Tagged articles
95 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Feb 12, 2026 · Information Security

Master Linux Permissions: From chmod Basics to Advanced ACL, SELinux & Containers

This comprehensive guide walks you through Linux's multi‑layered permission system—covering basic UGO rwx bits, numeric and symbolic modes, special bits, ACLs, SELinux/AppArmor, capabilities, chattr attributes, and container‑level controls such as SecurityContext and Pod Security Standards—so you can design a robust, least‑privilege security model for servers and cloud workloads.

ACLDockerPermissions
0 likes · 34 min read
Master Linux Permissions: From chmod Basics to Advanced ACL, SELinux & Containers
MaGe Linux Operations
MaGe Linux Operations
Jan 23, 2026 · Operations

Master HAProxy ACLs: Dynamic Routing, Traffic Splitting, and Real‑Time Updates

This comprehensive guide explains HAProxy ACL fundamentals, showcases powerful routing patterns such as multi‑domain, path‑based, header‑based, and canary releases, provides step‑by‑step configuration examples, scripts for runtime adjustments, best‑practice recommendations, troubleshooting tips, and monitoring strategies for production‑grade load balancing.

ACLBlue‑Green deploymentHAProxy
0 likes · 40 min read
Master HAProxy ACLs: Dynamic Routing, Traffic Splitting, and Real‑Time Updates
Ops Community
Ops Community
Jan 6, 2026 · Information Security

Master Linux Permissions: From Basics to Advanced Security Practices

This comprehensive guide walks you through the evolution, fundamentals, and advanced techniques of Linux permission management, covering UGO models, special bits, ACLs, SELinux/AppArmor, best‑practice design principles, troubleshooting steps, audit configurations, and real‑world case studies for securing web, database, and SSH services.

ACLLinuxPermissions
0 likes · 39 min read
Master Linux Permissions: From Basics to Advanced Security Practices
Raymond Ops
Raymond Ops
Dec 11, 2025 · Operations

Unlock the Full Power of Linux Permissions: A Complete 12‑Bit Guide for Sysadmins

This article explains why misconfigured Linux permissions cause security incidents, breaks down the 12‑bit permission model—including file type, owner/group/others bits and special SUID, SGID, and sticky bits—provides numeric examples, real‑world case studies, advanced techniques like umask, ACLs, batch changes, and offers best‑practice security recommendations and troubleshooting tips.

ACLLinuxPermissions
0 likes · 10 min read
Unlock the Full Power of Linux Permissions: A Complete 12‑Bit Guide for Sysadmins
Tech Freedom Circle
Tech Freedom Circle
Sep 19, 2025 · Interview Experience

Designing a Rock‑Solid High‑Availability Solution for Unreliable Third‑Party Services

When third‑party services frequently fail, this article walks through a systematic high‑availability design—including an ACL anti‑corruption layer, strategy‑pattern master‑slave routing, precise rate limiting, circuit‑breaker fallback, full observability, async degradation, and mock testing—to keep external dependencies as stable as a mountain.

ACLMock TestingStrategy Pattern
0 likes · 24 min read
Designing a Rock‑Solid High‑Availability Solution for Unreliable Third‑Party Services
Liangxu Linux
Liangxu Linux
Aug 19, 2025 · Operations

Master Linux Permissions: From Basic rwx to SUID, ACL, and Hidden Attributes

This guide explains Linux file and directory permissions, covering basic rwx modes, numeric and symbolic chmod, ownership changes with chown/chgrp, special bits like SUID/SGID/SBIT, umask calculations, hidden attributes via chattr/lsattr, ACL management with setfacl/getfacl, and sudo configuration for secure privilege escalation.

ACLLinuxPermissions
0 likes · 51 min read
Master Linux Permissions: From Basic rwx to SUID, ACL, and Hidden Attributes
Raymond Ops
Raymond Ops
Jun 22, 2025 · Operations

Master Linux Permissions: From chmod to SUID, ACLs and sudo

This guide explains Linux file permission fundamentals, covering owner/group/other rights, chmod and chown usage, umask defaults, special bits like SUID/SGID/Sticky, ACL management, sudo configuration, and essential system commands for effective operations.

