Fuse Networks Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Tech Term Best Practices Network Security Hackers Business Computing Data Backup Privacy Android Data Software Innovation Data recovery Computer Collaboration Efficiency IT Support Productivity Cybersecurity Communication Google Malware Mobile Device User Tips Internet Smartphone Business Management Communications IT Services Email Cost Management Small Business Blockchain Artificial Intelligence Access Control Browser Cybercrime Office 365 Cloud Applications Backup Phishing Managed Service Hardware Business Technology Information Passwords Ransomware Scam Apps Workplace Tips Microsoft Office Data Security BDR Hosted Solutions Saving Money Facebook Social Media Business Mobile Device Management Mobile Devices VoIP Holiday Maintenance Two-factor Authentication Remote Monitoring Update Data Breach Gmail Bandwidth Vendor Internet of Things Tech Terms Document Management Disaster Recovery Users Network Hacking Mobility Vulnerabilities Data loss Quick Tips Managed IT services Smartphones Cloud Computing Alert Patch Management Automation Saving Time Windows 10 Websites Printer Bitcoin Google Maps Social Engineering Conferencing Microsoft Vulnerability News Mobile Technology Operating System Browsers Travel Augmented Reality email scam HTML Government Health IT Machine Learning Security Cameras project management Piracy Bluetooth NCSAM Digital Multi-factor Authentication Computer Care Paperless Office Evernote Customer Resource management Cost Management Business Cards Virtualization Regulations Analytics Download Fake News Virtual Reality Comparison Username Productivity eWaste VPN Legal Network Management Social Money Software License Knowledge Google Calendar Wireless Headphones IT Content Virtual Assistant Device security Database Healthcare Telephone System Gadgets Budget Upload Excel Antivirus Chromebook Microchip Computing Downloads Proxy Server Microsoft Excel Company Culture Specifications Entertainment Fuse Networks Big Data Robot Data Protection Law Enforcement Accountants Sports Encryption Cleaning Support BYOD Website Tactics Tech Electronic Medical Records Legislation Help Desk Trends Miscellaneous Tip of the week Backup and Disaster Recovery Processor Error Cortana Identity Theft Television App Data Analysis WiFi Training Distributed Denial of Service Information Technology Business Continuity Google Docs Computers CIO Hard Drive Managed Service Provider Unified Communications Addiction Term Apple Vendor Management Gamification Managed IT Services Mobile Security Audit Navigation Telephone Spam Disaster Cryptocurrency Laptop Mouse Screen Reader Fileless Malware Windows 10 Computing Infrastructure Devices Equifax User Tip Service Level Agreement Freedom of Information Nanotechnology Bookmark Hard Drive Disposal Printing Google Play SharePoint Downtime Emergency IT Management Emails Outsourced IT Social Network Desktop Directions Monitoring Networking Compliance Startup Going Green Managing Stress Wireless Technology 5G Tech Support Safety IBM Marketing Hacker Multi-Factor Security The Internet of Things Hard Drives Search Competition Customer Relationship Management Server IP Address Router Customer Service Mobile Office Upgrade Modem Domains Wireless Twitter Regulation Hiring/Firing SSID Public Speaking Presentation Wi-Fi Fun Lithium-ion battery Employer-Employee Relationship Printers