About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 18, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Cameras IP Address Best Practices Productivity Patch Management Reliable Computing Mobile Device Websites Managed Service Uninterrupted Power Supply Black Market CCTV Office 365 VPN Phishing Social Engineering Virtual Assistant Government Blockchain Internet of Things A.I. Worker Cybercrime Co-Managed IT Reading Office Fake News Hiring/Firing Documents USB Augmented Reality Twitter Scalability Microsoft Excel Google Drive Capital Data Analysis Business Technology Regulation Bluetooth Browser Scam Statistics Going Green Telephony IT Support Touchscreen Cooperation Start Menu Processor Computer Malfunction Gaming Console Tip of the week Vendor Paperless Office uptime Computing Infrastructure DDoS PowerPoint Google Document Management Cost Data Protection Backup and Disaster Recovery Cleaning Data Machine Learning Hackers Microsoft Bitcoin Tablets Private Cloud Public Cloud Smartphones Freedom of Information Windows 7 Value Flash Environment Legal Alert Piracy Mouse Google Maps Redundancy Efficiency Licensing Health Malware Addiction Google Play Banking Read Modem Users email scam Regulations Backup Hosted Solutions Virtual Reality Recovery outsource cloud computing Inbound Marketing Rental Service HTML Download Digital Signature Bata Backup Saving Time YouTube Business Growth CrashOverride Books Gadgets Devices Hacking Intranet Specifications communications Spam Content Healthcare Innovation IT service Applications IT Software Citrix Xenapp Teamwork Legislation File Sharing Customer Service Politics Taxes Windows XP Displays Asset Tracking Outsourced IT Service Level Agreement Supercomputer Mobile Device Management Windows 8 Wireless Technology Android Password cloud Audit Health IT Vulnerability Unified Communications Monitoring Startup Comparison Electronic Payment Word Travel Website Motion Sickness App Voice over Internet Protocol Managed IT Vulnerabilities Thank You Encryption Office Tips SSID Virtualization Upgrade User Tip Best Practice UTM Music Directions Privacy eWaste Text Messaging Ransomware SaaS Project Management PDF Knowledge Skype Chromebook Net Neutrality Saving Money Excel Administration switches Managing Stress Monitors Bandwidth Outlook Desktop Smartphone Messenger Automobile Employer-Employee Relationship Flexibility Server Analytics Mobility Training Telephone Telephone Systems GDPR Distribution Hard Drive Equifax Passwords Unified Threat Management Google Docs IT Plan Entertainment Device security Windows Server 2008 Data Backup Medical IT hardware Lithium-ion battery Presentation Fiber-Optic Access Control Emails Tech Running Cable Printer Telephone System Workers Migration Corporate Profile Operating System clout services Finance Virus Computer Accessories Network 3D Printing Samsung Apple Retail Computer Care Accountants Technology cloud storage Tablet Mobile Devices Electronic Medical Records Term Business Programming Bring Your Own Device Save Money Streaming Media Language Television Data Loss Fleet Tracking Managed Service Provider Cryptocurrency iPhone Windows Virtual Desktop Notifications Tip of the Week How To Nanotechnology Customer Relationship Management News Wi-Fi Mobile Technology Data storage Spyware Chamber Sync Productivity Hacker IT consulting VoIP Human Resources Downloads Tech Terms Business Owner Tactics Business Management Windows 10 Society Fileless Malware Proxy Server Data Recovery Computer Network Congestion Automation Evernote Integration Productuvuty Screen Reader Emergency Multi-Factor Security Big data Information Management Facebook Wireless Headphones Windows 10 Web Server Printers Entrepreneur Help Desk Dark Web Relocation IBM Social Networking Assessment Collaboration Social Network Computing Current Events Data Security Trending Law Enforcement Vendor Management Time Management Analytic Apps Search IT Services Solid State Drive Multi-factor Authentication Phone System Mobile Security Best Available Memory Business Mangement Managed IT Services Remote Computing Rapid City Username Information Technology User Error Securty Visible Light Communication BDR IT Management Two-factor Authentication Shortcut Troubleshooting Meetings End of Support Conferencing Risk Management Experience Electricity Workplace Tips Identity Theft Competition Software License BYOD Data Management Budget Managed IT services Update Quick Tips Cache Storage Fraud Trends Avoiding Downtime User Printing Network Security Database Staffing Enterprise Resource Planning Chrome Tech Support Processing Computer Repair Computers Navigation Cortana Gmail Hard Drive Disposal Tech Term Error outsource cloud storage Cost Management Settings Firewall Micrsooft Browsers Upgrades Processors Miscellaneous Domains cyber security Compliance Robot Disaster LiFi Administrator Digital Payment Application Public Speaking Holiday Proactive IT Connected Devices Data Breach Wireless Writing In Internet of Things Internet Safety User Tips Cabling Solutions Router Communication Managed IT Service Technology Tips Business Intelligence Logistics Smart Tech Employer Employee Relationship Vendor Mangement Software as a Service Business Computing IT Support Product Reviews Drones Microsoft 365 cloud computing Digital Hack Sports Antivirus Education Downtime Business Continuity Deep Learning Hacks Work/Life Balance Advertising HIPAA Google Wallet Small Business Business Cards Unified Threat Management Bookmark Mobile Computing History SharePoint Customer Resource management Professional Services Laptop Money MSP Business Metrics Company Culture Google Calendar VoIP Hosted Solution Content Filtering CIO Disaster Recovery Tracking Cybersecurity Congratulations Networking Patching Social Gamification Webcam Keyboard Physical Security Heating/Cooling the Internet of Things Windows10 G Suite WannaCry Security Marketing Email Social Media Upload Microsoft Office Access Data Warehousing Save Time Mobile Payment Pain Points Microchip Distributed Denial of Service Consultation Artificial Intelligence Remote Monitoring Maintenance Hard Drives WiFi IT Consultant Network Management Botnet Permissions

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150