Copyright Notice:###########################################################################All the contents of this article are from the author Liu Chunque's study summary, without my permission, prohibit the private forwarding and use.qq:1151887353
Umask usage
A What is umask?
When we log on to the system and create a file, there is always a default permission. How does this permission come from? This is what umask does. Umask sets the default permission for the user to create files, which is
umask How to usea what is Umask? when we log into the system and create a file that always has a default permission, how does this permission come from? That's what Umask did. Umask set the user to create the default permissions of the file, it is
transferred from: http://blog.csdn.net/lmh12506/article/details/7281910umask How to useA What is Umask?When we log into the system and create a file that always has a default permission, how does this permission come from? That's what Umask did.
On the umask value of Linux system and its corresponding file permission explanationOriginal: http://blog.51cto.com/oldboy/1060032Origin:1, this article is written in particular to thank the 51cto blog staff and leadership, the old boy blog is
The simplest way to calculate umask values and file directory permissionsPermissions for directories created by default in Linux are 755[Email protected] data]# mkdir a[email protected] data]# LLTotal 4Drwxr-xr-x. 2 root root 4096 Apr 13:09
A permission mask umaskUmask is supported by chmod. It has a total of four bits (gid/uid, owner, group permission, and permissions of other users), but the last three are usually used, for example, if you use chmod 755 file (the permission for this
Old boy Linux OPS trainingThe core thoughts of the old boys ' education and teaching 6: Re-goal, re-thinking, method, practice, habit, re-summaryLife-long learning, the old boy education to achieve your starting point!Believe that you believe in the
A permission Mask umaskUmask is chmod matching, a total of 4 (Gid/uid, owner, group rights, other user's rights), but usually use the latter 3, for example, you use chmod 755 file (at this time the permissions of this document is the main read (4) +
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.