ACLLinuxPermissions
0 likes · 23 min read
Master Linux Permissions: From chmod to SUID, ACLs and sudo
Raymond Ops
Raymond Ops
Jun 13, 2025 · Operations

Master HAProxy: Step-by-Step Deployment and Configuration Guide

This article provides a comprehensive, hands‑on guide to installing HAProxy, configuring global, defaults, listen, frontend, and backend sections, setting up ACL‑based load balancing, preparing backend web servers, testing the setup, and accessing the HAProxy statistics page.

ACLBackendConfiguration
0 likes · 16 min read
Master HAProxy: Step-by-Step Deployment and Configuration Guide
Kuaishou Tech
Kuaishou Tech
Jun 5, 2025 · Artificial Intelligence

7 Kuaishou AI Papers Accepted at ACL 2025: Video Understanding & Safe LLM Decoding

Kuaishou’s foundational large-model team has secured seven papers at ACL 2025, spanning alignment bias in training, safety defenses during inference, decoding strategies, fine-grained video-temporal understanding, reward fairness in RLHF, multimodal captioning benchmarks, and methods to curb hallucinations in vision-language models.

ACLAI SafetyBenchmark
0 likes · 13 min read
7 Kuaishou AI Papers Accepted at ACL 2025: Video Understanding & Safe LLM Decoding
Raymond Ops
Raymond Ops
Jun 4, 2025 · Operations

Mastering SFTP: Complete Planning, Configuration, and High‑Availability Guide

This guide walks you through SFTP server planning, user naming conventions, directory structures, SSH configuration, account creation, permission setup, client usage, log auditing, rotation, connection limits, monitoring, and high‑availability deployment across multiple servers, providing ready‑to‑run commands and scripts.

ACLLinuxSFTP
0 likes · 14 min read
Mastering SFTP: Complete Planning, Configuration, and High‑Availability Guide
Open Source Linux
Open Source Linux
Apr 21, 2025 · Information Security

Master Linux File Permissions: Basics, SetUID, SetGID & Sticky Bits

This guide explains Linux file permission concepts, from basic read/write/execute rights and numeric representations to advanced SetUID, SetGID, sticky bits, default umask settings, ownership changes, and ACL strategies, with practical chmod examples and command-line demonstrations.

ACLLinuxchmod
0 likes · 17 min read
Master Linux File Permissions: Basics, SetUID, SetGID & Sticky Bits
Raymond Ops
Raymond Ops
Apr 19, 2025 · Operations

How to Set Up Transparent and Reverse Proxy with Squid on Linux

This guide walks through installing Squid on Linux, configuring it as a transparent proxy for internal clients, setting up a reverse proxy for external web servers, and applying common ACL rules to control access and improve network performance.

ACLLinuxProxy
0 likes · 11 min read
How to Set Up Transparent and Reverse Proxy with Squid on Linux
Liangxu Linux
Liangxu Linux
Apr 19, 2025 · Fundamentals

Master Linux File Permissions: From Basics to Advanced ACLs

This guide explains Linux file permissions, covering basic concepts, rwx and numeric representations, chmod usage, advanced permissions like setuid, setgid and sticky bits, default umask settings, ownership management, and ACL extensions with practical command examples and step‑by‑step demonstrations.

ACLPermissionschmod
0 likes · 17 min read
Master Linux File Permissions: From Basics to Advanced ACLs
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAuthorizationPermissions
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Meituan Technology Team
Meituan Technology Team
Mar 20, 2025 · Artificial Intelligence

Meituan Tech Team's Selected Papers on Large Language Models and AI (2024-2025)

The article compiles Meituan’s recent 2024‑2025 research on large language models, presenting a diverse set of papers that explore transformer enhancements, scaling laws, safety optimization, instruction fine‑tuning, temporal decay learning, code generation, agent refinement, cost‑efficient MoE inference, quantization, fast parallel inference, speculative decoding, multilingual speech, vision‑language models, evaluation benchmarks, and jailbreak robustness.

ACLAILLM
0 likes · 4 min read
Meituan Tech Team's Selected Papers on Large Language Models and AI (2024-2025)
Liangxu Linux
Liangxu Linux
Feb 23, 2025 · Operations

Master Linux File Permissions: From Basics to SetUID, SetGID, and Sticky Bits

This guide explains Linux file permissions, covering the meaning of rwx bits, the UGO model, how to view and modify permissions with ls and chmod (both symbolic and numeric forms), advanced bits like setuid, setgid and sticky, default permissions controlled by umask, ownership changes with chown/chgrp, and an introduction to ACLs for fine‑grained access control.

