About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

SharePoint Encryption Fileless Malware Workplace Tips USB LiFi Flexibility Paperless Office Data Backup HIPAA Bookmark Office 365 Best Available Google Maps Windows 8 IT Network Management CCTV Internet Troubleshooting Assessment Hacks outsource cloud computing Thank You Reading PowerPoint Managed IT services Browsers Licensing Fiber-Optic Google Drive Communication Data storage Money hardware Application Start Menu Business Continuity Telephone Skype Saving Time Remote Monitoring Comparison Distributed Denial of Service Cybersecurity Read Upgrade Wireless BDR Managing Stress Deep Learning Antivirus Citrix Xenapp Office Ransomware Co-Managed IT Office Tips Digital Payment Service Level Agreement Mobile Security Social Engineering Capital Productivity Data Warehousing Administrator Google Wallet Redundancy Managed IT Service Budget Writing Holiday Chromebook Search Administration Fleet Tracking Net Neutrality Storage Cost Remote Computing Flash Windows10 Business Management Facebook Microsoft Content Competition Two-factor Authentication Hack Consultation CIO Users Disaster Recovery Hackers Browser Processors Hacking BYOD YouTube Network Security Vendor Management WannaCry Taxes Twitter Electricity Social Networking Memory Settings User Error Advertising Network Value Business Relocation Google Cybercrime UTM Botnet eWaste Hosted Solutions Virtual Reality Tech Term VPN G Suite uptime Mobility Inbound Marketing Security Multi-Factor Security Software License Worker VoIP Unified Threat Management Websites Apple Business Owner 3D Printing Disaster Mobile Technology Patch Management Equifax Reliable Computing Microchip Enterprise Resource Planning Tech Support Password How To Artificial Intelligence Work/Life Balance PDF Managed Service Provider Windows Server 2008 Marketing Hard Drive cloud Virtual Assistant Upgrades Regulations Samsung Business Technology Business Mangement Processor Blockchain Customer Service Quick Tips Google Docs Virtual Desktop Avoiding Downtime Windows XP Telephone System Update Trends Help Desk Web Server Access In Internet of Things Username Business Metrics cloud computing Government Windows 7 Small Business Entertainment Digital Signature Displays Telephone Systems Bandwidth HTML Freedom of Information Presentation DDoS Data Security Scam IT Services Experience communications Fraud Data Protection Miscellaneous Mouse Visible Light Communication Management switches IT consulting Supercomputer Word Android Banking Tablet Computer Touchscreen Screen Reader Virtualization Project Management Domains Computers Mobile Devices Cost Management Access Control Directions Tablets Computer Accessories Hacker Teamwork Physical Security Going Green Business Intelligence Upload Emergency Compliance Identity Theft Document Management Computing Backup Virus Securty Electronic Payment Malware Productivity Innovation Save Time Big data Computer Care Specifications Data Breach Politics Piracy Language Human Resources Tip of the week Bitcoin Information Technology App Computing Infrastructure Rental Service Black Market WiFi Congratulations outsource cloud storage Device security Trending Maintenance Tech Terms User Tip Education Healthcare Hosted Solution iPhone Analytics Permissions Saving Money Backup and Disaster Recovery Public Speaking Automation Time Management Legal Printing Nanotechnology Travel Evernote Managed Service Cache Information Data Recovery Scalability Laptop History Safety Vulnerabilities Recovery Documents Windows 10 Data Loss Proxy Server Unified Communications Gadgets Bluetooth Public Cloud Data Analysis Gaming Console Email Passwords Apps IT Support Windows Digital Database Knowledge Gamification Customer Relationship Management Webcam Windows 10 IT Plan Telephony Router Vendor Hard Drive Disposal Audit Business Computing Current Events VoIP Meetings Hard Drives Hiring/Firing Employer-Employee Relationship Vendor Mangement Health Printer MSP Operating System Workers IP Address Social Network cyber security Regulation Best Practice Productuvuty Keyboard Applications Robot Privacy Retail Monitors Tip of the Week Phishing Shortcut Printers IT Management Data Smartphones Streaming Media Conferencing Solid State Drive Bring Your Own Device Electronic Medical Records Emails Training Text Messaging Download Social Television Wireless Headphones Tactics Private Cloud IT Support Multi-factor Authentication Vulnerability Sync Internet of Things Cabling Mobile Payment Technology Cryptocurrency Customer Resource management Content Filtering Excel Staffing Employer Employee Relationship Business Growth Drones Smart Tech Sports Spyware Desktop Efficiency SaaS Statistics Devices Managed IT Startup A.I. IT service Chrome Fake News Music Tracking Error Health IT Software as a Service the Internet of Things End of Support Downloads Technology Tips Phone System Google Calendar Migration Heating/Cooling Social Media Wi-Fi Corporate Profile Distribution Society Cortana Website Proactive IT Spam Server Microsoft Excel Analytic Legislation Wireless Technology CrashOverride Lithium-ion battery Programming Mobile Computing Outsourced IT Books Navigation Outlook Cleaning Network Congestion Software Accountants email scam Collaboration Best Practices Mobile Device Management cloud storage Law Enforcement Asset Tracking IBM Augmented Reality Microsoft Office Data Management Computer Malfunction clout services Networking User Pain Points Product Reviews Alert Notifications Micrsooft Unified Threat Management Company Culture Computer Repair Business Cards Finance User Tips Firewall Entrepreneur Environment Messenger Connected Devices News Machine Learning Dark Web Risk Management File Sharing Patching Addiction Mobile Device Intranet Running Cable Automobile IT Consultant Save Money Gmail Smartphone Uninterrupted Power Supply Monitoring Motion Sickness Bata Backup Managed IT Services Downtime

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150