Practice Use drills for recall and labs for real operating judgment.

LAB-PERM-01 - The Permission Trinity (rwx)

Read Linux permission strings confidently and explain what read, write, and execute mean for files versus directories.

ACL Permission Management

The Permission Trinity (rwx)

Read Linux permission strings confidently and explain what read, write, and execute mean for files versus directories.

30 min BEGINNER LINUX Field-verified
Success criteria
  • Read a basic permission string such as -rw-r--r-- or drwxr-xr-x.
  • Explain how file permissions differ from directory permissions.
Safety notes
  • Do all permission experiments in a practice area, not in important directories.

Part A: The Field Guide

When you run ls -l, the first block of characters tells you a lot about access.

Example:

-rw-r--r--

The pattern is:

  • first character: what kind of thing this is
  • next three: owner permissions
  • next three: group permissions
  • last three: other permissions

The first character

  • - means a regular file
  • d means a directory
  • l means a symbolic link

The three permission letters

  • r means read
  • w means write
  • x means execute or traverse
  • - means that permission is missing

Important Distinction

On a file, x usually means the file can be run as a program or script. On a directory, x means you can enter or traverse the directory.

File versus directory behavior

For a file:

  • r: read the contents
  • w: change the contents
  • x: run the file if it is executable content

For a directory:

  • r: list names inside it
  • w: create, rename, or remove entries inside it
  • x: enter the directory or pass through it

Part B: The Drill Deck

Terminal required: keep everything in a harmless practice area.

G
Guided Step by step - type exactly this and compare the result
>

Exercise G1: Read one file permission string

  1. Run ls -l /etc/passwd
  2. Identify the file type character
  3. Read the owner, group, and other chunks out loud
  4. State what each chunk allows

Exercise G2: Read one directory permission string

  1. Run ls -ld /tmp
  2. Notice the leading d
  3. Explain why execute on a directory means traverse, not run

Exercise G3: Build your own example

  1. Run mkdir -p ~/perm_lab && cd ~/perm_lab
  2. Run touch example.txt
  3. Run ls -l example.txt
  4. Interpret the result in plain language
S
Solo Task described, hints available - figure it out
>

Exercise S1: Decode mentally

Explain these permission strings in plain language:

  1. -rwxr-x---
  2. drwxrwxr-x
  3. -r--------

Exercise S2: Directory logic check

If a directory gives you read but not execute, what can you observe, and what can you not do? Answer in words before testing it later.

M
Mission Real scenario - no hints, combine multiple skills
>

Mission M1: Explain the directory case

In your own words, explain why deleting a file depends partly on the permissions of the directory that contains it, not just the file itself.

If you can explain that clearly, the permission model is starting to become real instead of memorized.