ACLLinuxPermissions
0 likes · 19 min read
Master Linux File Permissions: From Basics to SetUID, SetGID, and Sticky Bits
Liangxu Linux
Liangxu Linux
Feb 17, 2025 · Operations

Master Linux File Permissions: From Basics to Advanced ACLs

This guide explains Linux file permissions, covering basic read/write/execute rights, symbolic and numeric chmod usage, advanced bits like setuid, setgid and sticky, default umask settings, ownership changes with chown/chgrp, and ACL management with setfacl/getfacl, all illustrated with practical command examples.

ACLLinuxPermissions
0 likes · 18 min read
Master Linux File Permissions: From Basics to Advanced ACLs
Liangxu Linux
Liangxu Linux
Feb 10, 2025 · Information Security

Master Linux File Permissions: From Basic rwx to Advanced ACLs

This guide explains Linux file and directory permissions, numeric and symbolic representations, special bits like SUID/SGID/sticky, ownership changes with chown/chgrp, default umask behavior, and detailed ACL usage with practical examples and command snippets.

ACLLinuxPermissions
0 likes · 27 min read
Master Linux File Permissions: From Basic rwx to Advanced ACLs
Liangxu Linux
Liangxu Linux
Jan 23, 2025 · Fundamentals

Master Linux File Permissions: rwx, chmod, umask, and ACL Explained

This guide walks through Linux file permissions, explaining the meaning of rwx bits, the UGO model, how to modify permissions with chmod using symbolic and numeric forms, advanced bits like setuid/setgid/sticky, default permissions controlled by umask, ownership changes with chown/chgrp, and fine‑grained ACL management, all with concrete command examples.

ACLFile PermissionsLinux
0 likes · 17 min read
Master Linux File Permissions: rwx, chmod, umask, and ACL Explained
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 7, 2025 · Databases

Analysis of Redis Sentinel Failover Issue in Redis 7.4.0 and Resolution via Pub/Sub ACL Adjustment

This article investigates a Redis Sentinel failover anomaly in version 7.4.0 where the sentinel repeatedly elects a failed master, explains the underlying s_down/o_down states, examines network, configuration, and ACL settings, and resolves the issue by adjusting Pub/Sub permissions to allow proper failover.

ACLdatabasefailover
0 likes · 11 min read
Analysis of Redis Sentinel Failover Issue in Redis 7.4.0 and Resolution via Pub/Sub ACL Adjustment
MaGe Linux Operations
MaGe Linux Operations
Jan 2, 2025 · Fundamentals

Master Linux File Permissions: From Basics to Advanced ACLs

This guide explains Linux file permissions, covering the concepts of read, write, and execute rights, symbolic and numeric representations, the chmod command, special bits like setuid, setgid, and sticky, default permissions controlled by umask, ownership management with chown/chgrp, and an introduction to ACLs for fine‑grained access control.

ACLFile PermissionsLinux
0 likes · 20 min read
Master Linux File Permissions: From Basics to Advanced ACLs
MaGe Linux Operations
MaGe Linux Operations
Dec 24, 2024 · Information Security

Master Linux File Permissions: From Basics to Advanced ACLs

This guide explains Linux file permissions, covering the concepts of read, write, and execute bits, the UGO model, symbolic and numeric chmod usage, advanced bits like setuid, setgid, sticky, default permissions via umask, ownership changes, and an introduction to ACLs.

ACLFile PermissionsLinux
0 likes · 22 min read
Master Linux File Permissions: From Basics to Advanced ACLs
MaGe Linux Operations
MaGe Linux Operations
Oct 26, 2024 · Backend Development

Step-by-Step HAProxy Deployment and Configuration Guide for Load Balancing

This tutorial walks through installing HAProxy, configuring global, defaults, listen, frontend, and backend sections, setting up ACL‑based routing, defining server groups for default, website, and blog services, testing load‑balancing behavior, and accessing the HAProxy statistics page, all with complete command‑line examples.

ACLBackendHAProxy
0 likes · 15 min read
Step-by-Step HAProxy Deployment and Configuration Guide for Load Balancing
ByteDance Data Platform
ByteDance Data Platform
Oct 16, 2024 · Databases

How ByteHouse Boosted Sales Data Platform Queries Up to 16× with ACL and Optimizer

This article examines a fast‑growing company's sales data platform, outlines the data‑access pain points caused by ACL permissions, describes the migration from ClickHouse to ByteHouse, details the optimizer’s rule‑based, cost‑based, and distributed‑plan enhancements, and presents benchmark results showing query speedups of up to sixteen times.

