My blog post diving into traditional Unix permissions. The article explains how the permissions system works, explores some command line utilities to set and interact with permissions, and discusses how to use traditional permissions to harden your system’s security.

I hope you like it. I would appreciate any constructive feedback!