Configuration File

A configuration file contains instructions that control the basic settings for computer systems and applications. When a computer program runs, configuration files provide parameters for the program s operation. The program will check the configuration file so that it can tell the computer how to run the program. Common configuration file names include .cnf, .conf, and .cfg. Windows, Mac, and Linux run different configuration files.

Editing configuration files

Because many configuration files run standard text, users can create files manually and edit them to change how the program runs. Operating systems have their own text editors in which users can edit the file, although it sometimes requires being a system admin. There are also plenty of third-party text editors that users can download as well, particularly if they want to create more advanced settings. Some changes may be blocked because of user permissions permissions can often be fixed by changing user status to admin or mistakes made while editing the file.

Some operating systems allow application configuration files for specific applications. By designing an application configuration file, users can work around the standard instructions of the application, known as redirection.

Configuration file contents

Configuration file contents generally fall into four content types:

  • Comments: Mechanism for developers to communicate behaviors and actions. Essential but does not affect file behavior.
  • Flags: Controls which options are enabled and disabled in application or system
  • Settings: Assignment of constants to variable information, allowing operational parameters to be defined.
  • Paths: Used to stipulate storage devices, folder locations, and specific filenames.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...