Initial permissions using umask4m 30s
-
(Locked)
Special file bits: SUID and SGID4m 59s
-
(Locked)
Special directory bits: SGID and Sticky5m 53s
-
(Locked)
Access control lists overview3m 32s
-
(Locked)
Read access control lists3m 33s
-
(Locked)
Set access control lists5m 40s
-
(Locked)
Configure inheritance with default access control lists4m 1s
-
(Locked)
Delete access control lists4m 13s
-
(Locked)
Troubleshoot access control3m 18s
-
-
-
-
-
-
-
-
-
-