Paste chmod octal value (755, 644, etc)
Tool converts to 9-bit binary automatically
Map binary to rwx permission pattern
chmod 755 is memorized muscle memory but what permissions does it grant? Octal→binary conversion (755 → 111 101 101 → rwxr-xr-x) reveals owner=read+write+execute, group=read+execute, other=read+execute. Misunderstanding permissions creates security holes or breaks application access. Worse: unusual permissions like 640 or 2755 (setgid) require mental binary conversion to understand. Wrong permissions cause production incidents—web server can't read files (644 needed), scripts won't execute (755 needed), or world-writable security risks (777 avoided).
First digit = owner permissions, second = group, third = other (everyone else). Each digit is octal sum: read=4, write=2, execute=1. 755 means owner=7 (4+2+1=rwx), group=5 (4+1=r-x), other=5 (4+1=r-x). Binary shows bit patterns: 111 101 101.
Convenience. 3 octal digits (755) shorter than 9 binary bits (111101101). Each octal digit maps directly to 3 bits, grouping permissions naturally. Historical Unix design—octal was compact for punch cards. Binary conversion helps understand bits but octal stays standard for chmod commands.
4-digit chmod values (2755, 4755). First digit adds special bits: 4=setuid (execute as file owner), 2=setgid (execute as file group). Binary shows in high 3 bits. Used for sudo, passwd, cron—programs needing elevated privileges. Security risk if misused—audit carefully.
Check file permissions with ls -l. Compare to required access: scripts need execute bit (x), web files need read (r), config files need write (w). Change with chmod: 755 for executables, 644 for data files, 600 for secrets. Verify owner/group with chown if needed.
Type to search tools, use cases, and more...