Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,401,954 papers from all fields of science
Search
Sign In
Create Free Account
Chmod
Known as:
Chmoded
In Unix-like operating systems, chmod is the command and system call which may change the access permissions to file system objects (files and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Access control list
BusyBox
Chgrp
Comparison of programming languages
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
WOMEN’S BODY COMMODIFICATIONS; POLITIC, POWER AND ISLAMIC RELIGIUS VALUES IN IMPORTED SERIES DRAMA (Semiotic Analysis King Sulomon Series Drama/ Abad Kejayaan and Jodha Akbar on ANTV)
Lilik Sumarni
2017
Corpus ID: 194596018
The rise of foreign series dramas (Turkey and India) on ANTV and the ratings were high enough to be a barometer that the market…
Expand
2015
2015
PrivacyGuard: A VPN-Based Approach to Detect Privacy Leakages on Android Devices
Yihang Song
2015
Corpus ID: 107147153
The Internet is now the most important and e cient way to gain information, and mobile devices are the easiest way to access the…
Expand
2014
2014
Mise en place d’une solution de supervision Nagios
A. Mamlouk
2014
Corpus ID: 164351404
Le domaine de la supervision est un domaine important de l‟administration systemes et reseaux. En constante evolution, les…
Expand
2012
2012
The mechanics of using the Tcl and Tk Interpreters
Clif Flynt
2012
Corpus ID: 60927813
2010
2010
CHAPTER 9 – Securing Linux
G. Speake
2010
Corpus ID: 60536031
2009
2009
chmod 777 education
Carlos Santos
ELERN
2009
Corpus ID: 5887182
In 2005, a few months after Tim O'Reilly crafted the term Web 2.0 and the discussion about Web 1.0 versus Web 2.0 emerged, IBM's…
Expand
Review
2007
Review
2007
Using a virtual security testbed for digital forensic reconstruction
André Årnes
,
Paul Haas
,
Giovanni Vigna
,
R. Kemmerer
Journal in Computer Virology
2007
Corpus ID: 6033765
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks…
Expand
Review
2007
Review
2007
Review of “Why Programs Fail: A Guide to Systematic Debugging by Andreas Zeller”, Morgan Kaufmann, 2005, $54.95, ISBN: 1558608664
Fernando Berzal Galiano
Queue
2007
Corpus ID: 195724669
Review of “Why Programs Fail: A Guide to Systematic Debugging by Andreas Zeller”, Morgan Kaufmann, 2005, $54.95, ISBN: 1558608664
2006
2006
iPoJ: User-Space Sandboxing for Linux 2.4
Brian Greskamp
,
Pablo Montesinos
,
Paul Sack
2006
Corpus ID: 2535214
The Internet is a dangerous place. Both na ı̈ve and educated users routinely become infected with viruses and accidentally run…
Expand
2004
2004
Programmer's Ultimate Security DeskRef: PHP
James C. Foster
,
S. Foster
2004
Corpus ID: 196084260
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE