Tagged articles
132 articles
Page 2 of 2
MaGe Linux Operations
MaGe Linux Operations
Jun 18, 2020 · Databases

Master MongoDB Permissions: From Basic Users to Super Admins

This guide explains MongoDB permission levels, clarifies common misconceptions, and provides step‑by‑step commands to create ordinary, administrative, authorization, and super‑admin users, enable authentication, and verify read/write access across multiple databases.

Database SecurityMongoDBPermissions
0 likes · 7 min read
Master MongoDB Permissions: From Basic Users to Super Admins
Qunar Tech Salon
Qunar Tech Salon
Sep 25, 2019 · Mobile Development

Understanding the Core Principles of APK Installation on Android

This article explains how Android parses the AndroidManifest, assigns UID and updates permissions during APK installation, covering system boot installation, PMS‑driven third‑party, ADB and Market installations, and provides code snippets to illustrate the underlying mechanisms.

APKAndroidInstallation
0 likes · 14 min read
Understanding the Core Principles of APK Installation on Android
DevOps Cloud Academy
DevOps Cloud Academy
Sep 8, 2019 · Operations

Jenkins User, Credential, and Permission Management Guide

This guide explains how to configure Jenkins user management, credential storage, and permission settings, covering entry points, LDAP/GitLab integration, credential types, and role-based access control with detailed steps and visual illustrations for administrators.

JenkinsOperationsPermissions
0 likes · 4 min read
Jenkins User, Credential, and Permission Management Guide
DevOps Cloud Academy
DevOps Cloud Academy
Apr 6, 2019 · Operations

Chapter 3: Managing Jenkins – Users, Credentials, and Permissions

This guide explains how to configure Jenkins user accounts, manage credentials for secure storage, and control access permissions using role‑based strategies, covering viewing, creating, updating, and deleting users and credentials as well as assigning global, project, and node roles.

DevOpsJenkinsPermissions
0 likes · 4 min read
Chapter 3: Managing Jenkins – Users, Credentials, and Permissions
Sohu Tech Products
Sohu Tech Products
Mar 20, 2019 · Mobile Development

Comprehensive Guide to Android Permissions: Types, Groups, Dynamic Mechanisms and Compatibility Solutions

This article provides an in‑depth overview of Android permission architecture, covering permission categories, permission groups, the evolution of permission handling across API levels, special system permissions, custom permissions, common compatibility pitfalls on various OEM ROMs, and a unified design for dynamic permission requests.

AndroidDynamic PermissionMobile Development
0 likes · 19 min read
Comprehensive Guide to Android Permissions: Types, Groups, Dynamic Mechanisms and Compatibility Solutions
Efficient Ops
Efficient Ops
Jan 28, 2019 · Fundamentals

Master Linux Command Line: Essential Commands, File Management, and Permissions

This guide walks through essential Linux command‑line skills, covering simple commands, OS partition concepts, root directory files, directory and file operations, user/group management, vi editor modes, permission settings, common utilities, pipes, find, soft and hard links, cron scheduling, ownership changes, and CD‑ROM mounting.

LinksLinuxPermissions
0 likes · 8 min read
Master Linux Command Line: Essential Commands, File Management, and Permissions
Tencent Cloud Developer
Tencent Cloud Developer
Aug 27, 2018 · Mobile Development

WeChat Mini Program Cloud Development: Overview, Advantages, and Common Pitfalls

WeChat Mini Program Cloud Development offers a serverless backend—cloud functions, database, and file storage—exclusively for Mini Programs, providing simple login, generous free tiers, and easy JavaScript integration, while developers must handle promises for async calls and supplement its limited permission model with custom logic.

FaaSJavaScriptPermissions
0 likes · 7 min read
WeChat Mini Program Cloud Development: Overview, Advantages, and Common Pitfalls
360 Tech Engineering
360 Tech Engineering
Jun 28, 2018 · Information Security

Understanding Android Sandbox and Linux Permission Mechanisms

This article explains how Android inherits Linux's UID/GID based permission model, details the sandbox isolation for apps, describes how system and app processes obtain their UID/GID, and shows how adb shell and framework permissions grant extensive access to the device.

ADBAndroidGID
0 likes · 8 min read
Understanding Android Sandbox and Linux Permission Mechanisms
21CTO
21CTO
Apr 28, 2018 · Operations

Mastering sudo: 5 Real-World Scenarios to Elevate Your Linux Permissions

This guide walks through five common sudo use‑cases on Linux—granting temporary root rights, fixing forgotten sudo in vim, re‑executing commands with sudo, handling shell built‑ins, and configuring sudo logging—providing clear examples and configuration tips for system administrators.

LinuxPermissionsShell
0 likes · 7 min read
Mastering sudo: 5 Real-World Scenarios to Elevate Your Linux Permissions
ITPUB
ITPUB
Apr 26, 2018 · Operations

Mastering sudo: 5 Real‑World Scenarios to Elevate Your Linux Permissions

This guide walks through five common sudo use‑cases on Linux—granting temporary root rights, fixing permission errors in vim, recalling forgotten sudo, handling shell built‑ins, and configuring sudo logging—providing clear examples, configuration snippets, and practical tips for system administrators.

