Tag

Permissions

1 views collected around this technical thread.

IT Xianyu
IT Xianyu
May 26, 2025 · Fundamentals

A Step‑by‑Step Tutorial for Writing Basic Shell Scripts on Linux

This article walks beginners through creating, editing, granting permissions to, and executing simple Bash scripts such as hello.sh and name_check.sh, while also covering common pitfalls, directory organization, and essential command‑line tools for effective shell scripting.

LinuxPermissionsTutorial
0 likes · 7 min read
A Step‑by‑Step Tutorial for Writing Basic Shell Scripts on Linux
Selected Java Interview Questions
Selected Java Interview Questions
May 21, 2025 · Operations

From 777 to Least‑Privilege: Securely Deploying Spring Boot with Docker

This article explains why using 777 permissions on production servers is dangerous when deploying a Spring Boot Docker service, and provides step‑by‑step guidance on applying minimal permissions, creating dedicated users, and automating secure deployments with Docker, CI/CD, and Kubernetes.

CI/CDDockerKubernetes
0 likes · 7 min read
From 777 to Least‑Privilege: Securely Deploying Spring Boot with Docker
Linux Ops Smart Journey
Linux Ops Smart Journey
May 7, 2025 · Operations

Master Jenkins Role-Based Authorization: Secure Your CI/CD Pipeline

This guide explains why Jenkins permission management is critical, outlines required plugins, walks through switching to the Role‑based Authorization Strategy, shows how to create and assign roles, and demonstrates verification steps to ensure a secure DevOps workflow.

CI/CDDevOpsJenkins
0 likes · 4 min read
Master Jenkins Role-Based Authorization: Secure Your CI/CD Pipeline
Test Development Learning Exchange
Test Development Learning Exchange
Apr 24, 2025 · Databases

Using SQLite Databases and Advanced ADB Commands on Android

This guide explains how to access Android SQLite databases via adb shell sqlite3, create and run complex shell scripts, and manage app permissions and users through ADB commands, providing practical examples for debugging and automation.

ADBAndroidDatabase
0 likes · 5 min read
Using SQLite Databases and Advanced ADB Commands on Android
IT Xianyu
IT Xianyu
Apr 19, 2025 · Operations

Comprehensive Guide to System Monitoring, Text Editing, Permission Management, and Log Analysis for Library Operations

This article provides a detailed, step‑by‑step tutorial on using Linux commands such as top, grep, awk, and bash scripts for performance bottleneck detection, memory‑leak investigation, automated alerts, efficient Vim editing, permission matrix configuration, multi‑condition log analysis, and quick troubleshooting in a library management environment.

Log AnalysisPermissionsbash scripting
0 likes · 9 min read
Comprehensive Guide to System Monitoring, Text Editing, Permission Management, and Log Analysis for Library Operations
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLPermissionsRBAC
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 23, 2024 · Databases

Misuse of Wildcards in MySQL GRANT Statements Leads to Permission Errors and How to Avoid Them

This article explains how using the '_' and '%' wildcards in MySQL GRANT statements can unintentionally broaden privileges, illustrates the security risks with concrete examples and version‑specific behavior, and provides practical guidance on escaping wildcards, auditing existing grants, and preventing privilege loss.

DatabaseMySQLPermissions
0 likes · 14 min read
Misuse of Wildcards in MySQL GRANT Statements Leads to Permission Errors and How to Avoid Them
Efficient Ops
Efficient Ops
Aug 11, 2024 · Operations

Unlock Linux File Permissions: Master SUID, SGID, and Advanced Find Commands

This guide explains Linux permission basics, the special SUID/SGID/sticky bits, and shows how to use the powerful find command to locate files by name, timestamps, size, or exact permissions, complete with practical code examples.

LinuxPermissionsSUID
0 likes · 7 min read
Unlock Linux File Permissions: Master SUID, SGID, and Advanced Find Commands
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 5, 2024 · Mobile Development

Multiple Ways to Download Files to an Android SD Card

This article explains the evolution of Android storage permissions and presents three practical approaches—direct SD‑card permission, DocumentFile API, and Storage Access Framework—for reliably downloading files to external SD cards across various Android versions.

