Tagged articles
12 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Feb 6, 2025 · Operations

Batch Delete Linux Users with UID ≥ 1000 Using awk and xargs

This guide explains how to identify Linux accounts whose UID is 1000 or higher by parsing /etc/passwd with awk, then pipe the resulting usernames to xargs to invoke userdel ‑r for safe, automated removal of those users and their home directories.

Batch DeleteLinuxShell
0 likes · 5 min read
Batch Delete Linux Users with UID ≥ 1000 Using awk and xargs
The Dominant Programmer
The Dominant Programmer
Nov 8, 2021 · Mobile Development

Read NFC Tag ID on Android to Use as Unique User Identifier

The article explains how to read an NFC card’s UID on Android, use it as a unique user identifier for login verification, and walks through required permissions, setting the activity launch mode to singleTop, designing the UI layout, handling NFC intents, converting the UID to a hex string, and debugging the implementation.

AndroidForeground DispatchIntent
0 likes · 8 min read
Read NFC Tag ID on Android to Use as Unique User Identifier
360 Quality & Efficiency
360 Quality & Efficiency
Jul 25, 2018 · Mobile Development

Testing Power Consumption of Push SDK on Mobile Devices

This article explains how to measure and analyze the power and network traffic consumption of a push SDK on Android devices, covering test preparation, the operations that generate power usage, methods to retrieve traffic data via ADB, script implementation, key testing points, encountered issues, and practical solutions.

Network TrafficUIDmobile testing
0 likes · 7 min read
Testing Power Consumption of Push SDK on Mobile Devices
360 Tech Engineering
360 Tech Engineering
Jun 28, 2018 · Information Security

Understanding Android Sandbox and Linux Permission Mechanisms

This article explains how Android inherits Linux's UID/GID based permission model, details the sandbox isolation for apps, describes how system and app processes obtain their UID/GID, and shows how adb shell and framework permissions grant extensive access to the device.

ADBAndroidGID
0 likes · 8 min read
Understanding Android Sandbox and Linux Permission Mechanisms