Debajyati Deydebajyatidey.hashnode.dev·Apr 28, 2024Demystifying Same Origin Policy in Simple WordsAccording to MDN Web Docs, - The same-origin policy is a critical security mechanism that restricts how a document or script loaded by one origin can interact with a resource from another origin. If you are a web developer or someone learning node....Sam Maji and 1 other are discussing this2 people are discussing thisDiscuss·30 likes·63 readsJavaScriptGreat article. Clear, consise and easy to understand. 6
Debajyati Deydebajyatidey.hashnode.dev·Apr 28, 2024Demystifying Same Origin Policy in Simple WordsAccording to MDN Web Docs, - The same-origin policy is a critical security mechanism that restricts how a document or script loaded by one origin can interact with a resource from another origin. If you are a web developer or someone learning node....Sam Maji and 1 other are discussing this2 people are discussing thisDiscuss·30 likes·63 readsJavaScriptGreat article. Clear, consise and easy to understand. 6
Nilkanth Mistrynilkanth1010.hashnode.dev·Apr 11, 2024Day 37 - Mastering Kubernetes Interview Questions! 💡🚀What is Kubernetes and why it is important? 🚀 🌟 Kubernetes is an open-source container orchestration platform designed to automate the deployment, scaling, and management of containerized applications. It simplifies the management of complex appli...Discuss90 Days Of Devops ChallengesDevops
Kiran ReddyforDatabricks - PySparkdatabricks-pyspark-blogs.hashnode.dev·Apr 2, 2024Navigating Unity's Catalog: Storage Credentials and External LocationsIntroduction Unity's catalog is a vital component for managing assets, resources, and data within Unity projects. As projects scale in complexity, efficient management of storage becomes crucial. Unity provides functionalities for handling storage cr...Discuss·10 likesDatabricks
Michael QuigleyforOpenZiti Tech Blogblog.openziti.io·Mar 28, 2024zrok Permission Modeszrok is a powerful platform for sharing. The latest releases of zrok allow you to get granular about which other zrok accounts are allowed to privately access your shares. In all current zrok versions, the zrok share private command will allocate an ...Discuss·49 readszrokzrok
Devbrat Singhcloudwithdev.hashnode.dev·Mar 8, 2024#90DaysOfDevOps Challenge - Day 6 - File Permissions and Access Control ListsWelcome to Day 6 of the #90DaysOfDevOps challenge. Today, we will explore file permissions and Access Control Lists (ACLs). Understanding file permissions is crucial for managing access to files and directories in a Linux system, ensuring security an...DiscussDay6
rafna bashrafna.hashnode.dev·Mar 6, 2024Authorization - a priori access controlThe authorization happens when a user requests an action to an application before actually executing the action. You check by the access control rules that hold whether this user should be permitted to do this action. As we have dipped our feet in au...DiscussWeb Development
Dev Kheradiyadevkheradiya.hashnode.dev·Mar 1, 2024Sitecore Dashboard: Your Definitive Guide for BeginnersIn my previous blog, you gained knowledge about what a CMS is and what Sitecore is. So, in this blog, we will understand the different features that are present in the Sitecore dashboard. Above is an image of the Sitecore dashboard, which includes fi...Discuss·77 readsSitecoreSitecore
Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·Feb 29, 2024Improving Security: Unveiling the Essentials of Identity and Access Management (IAM)In today's interconnected digital landscape, safeguarding business resources and assets is paramount. Identity and Access Management (IAM) stands at the forefront of security practices, offering a comprehensive framework of policies, procedures, and ...DiscussIAM
Syket BhattachergeeforCreoWis Blogcreowis.com·Feb 26, 2024Keycloak: Your Key to Secure Access Control (and Why You Need It)Imagine your office building. Each employee has a keycard that grants them access to specific areas, right? In the digital world, Keycloak plays a similar role. It's a powerful authorization server that acts as the gatekeeper, controlling who can acc...Discusskeycloak
Darvesh Chauhandarvesh29.hashnode.dev·Feb 14, 2024Day 6: Understanding Linux File Permissions and Access Control ListsIntroduction In the domain of Linux, understanding file permissions and ownership is paramount for effective system administration and security management. In this blog , we'll dig deep into the concepts of file permissions, ownership, and access con...Discuss·1 like90DaysOfDevOps#90daysofdevops