ACLByteHouseOLAP
0 likes · 16 min read
How ByteHouse Boosted Sales Data Platform Queries Up to 16× with ACL and Optimizer
Architect
Architect
Oct 12, 2024 · Information Security

Understanding ACL, ABAC, and RBAC: Choosing the Right Access Control Model

This article introduces three common permission models—ACL, ABAC, and RBAC—explaining their core concepts, how they manage user access through objects, attributes, or roles, and discusses the strengths and limitations of each approach for secure system design.

ABACACLAuthorization
0 likes · 8 min read
Understanding ACL, ABAC, and RBAC: Choosing the Right Access Control Model
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 6, 2024 · Operations

ZooKeeper Core Concepts: Data Model, Node Types, Sessions, Cluster, Election, ZAB, Watch, ACL, and Distributed Lock Patterns

This article explains ZooKeeper's hierarchical data model, node types, session mechanism, cluster roles and election process, ZAB protocol, watch mechanism, ACL permissions, and common distributed lock implementations, providing a comprehensive overview of its core concepts and practical usage.

ACLCluster ManagementCoordination Service
0 likes · 17 min read
ZooKeeper Core Concepts: Data Model, Node Types, Sessions, Cluster, Election, ZAB, Watch, ACL, and Distributed Lock Patterns
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2024 · Operations

Master Linux Permissions: Users, Groups, SUID/SGID, ACLs and sudo

This comprehensive guide explains Linux permission fundamentals, user and group management, file permission modes, special bits like SUID, SGID and Sticky, hidden attributes with chattr/lsattr, ACL configuration, and privilege escalation using su and sudo, complete with practical command examples.

ACLLinuxSGID
0 likes · 45 min read
Master Linux Permissions: Users, Groups, SUID/SGID, ACLs and sudo
Liangxu Linux
Liangxu Linux
May 6, 2024 · Information Security

Master Linux File & Directory Permissions: Commands, Examples, and Best Practices

This guide explains Linux file and directory permission concepts, shows how to view, interpret, and modify permissions using numeric and symbolic modes, manage owners and groups, apply special bits and ACLs, locate and fix issues, and implement regular audits for secure system administration.

ACLFile PermissionsSysadmin
0 likes · 7 min read
Master Linux File & Directory Permissions: Commands, Examples, and Best Practices
Alibaba Cloud Native
Alibaba Cloud Native
Apr 18, 2024 · Cloud Native

What’s New in RocketMQ ACL 2.0? A Deep Dive into Features, Architecture, and Configuration

This article explains the motivations behind RocketMQ ACL 2.0, outlines its six major enhancements—including fine‑grained API permissions, flexible matching modes, and cluster‑wide access control—details the RBAC/ABAC model, authentication and authorization workflows, configuration examples, command‑line usage, and migration strategies, and discusses future planning for the access control system.

ACLAuthenticationAuthorization
0 likes · 24 min read
What’s New in RocketMQ ACL 2.0? A Deep Dive into Features, Architecture, and Configuration
MaGe Linux Operations
MaGe Linux Operations
Apr 14, 2024 · Fundamentals

Master Linux File Permissions: From chmod to ACL and umask

This guide explains Linux file permission concepts—including owner, group, and others permissions, numeric and symbolic representations, default settings, the role of umask, and advanced features like ACLs, special bits, and immutable attributes—while providing practical command examples for managing files and directories securely.

ACLFile PermissionsLinux
0 likes · 21 min read
Master Linux File Permissions: From chmod to ACL and umask
Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLDACRBAC
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Architect
Architect
Sep 4, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article details the design and development of a unified permission management service (MPS) that consolidates RBAC, ACL, and DAC models to solve fragmented enterprise permission issues, covering requirement analysis, technical selection, functional modules, deployment, and performance outcomes.

ACLDACGo
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
High Availability Architecture
High Availability Architecture
Aug 28, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article presents a comprehensive design and development of Baidu's Unified Permission Management Service (MPS), detailing its requirement analysis, technical selection, hybrid RBAC/ACL/DAC model, functional modules, implementation specifics, and operational results that demonstrate its effectiveness in consolidating enterprise-wide access control.

