Tag

UID

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Feb 24, 2025 · Fundamentals

Understanding Linux Process Permissions: Real, Effective, and Saved UID Explained

This article explains how Linux processes inherit and manage user identities, detailing the roles of real, effective, and saved set user IDs, how they affect file access permissions, and demonstrates the execution flow of internal and external commands, including setuid examples.

LinuxUIDprocess permissions
0 likes · 12 min read
Understanding Linux Process Permissions: Real, Effective, and Saved UID Explained
360 Quality & Efficiency
360 Quality & Efficiency
Jul 25, 2018 · Mobile Development

Testing Power Consumption of Push SDK on Mobile Devices

This article explains how to measure and analyze the power and network traffic consumption of a push SDK on Android devices, covering test preparation, the operations that generate power usage, methods to retrieve traffic data via ADB, script implementation, key testing points, encountered issues, and practical solutions.

ADBMobile TestingUID
0 likes · 7 min read
Testing Power Consumption of Push SDK on Mobile Devices
360 Tech Engineering
360 Tech Engineering
Jun 28, 2018 · Information Security

Understanding Android Sandbox and Linux Permission Mechanisms

This article explains how Android inherits Linux's UID/GID based permission model, details the sandbox isolation for apps, describes how system and app processes obtain their UID/GID, and shows how adb shell and framework permissions grant extensive access to the device.

ADBAndroidGID
0 likes · 8 min read
Understanding Android Sandbox and Linux Permission Mechanisms