Unix and POSIX-like operating systems gate file access through a three-tier permission model that expresses read, write, and execute rights for the file owner, members of the owner’s group, and all other users. Each right is stored as a single binary flag and surfaced in octal, symbolic, or long-listing formats.
This tool lets you toggle those flags directly, convert between octal and symbolic notations, add special setuid, setgid, or sticky bits, and instantly preview a ready-to-run chmod
command alongside the matching ls -l
line. All calculations run locally, enabling rapid experimentation with zero risk to production systems.
Use it before deploying shell scripts, container images, or configuration-management playbooks to verify that a binary remains runnable yet immutable for non-admins; incorrect flags can silently break application startup or expose sensitive data.
Unix permissions encode three independent bit-blocks—owner, group, others—where each block holds a read (4), write (2), and execute (1) flag. Adding the flag values yields one octal digit per block; prefixing an optional special-bit digit extends the scheme to four places (0-7xxx
).
rwx
or -
for long listings.Octal | Binary | Symbolic |
---|---|---|
0 | 000 | --- |
1 | 001 | --x |
2 | 010 | -w- |
3 | 011 | -wx |
4 | 100 | r-- |
5 | 101 | r-x |
6 | 110 | rw- |
7 | 111 | rwx |
Worked example (0755):
Final symbolic: -rwxr-xr-x
nosuid
.Scientific validity & references: Defined in the Single UNIX Specification v4, POSIX 1003.1-2017, and historically analysed in Bach’s “The Design of the Unix Operating System”.
The concept processes no personal data and falls outside GDPR scope.
Follow these steps to generate a permission string and command.
chmod
command and run it on your target system.They alter default execution or deletion behaviour: setuid and setgid run the file with elevated IDs, while sticky protects directory entries.
Octal notation is shorter, script-friendly, and unambiguous, especially when setting all three entities in one operation.
No. All calculations occur within your browser session; nothing leaves your machine.
Yes. Clear the execute box for the desired entity or subtract x
from the symbolic string, then copy the updated command.
No. The classic permission model is displayed; advanced ACL entries require dedicated system utilities.
u=rw,g=r
.