ACLDACRBAC
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLBackend DevelopmentBaidu
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
Su San Talks Tech
Su San Talks Tech
Jan 3, 2023 · Fundamentals

What Makes Apache ZooKeeper the Backbone of Distributed Coordination?

This article explains Apache ZooKeeper's role as a reliable distributed coordination service, covering its ZAB protocol, hierarchical data model, node types, watches, session management, ACLs, serialization, cluster architecture, leader election, ZAB algorithm, log cleanup, distributed locks, ID generation, load balancing, and real‑world integrations with Dubbo and Kafka.

ACLDistributed CoordinationZAB
0 likes · 49 min read
What Makes Apache ZooKeeper the Backbone of Distributed Coordination?
Open Source Linux
Open Source Linux
Aug 23, 2022 · Operations

Isolating Users in the Same VLAN and Enabling Partial VLAN Connectivity

This guide walks through three practical scenarios for VLAN isolation: using port isolation to separate users within the same VLAN, employing MUX VLAN to achieve selective inter‑VLAN communication and isolation, and applying ACL‑based flow policies to block specific VLANs or individual users while preserving overall connectivity.

ACLFlow PolicyMUX VLAN
0 likes · 8 min read
Isolating Users in the Same VLAN and Enabling Partial VLAN Connectivity
macrozheng
macrozheng
Aug 4, 2022 · Information Security

Mastering Access Control: 5 Core Permission Models Explained

This article introduces the design of permission systems and thoroughly explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—along with their principles, examples, drawbacks, and practical implementation details for real‑world applications.

ACLRBACSecurity
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models Explained
Code Ape Tech Column
Code Ape Tech Column
Jul 18, 2022 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the design of permission systems by introducing five major access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical implementation considerations for user, role, and permission management in enterprise applications.

ACLRBACaccess control
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Wukong Talks Architecture
Wukong Talks Architecture
May 7, 2022 · Backend Development

Basic Introduction to Apache ZooKeeper: Architecture, Data Model, Sessions, ACLs, and Cluster Mechanisms

This article provides a comprehensive overview of Apache ZooKeeper, covering its ZAB protocol, data model hierarchy, node types, storage mechanisms, watch system, session lifecycle, ACL configurations, serialization with Jute, cluster roles, leader election, log management, and practical use cases such as distributed locks, ID generation, load balancing, and integration with frameworks like Dubbo and Kafka.

ACLDistributed CoordinationZAB Protocol
0 likes · 46 min read
Basic Introduction to Apache ZooKeeper: Architecture, Data Model, Sessions, ACLs, and Cluster Mechanisms
Youku Technology
Youku Technology
Feb 28, 2022 · Artificial Intelligence

Seq2Path: Generating Sentiment Tuples as Paths of a Tree

Seq2Path treats each sentiment tuple as an independent tree path, training with average path loss and decoding via constrained beam search with a discriminative token, achieving state‑of‑the‑art results on five aspect‑based sentiment analysis datasets and deployment in Alibaba Entertainment AI Brain.

ACLBeam SearchInformation Extraction
0 likes · 3 min read
Seq2Path: Generating Sentiment Tuples as Paths of a Tree
Tencent Cloud Developer
Tencent Cloud Developer
Dec 3, 2021 · Cloud Native

Introducing RoP 0.2.0: Architecture Upgrade and New Features for RocketMQ on Pulsar

The article introduces RoP 0.2.0, a redesign of RocketMQ on Pulsar that eliminates message loss, duplicate consumption, and partial partition consumption, adds ACL authentication, partition expansion for higher throughput, native RocketMQ management APIs, refactors MessageID and routing models, and outlines future features such as tracing, delayed messages, and advanced monitoring.

ACLBrokerMetadataCloudNative
0 likes · 12 min read
Introducing RoP 0.2.0: Architecture Upgrade and New Features for RocketMQ on Pulsar
Ops Development Stories
Ops Development Stories
Nov 3, 2021 · Operations

Deploy BIND9 with chroot, ACL, and Views on CentOS 8

This guide walks through setting up BIND9 in a chroot environment, configuring ACLs and views for intelligent DNS routing, creating master and slave zones, and testing resolution on CentOS 8, providing a practical solution for secure and segmented DNS services.