LinuxPermissionsSudo
0 likes · 8 min read
Mastering sudo: 5 Real‑World Scenarios to Elevate Your Linux Permissions
MaGe Linux Operations
MaGe Linux Operations
Jan 24, 2018 · Operations

Master Essential Linux Administration: 20+ Key Topics and Practical Answers

This guide provides concise explanations and step‑by‑step instructions for fundamental Linux administration topics, covering licensing, OS selection, startup services, system optimization, runlevels, boot process, links, partitioning, file deletion, VI usage, user management, regex, sed, crontab, important directories, shutdown commands, sudoers, permission hierarchy, SecureCRT shortcuts, audit solutions, network troubleshooting, quoting rules, startup config files, log locations, IP address extraction, and a curated list of essential Linux commands.

LinuxPermissionsShell
0 likes · 27 min read
Master Essential Linux Administration: 20+ Key Topics and Practical Answers
Architecture Digest
Architecture Digest
Jan 2, 2018 · Information Security

Understanding the Essence of Permissions: Resources, Access, and Authorization Models

This article explains the fundamental nature of permissions as limited licensed access to protected resources, defines what constitutes a resource in software, outlines resource identification and limitation, and describes permission classifications, control models, and authorization mechanisms such as role‑based access.

AuthorizationPermissionsResource Management
0 likes · 7 min read
Understanding the Essence of Permissions: Resources, Access, and Authorization Models
Baidu Intelligent Testing
Baidu Intelligent Testing
Sep 8, 2017 · Mobile Development

Android OEM ROM Features and Their Impact on App Testing

This article provides a comprehensive overview of the distinctive Android ROM customizations from major Chinese manufacturers—Huawei, OPPO, VIVO, Xiaomi, and Meizu—as well as key changes in Android versions 4.0 to 7.0, explaining how each feature affects app compatibility, permission handling, power management, and testing strategies.

AndroidMobileOEM
0 likes · 16 min read
Android OEM ROM Features and Their Impact on App Testing
Baidu Intelligent Testing
Baidu Intelligent Testing
Sep 7, 2017 · Mobile Development

Overview of Android System Features and Testing Tools

This article provides a comprehensive guide to Android system features relevant to testing, covering common functions like app management, developer options such as USB debugging and various adb commands, process statistics, visual debugging tools, and the handling of normal, dangerous, and special permissions.

ADBAndroidDeveloper Options
0 likes · 12 min read
Overview of Android System Features and Testing Tools
21CTO
21CTO
Aug 30, 2017 · Databases

9 Classic MySQL Errors and How to Fix Them

This article presents nine classic MySQL error cases—from connection limits and replication conflicts to installation permission issues, forgotten passwords, auto‑increment resets, character‑set garbling, binlog misconfiguration, timeout problems, and file‑open limits—each accompanied by clear diagnosis steps and practical solutions.

Character SetDatabase ErrorsPermissions
0 likes · 16 min read
9 Classic MySQL Errors and How to Fix Them
ITPUB
ITPUB
Nov 14, 2016 · Databases

How to Create, Manage, and Revoke MySQL Users and Permissions

This guide explains multiple methods for creating MySQL users, deleting them, assigning granular permissions, revoking privileges, and understanding when permission changes take effect, complete with command examples and a comprehensive list of MySQL privilege types.

PermissionsSQLUser Management
0 likes · 9 min read
How to Create, Manage, and Revoke MySQL Users and Permissions
MaGe Linux Operations
MaGe Linux Operations
Aug 3, 2016 · Fundamentals

Master Linux File Permissions: From chmod to umask Explained

This article explains the importance of Linux file and directory permissions, details how permission bits work, demonstrates using octal and symbolic notation with chmod, chown, and chgrp, and shows how umask determines default permissions for newly created files and directories.

LinuxPermissionschmod
0 likes · 15 min read
Master Linux File Permissions: From chmod to umask Explained
ITPUB
ITPUB
Jun 20, 2016 · Databases

Why Any MySQL User Can Access test* Databases and How to Fix It

This article explains that MySQL’s default mysql.db entries grant every user full privileges on databases named test or starting with test_, demonstrates the issue with a read‑only account, and shows how deleting those rows removes the unintended access.

Database SecurityPermissionsmysql
0 likes · 6 min read
Why Any MySQL User Can Access test* Databases and How to Fix It
ITPUB
ITPUB
Jun 14, 2016 · Databases

Why SQL Server 2005 Schemas Change Permissions and How They Benefit You

The article explains how SQL Server 2005 introduced schemas as separate namespaces, altering table ownership and permission rules compared to SQL Server 2000, and outlines the advantages such as role‑based access, easier user removal, default schema sharing, finer permission control, and business‑specific object organization.

PermissionsSQL ServerSQL2005
0 likes · 5 min read
Why SQL Server 2005 Schemas Change Permissions and How They Benefit You
dbaplus Community
dbaplus Community
May 4, 2016 · Databases

What I Learned From My First DBA Tablespace Rescue and Migration

A DBA intern recounts a real‑world Oracle tablespace failure, the challenges of resizing a BIGFILE tablespace, disk‑space shortages, permission errors during data‑file migration, and the key lessons about communication, analysis, and preparation for future production incidents.

DBAOraclePermissions
0 likes · 11 min read
What I Learned From My First DBA Tablespace Rescue and Migration