AndroidPermissionsdocumentfile
0 likes · 13 min read
Multiple Ways to Download Files to an Android SD Card
Efficient Ops
Efficient Ops
Dec 11, 2023 · Operations

How a Simple System‑Time Change Sparked a Massive Outage

A junior ops engineer mistakenly set the production server clock ahead by a year, causing thousands of user accounts to expire, triggering a large‑scale outage, emergency fixes, financial loss, and harsh career consequences, while highlighting the need for proper permission and change management.

DatabasePermissionsincident management
0 likes · 7 min read
How a Simple System‑Time Change Sparked a Massive Outage
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 26, 2023 · Databases

Understanding MySQL Permission Changes and Their Effectiveness in Uproxy

This article explains how MySQL permission modifications behave at table, database, and global levels, demonstrates verification steps with Uproxy's connection pool, and clarifies why query cache settings and USE statements affect the visibility of privilege changes.

DatabaseMySQLPermissions
0 likes · 8 min read
Understanding MySQL Permission Changes and Their Effectiveness in Uproxy
Laravel Tech Community
Laravel Tech Community
Aug 30, 2023 · Fundamentals

Comprehensive Linux Guide: Filesystem, Commands, Permissions, Users, Processes, and Software Installation

This article provides a detailed overview of Linux fundamentals, covering the directory structure, essential command-line operations, file permission management, user and group administration, process monitoring and termination, as well as common software installation methods using tar, rpm, and yum.

FilesystemLinuxPermissions
0 likes · 16 min read
Comprehensive Linux Guide: Filesystem, Commands, Permissions, Users, Processes, and Software Installation
Aikesheng Open Source Community
Aikesheng Open Source Community
Jul 19, 2023 · Databases

Understanding MySQL Permission Conflict Between USAGE and GRANT OPTION

This article explains why a MySQL user granted both USAGE and GRANT OPTION on a database can see schema information but cannot query table data, demonstrates the issue with local tests, and provides proper REVOKE commands to cleanly remove the conflicting permissions.

GRANT OPTIONMySQLPermissions
0 likes · 9 min read
Understanding MySQL Permission Conflict Between USAGE and GRANT OPTION
360 Quality & Efficiency
360 Quality & Efficiency
Apr 7, 2023 · Information Security

Understanding Windows User Permissions, Privilege Dropping, and Elevation (UAC)

This article explains Windows user permission types, inheritance, the concepts of privilege dropping and elevation, how Explorer.exe can be used for privilege reduction, and the role of UAC and ShellExecute/ShellExecuteEx APIs in managing application security.

ExplorerPermissionsPrivilege Escalation
0 likes · 7 min read
Understanding Windows User Permissions, Privilege Dropping, and Elevation (UAC)
FunTester
FunTester
Mar 27, 2023 · Mobile Development

Key Considerations for Mobile App Testing

This guide outlines essential mobile app testing practices, including device and platform selection, handling user mobility and network changes, multitasking scenarios, gesture conflicts, user experience factors, permissions, caching, web dependency, layered and exploratory testing, security checks, and effective log usage.

App TestingPermissionsSecurity Testing
0 likes · 6 min read
Key Considerations for Mobile App Testing
Architect's Guide
Architect's Guide
Jan 7, 2023 · Databases

MySQL Execution Process Overview

This article explains the complete MySQL execution flow, covering the connector, permission verification, caching, parser, optimizer, executor, process states, SQL execution order, and the impact of WHERE‑clause condition ordering on query performance.

Execution ProcessMySQLPermissions
0 likes · 13 min read
MySQL Execution Process Overview
Java Architect Essentials
Java Architect Essentials
Dec 8, 2022 · Backend Development

Integrating jCasbin Permission Management into Spring Boot Applications

This article demonstrates how to replace Shiro with jCasbin for fine‑grained permission control in a Spring Boot 1.5.10 project, covering Maven dependencies, configuration files, Enforcer initialization, a custom servlet filter, and dynamic policy add/remove APIs.

JavaPermissionsSpringBoot
0 likes · 10 min read
Integrating jCasbin Permission Management into Spring Boot Applications