ACLCentOSDNS
0 likes · 17 min read
Deploy BIND9 with chroot, ACL, and Views on CentOS 8
Meituan Technology Team
Meituan Technology Team
Aug 5, 2021 · Artificial Intelligence

Overview of Meituan's ACL 2021 Accepted Papers

Meituan’s 2021 ACL contributions comprise seven accepted papers—six long and one short—introducing novel approaches to event argument decoding, cross‑domain slot transfer, contrastive out‑of‑domain detection, novel slot discovery, self‑supervised sentence representation, unsupervised semantic parsing, and pseudo‑query‑enhanced dense retrieval, inviting further research and collaboration.

ACLEvent ExtractionMeituan
0 likes · 22 min read
Overview of Meituan's ACL 2021 Accepted Papers
Open Source Linux
Open Source Linux
Apr 16, 2021 · Operations

Mastering ZooKeeper: Core Concepts, Architecture, and Real‑World Use Cases

This comprehensive guide explains ZooKeeper’s role as a distributed coordination service, covering its consistency guarantees, Znode hierarchy, ZAB protocol, watcher mechanism, ACLs, server roles, data synchronization modes, deployment options, dynamic scaling, and typical use cases such as configuration management, service discovery, leader election, distributed locks and queues.

ACLDistributed CoordinationWatcher
0 likes · 23 min read
Mastering ZooKeeper: Core Concepts, Architecture, and Real‑World Use Cases
Architects' Tech Alliance
Architects' Tech Alliance
Jan 26, 2021 · Fundamentals

Understanding Network Switches: Definitions, Functions, Classifications, and Management Features

This article provides a comprehensive overview of network switches, covering their definition, MAC‑based operation, port expansion, classification by manageability and OSI layer, various management methods (Web, CLI, SNMP), product specifications, application scenarios, and key features such as VLAN, port isolation, aggregation, loop detection, ACL, ARP protection, DHCP services, and routing capabilities.

ACLDHCPLayer 2
0 likes · 9 min read
Understanding Network Switches: Definitions, Functions, Classifications, and Management Features
Architect's Tech Stack
Architect's Tech Stack
Aug 14, 2020 · Operations

ZooKeeper Interview Questions and Core Concepts

This article provides a comprehensive overview of ZooKeeper, covering its role as a distributed coordination service, consistency guarantees, ZAB protocol, Znode types, watcher mechanism, ACL permissions, chroot feature, session management, server roles, data synchronization, deployment modes, and typical use cases in distributed systems.

ACLConsistencyDistributed Coordination
0 likes · 19 min read
ZooKeeper Interview Questions and Core Concepts
Architects' Tech Alliance
Architects' Tech Alliance
Jun 11, 2020 · Operations

Understanding Switches: Functions, Types, and Management Techniques

This article provides a comprehensive overview of network switches, covering their definition, core functions, port and distance expansion, classification by manageability and OSI layer, various management methods (Web, CLI, SNMP), key features such as VLAN, ACL, routing, and practical deployment scenarios.

ACLNetworkingVLAN
0 likes · 10 min read
Understanding Switches: Functions, Types, and Management Techniques
Programmer DD
Programmer DD
May 3, 2020 · Databases

What’s New in Redis 6.0? Key Features and Improvements Explained

Redis 6.0.0 stable release brings major updates such as redesigned client‑side caching, immediate RDB deletion for replication, enhanced ACL logging, faster PSYNC2 partial resynchronization, decimal timeout support, up to 30% faster RDB loading, and a new STRALGO command for string algorithms.

ACLRDBReplication
0 likes · 3 min read
What’s New in Redis 6.0? Key Features and Improvements Explained
Youzan Coder
Youzan Coder
May 22, 2019 · Mobile Development

YouZan Mobile Testing Environment Switching Solution: VpnService + ZanProxy Implementation

YouZan’s Mobile Assistant combines Android VpnService (or iOS NetworkExtension) with the open‑source ZanProxy, using tun2socks‑based SOCKS5 tunneling, UUID‑based user isolation, and an ACL‑driven fake‑DNS scheme to replace complex Charles/hosts setups with a single‑click, certificate‑only, PC‑free environment‑switching solution supporting TCP, UDP, and WebSocket traffic.

