Mar 25 · 8 min read · When you're running Claude Code across multiple Linux user accounts and hit EACCES: permission denied, the solution isn't just chmod 777. This is the complete troubleshooting journey from error to production-ready multi-user architecture. The Problem...
Join discussionMar 13 · 10 min read · If you've ever had to manually enable or disable a batch of user accounts in Microsoft Entra ID, for example, a group of exam accounts at the start or end of term, you'll know how quickly it becomes t
Join discussion
Jan 1 · 14 min read · Linux file permissions are a double‑edged weapon. When used correctly, they provide a fundamental security layer; when misconfigured, they often become one of the earliest and most critical attack surfaces in Unix‑like systems. In real‑world attacks,...
Join discussion
Jan 1 · 7 min read · If authorization in Django feels confusing, a big reason is that permissions often get described as if they do work. They don’t. A Django permission is not a rule engine. It is not a policy. It is not an authorization decision. It is simply a named c...
Join discussion
Dec 19, 2025 · 3 min read · You download a simple flashlight app.Suddenly it wants access to your contacts, location, microphone, and photos. You pause for a second…Why does a flashlight need to know where I am? You shrug and tap “Allow” because you want the app to work. And ju...
Join discussion
Oct 24, 2025 · 18 min read · Personal notes As usual, this article was born because I took the “Introduction to Linux (LFS101)” course from the Linux Foundation. At first, I took this course because I have an upcoming technical interview for a Cloud Development Engineer position...
Join discussion
Oct 23, 2025 · 6 min read · Permissions in Unix are an integral part of the operating system. You can see the details of all files in the current directory by using options -l and -a combinedly with ls command: ls -al Every file has an owner (also referred to as the user), a g...
Join discussionOct 14, 2025 · 4 min read · Managing permissions across multiple projects is one of those tasks that starts small and quickly becomes a maintenance nightmare. Every new feature means updating permission strings in the backend, frontend, and sometimes admin tools — all manually....
Join discussion
Sep 2, 2025 · 5 min read · Quick Summary This article is an introduction and exploration of various types of Access Control solutions for a web application. Including the backend strategy and the frontend handling. It is not a tutorial post. We are briefly touching upon the op...
Join discussion