Configuration File

A configuration file contains instructions that control the basic settings for computer systems and applications. When a computer program runs, configuration files provide parameters for the program s operation. The program will check the configuration file so that it can tell the computer how to run the program. Common configuration file names include .cnf, .conf, and .cfg. Windows, Mac, and Linux run different configuration files.

Editing configuration files

Because many configuration files run standard text, users can create files manually and edit them to change how the program runs. Operating systems have their own text editors in which users can edit the file, although it sometimes requires being a system admin. There are also plenty of third-party text editors that users can download as well, particularly if they want to create more advanced settings. Some changes may be blocked because of user permissions permissions can often be fixed by changing user status to admin or mistakes made while editing the file.

Some operating systems allow application configuration files for specific applications. By designing an application configuration file, users can work around the standard instructions of the application, known as redirection.

Configuration file contents

Configuration file contents generally fall into four content types:

  • Comments: Mechanism for developers to communicate behaviors and actions. Essential but does not affect file behavior.
  • Flags: Controls which options are enabled and disabled in application or system
  • Settings: Assignment of constants to variable information, allowing operational parameters to be defined.
  • Paths: Used to stipulate storage devices, folder locations, and specific filenames.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...