ACLAndroid VpnServiceDNS
0 likes · 14 min read
YouZan Mobile Testing Environment Switching Solution: VpnService + ZanProxy Implementation
MaGe Linux Operations
MaGe Linux Operations
Oct 20, 2018 · Information Security

Master Linux ACL: Check, Set, Modify, and Backup File Permissions

This guide explains what Linux Access Control Lists (ACL) are, why they are useful, how to verify kernel support, and provides step‑by‑step commands and examples for setting, modifying, inheriting, deleting, and backing up ACL permissions on files and directories.

ACLAccess Control ListFile Permissions
0 likes · 10 min read
Master Linux ACL: Check, Set, Modify, and Backup File Permissions
21CTO
21CTO
Oct 3, 2018 · Operations

Master HAProxy: Configure ACLs, Backends, Frontends, and Stats in Minutes

This guide explains how to set up HAProxy, covering core concepts such as ACLs, backends, frontends, optional statistics, a complete configuration example, and step‑by‑step deployment on Linux, enabling you to quickly build a reliable load‑balancing proxy.

ACLHAProxyLinux
0 likes · 6 min read
Master HAProxy: Configure ACLs, Backends, Frontends, and Stats in Minutes
MaGe Linux Operations
MaGe Linux Operations
Mar 28, 2017 · Operations

Quick Guide to Setting Up FTP Virtual Users on CentOS

Learn how to swiftly create and configure FTP virtual users on a CentOS 6.5 system using vsftpd, covering installation, configuration files, PAM authentication, ACL permissions, and service startup, with step-by-step commands and essential tips for Linux administrators.

ACLCentOSFTP
0 likes · 5 min read
Quick Guide to Setting Up FTP Virtual Users on CentOS
Practical DevOps Architecture
Practical DevOps Architecture
Mar 2, 2017 · Operations

Sample Huawei Router Configuration Commands

This document provides a comprehensive set of Huawei router configuration commands covering system settings, SNMP, time, portal loading, security policies, ACL rules, user authentication, firewall zones, interface definitions, IP addressing, NAT, static routes, and user interface configurations.

ACLConfigurationNAT
0 likes · 4 min read
Sample Huawei Router Configuration Commands
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Feb 10, 2017 · Information Security

Securing Kafka with Kerberos and ACLs: A Practical Guide

This article explains Kafka's architecture, identifies its security vulnerabilities, and presents Transwarp's Kerberos authentication and ACL-based authorization solutions, including configuration steps, code examples, and best practices for building a secure Kafka service.

ACLKafkaKerberos
0 likes · 12 min read
Securing Kafka with Kerberos and ACLs: A Practical Guide
Practical DevOps Architecture
Practical DevOps Architecture
Mar 10, 2016 · Operations

Configuring ACLs to Isolate VLANs on S7706 (Layer 3)

This article explains how to use ACLs on a Huawei S7706 device to prevent inter‑VLAN communication at Layer 3 by defining separate ACL numbers for each VLAN pair and applying them with traffic‑filter commands on the inbound direction of each VLAN interface.

ACLHuawei S7706Layer 3
0 likes · 3 min read
Configuring ACLs to Isolate VLANs on S7706 (Layer 3)
Practical DevOps Architecture
Practical DevOps Architecture
Jun 15, 2015 · Information Security

Configuring NAT, ACL, and Static Routing on a Router

This guide demonstrates how to configure NAT with an ACL, set up internal and external interface IP addresses, define a default static route, and create an ACL‑based traffic policy to block specific internal hosts from accessing a given external IP address.

ACLNATRouter configuration
0 likes · 3 min read
Configuring NAT, ACL, and Static Routing on a Router
Qunar Tech Salon
Qunar Tech Salon
May 29, 2015 · Information Security

Implementing Network ACL for Memcached Using iptables

This article explains how to use Linux iptables to create network-level ACLs that block non-production IP ranges from accessing a Memcached server, providing command examples for adding, listing, and clearing firewall rules, and discusses future considerations such as IPv6 support.

ACLLinuxMemcached
0 likes · 5 min read
Implementing Network ACL for Memcached Using iptables
Practical DevOps Architecture
Practical DevOps Architecture
Apr 29, 2015 · Operations

Configuring Traffic Statistics on SwitchA and SwitchB

This guide shows how to configure traffic statistics on two switches by creating ACLs, traffic classifiers, behaviors, and policies, applying them to specific GigabitEthernet interfaces, and finally displaying the traffic policy statistics from the command line.

ACLOperationsnetwork
0 likes · 3 min read
Configuring Traffic Statistics on SwitchA and SwitchB