>

🔒 Chmod Permission Calculator

Visually configure Linux file permissions, generate chmod commands

Numeric Permission Code
755
Symbolic Notation
rwxr-xr-x

📊 Permission Settings

RoleRead (r=4)Write (w=2)Execute (x=1)Value

âš¡ Common Permission Presets

💻 Command

chmod 755 filename

Embed This Calculator

<iframe src="https://risetop.top/chmod-calculator.html" width="100%" height="600" frameborder="0"></iframe>

How to Use This Chmod Calculator

  1. Select permissions for each category — The calculator presents three rows corresponding to the three Linux permission categories: Owner (the file owner), Group (members of the file group), and Others (everyone else). For each category, toggle the checkboxes for Read (r), Write (w), and Execute (x) permissions. As you toggle each checkbox, the numeric octal code and the symbolic notation update instantly, so you can see the exact chmod command that corresponds to your selections.
  2. Enter a numeric code directly (optional) — If you already know the octal permission code (like 755 or 644), you can type it into the numeric input field and the calculator will automatically set the correct checkboxes and display the corresponding symbolic notation. This works in both directions — toggle checkboxes to see the number, or enter the number to see the checkboxes — making it easy to translate between the two representations.
  3. Understand the symbolic output — The tool displays the standard Linux symbolic permission string (like -rwxr-xr-x) that you would see when running the ls -l command in a terminal. The first character indicates the file type (dash for regular file, d for directory), followed by three groups of three characters each representing the read, write, and execute permissions for owner, group, and others respectively. A dash in any position means that permission is not granted.
  4. Copy the chmod command — Once you have configured the desired permissions, click the copy button to copy the ready-to-use chmod command to your clipboard. You can then paste it directly into your terminal to apply the permissions to your files and directories. The command includes both the numeric and symbolic forms so you can choose whichever syntax you prefer when applying permissions on your Linux system.

Frequently Asked Questions

Q: What do the numbers in chmod (like 755 or 644) actually mean?

Each digit in the three-digit chmod code represents permissions for one category: owner, group, and others. The digit is calculated by adding the values of the granted permissions: Read=4, Write=2, Execute=1. So 755 means the owner has all permissions (4+2+1=7), the group has read and execute (4+1=5), and others have read and execute (4+1=5). Similarly, 644 means owner has read and write (4+2=6), while group and others have read only (4). This octal system was chosen because each permission value corresponds to a binary bit, making it efficient for the underlying filesystem to store and check.

Q: What is the difference between chmod and chown?

Chmod (change mode) controls what operations can be performed on a file — it manages the read, write, and execute permissions for the owner, group, and others. Chown (change owner) controls who owns the file — it changes the user and group that the file belongs to. Think of it this way: chown determines who has the keys to the house, while chmod determines which doors those keys can open. You typically use chown when transferring file ownership between users, and chmod when you need to adjust what a user (or group, or everyone) can do with a file.

Q: When should I use 755 vs 644 for file permissions?

Use 755 for directories and executable files (scripts, binaries). The execute bit is essential for directories because it allows users to enter (cd into) the directory and access files within it. Use 644 for regular non-executable files like documents, configuration files, images, and source code — the owner can read and modify the file, while group members and others can only read it. Never use 777 (full permissions for everyone) on a web server, as it creates a serious security vulnerability where any user on the system could modify or delete your files.