Solved

How to rename directories under another user...

Posted on 2006-11-08
1
225 Views
Last Modified: 2013-12-15
I just installed SUse 10.0  and am learning to use it.  i'm a noob.

so, under root, in the GUI interface, I think i can rename directories... like i went into my public_html directory, and could create new one, and rename it....

but when logging in as a user... i don't have access to do that.  why not?  how do i set it up?  why's it not setup by default that way? (yeah sounds wierd, but for a pc that sits at home and is used by only me and my wife.... i wouldn't want to fiddle with settings that mundane)
0
Comment
Question by:alenknight
1 Comment
 
LVL 45

Accepted Solution

by:
sunnycoder earned 500 total points
ID: 17903978
Hi alenknight,

> but when logging in as a user... i don't have access to do that.  why not?  how do
> i set it up?  why's it not setup by default that way?
Files and directories in Linux have three sets of permissions -
1. For the owner
2. For the owner's group (of users)
3. For everyone else

Only exception is root user who can access everything ... Root account is normally used only for system configuration kind of tasks and typically system files can be modified only by root ... Also permissions are set up in such a way that file created by or present in root's directories are accessible only to root ... This is by design to keep the information of each user safe from other users and to protect the system configuration from accidental/malacious alteration by a new/rougue user.

highly recommended that you use a normal user account for normal use and "su" to superuser account whenever you need superuser permissions ...
man su for more details on su

Further reading
http://www.zzee.com/solutions/linux-permissions.shtml
http://www.comptechdoc.org/os/linux/usersguide/linux_ugfilesp.html
http://www.ahinc.com/linux101/permission.htm

Cheers!
sunnycoder
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question