Tagged articles
6 articles
Page 1 of 1
Lin is Dream
Lin is Dream
May 29, 2025 · Operations

Why Should You Install Software as Root but Run It as a Non‑Root User?

The article explains that software on a server should be installed using the root account to place executables in system directories, while the actual processes should run under a non‑root user to limit privileges, and provides practical tips for configuring file permissions and avoiding security risks.

$rootNon-rootPermissions
0 likes · 4 min read
Why Should You Install Software as Root but Run It as a Non‑Root User?
Open Source Linux
Open Source Linux
Dec 19, 2023 · Operations

How to Securely Run Business Containers as Non‑Root: Practical Docker & Kubernetes Techniques

This article shares practical experience on converting business containers to run without root privileges, covering the importance of non‑root execution, essential security concepts, Dockerfile USER settings, entrypoint scripts, handling machine‑UUID access, and concrete examples for CoreDNS, Consul, MySQL, Redis, etc.

ENTRYPOINTNon-rootcontainer-security
0 likes · 18 min read
How to Securely Run Business Containers as Non‑Root: Practical Docker & Kubernetes Techniques
Liangxu Linux
Liangxu Linux
Dec 4, 2023 · Cloud Native

Running Business Containers as Non-Root: Practical Guide and Real-World Scripts

This article explains why running business containers without root privileges is essential for security, outlines the necessary background and risks, and provides detailed step‑by‑step methods, Dockerfile snippets, entrypoint scripts, and real‑world examples for MySQL, Redis, CoreDNS, Consul, and cAdvisor to achieve safe non‑root container deployments.

Container SecurityCoreDNSENTRYPOINT
0 likes · 16 min read
Running Business Containers as Non-Root: Practical Guide and Real-World Scripts
Open Source Linux
Open Source Linux
Jan 12, 2021 · Information Security

How to Secure Docker Images: Run as Non‑Root, Use Private Registries, and Minimize Attack Surface

This guide explains essential Docker security practices—including running containers as non‑root users, employing private registries, minimizing image size, using multi‑stage builds, and enabling Docker Content Trust—to reduce attack vectors and protect containerized applications.

Container SecurityDockerImage Hardening
0 likes · 11 min read
How to Secure Docker Images: Run as Non‑Root, Use Private Registries, and Minimize Attack Surface
Qizhuo Club
Qizhuo Club
Apr 27, 2018 · Mobile Development

Running Xposed Modules on Non‑Root Android: Virtualization & Hooking Guide

This article introduces the Xposed framework, explains its architecture and root‑based installation process, then explores alternative non‑root implementation methods using sandbox virtualization and Java hook techniques, detailing dual‑app virtualization, framework migration, and practical code examples for running Xposed modules on unrooted Android devices.

AndroidHookingMobile Development
0 likes · 8 min read
Running Xposed Modules on Non‑Root Android: Virtualization & Hooking Guide
Baidu Intelligent Testing
Baidu Intelligent Testing
Nov 3, 2017 · Mobile Development

Automating USB Debug Enabling on Non-Root Android Devices Using AccessibilityService

This article demonstrates how to automatically enable USB debugging on a non‑root Android phone after reboot by installing a high‑permission app that uses an AccessibilityService to detect the debug state, launch the developer options, and simulate user interactions to toggle the setting.

AccessibilityServiceAndroidMobile Development
0 likes · 7 min read
Automating USB Debug Enabling on Non-Root Android Devices Using AccessibilityService