Free2BoxFree2Box

Calculadora Chmod

Calcular permisos de archivos Unix en notación simbólica y numérica

Descripción de permisos
Calcular permisos de archivos Unix en notación simbólica y numérica
Lectura
(r)
Escritura
(w)
Ejecución
(x)
Octal
Propietario7
Grupo5
Otros5
Octal
755
Simbólico
rwxr-xr-x
Comando
chmod 755 filename
Preajustes comunes
Descripción de permisos
Descripción de permisos
rwxr-xr-x
Propietario Grupo Otros
SimbólicoOctalDescripción de permisos
r4Lectura
w2Escritura
x1Ejecución
rw-6Lectura + Escritura
r-x5Lectura + Ejecución
rwx7Lectura + Escritura + Ejecución

Cómo Usar

1

Ingresa Tus Valores

Completa los campos de entrada con tus números o parámetros.

2

Obtén Resultados Instantáneos

Los resultados se actualizan automáticamente mientras escribes — sin necesidad de botón de envío.

3

Copia o Guarda

Copia los resultados al portapapeles o úsalos en tu flujo de trabajo.

Por Qué Usar Esta Herramienta

100% Gratis

Sin costos ocultos, sin niveles premium — todas las funciones son gratuitas.

Sin Instalación

Se ejecuta completamente en tu navegador. No necesitas descargar ni instalar nada.

Privado y Seguro

Tus datos nunca salen de tu dispositivo. Nada se sube a ningún servidor.

Funciona en Móvil

Totalmente responsivo — úsalo en tu teléfono, tableta o escritorio.

Unix File Permissions: Understanding chmod and Access Control

Key Takeaways

  • Unix permissions use three octal digits representing read (4), write (2), and execute (1) for owner, group, and others.
  • Incorrect file permissions are a leading cause of security vulnerabilities in web servers and application deployments.
  • All permission calculations happen in your browser — no system information is accessed or transmitted.

Unix file permissions control who can read, write, and execute files and directories on Linux, macOS, and other Unix-like systems. The chmod command and its numeric notation are essential knowledge for system administrators, DevOps engineers, and anyone deploying web applications. Incorrect permissions can either lock out legitimate access or expose sensitive files to unauthorized users.

Overly permissive file permissions (777) are cited in over 20% of web server compromise investigations.

Security Impact

Key Concepts

1

Permission Triplets

Each file has three permission sets: owner (u), group (g), and others (o). Each set can have read (r=4), write (w=2), and execute (x=1). The sum gives the octal digit: rwx = 7, rw- = 6, r-x = 5.

2

Symbolic vs. Numeric Mode

Symbolic: chmod u+x file (add execute for owner). Numeric: chmod 755 file (rwx for owner, rx for group and others). Numeric mode sets all permissions at once; symbolic mode modifies specific bits.

3

Directory Permissions

For directories, read (r) allows listing contents, write (w) allows creating/deleting files, and execute (x) allows entering the directory. A common secure setting is 755 for directories and 644 for files.

4

Special Permissions

SUID (4xxx) runs a file as its owner. SGID (2xxx) runs as its group or inherits group on directories. Sticky bit (1xxx) on directories prevents users from deleting others' files (used on /tmp).

Pro Tips

Use 644 (-rw-r--r--) for regular files and 755 (drwxr-xr-x) for directories as your secure default.

Never use 777 in production — it allows anyone to read, write, and execute. Find a more restrictive permission that meets your needs.

Web server files should be owned by the web server user (www-data, nginx) with 640 or 644 permissions.

Use umask to set default permissions for newly created files — a umask of 022 results in 755 for directories and 644 for files.

All permission calculations are performed entirely in your browser. No system files or permissions are accessed or modified. This tool is for calculation and education purposes only.

Preguntas Frecuentes