Fayemi BoluwatifeforBovage's Blogbovage.hashnode.net·Feb 22, 2023Create Robust Access Control in Your Flask Application using Flask-login & PermifyIntroduction Access control is a popular mechanism used to protect and restrict access to resources and data in applications, networks, or organizations. As a result, it’s a really important concept in application security and privacy. Having been aw...Discuss·11 likes·44 readsFlask Framework
Kunal Mauryaforkunalmaurya.hashnode.net·Feb 28, 2023Day 6: File Permissions and Access Control ListsIn Linux, file permissions are a crucial aspect of ensuring that your files are secure and can only be accessed or modified by authorized users. In this blog, we will explain what file permissions are, how they work, and provide some examples to illu...Discuss·11 likes·70 readsfile-permission
Martin BbaaleforAirQo Engineeringairqoengineering.hashnode.net·Mar 28, 2023Role-based Access Control:In the world of IoT analytics platforms, data security is of utmost importance. With the growing number of connected devices and the increasing volume of data being generated, organizations must have the tools to manage and secure this information. O...Discuss·2 likes·29 readsInfrastructureaccess control
Martin BbaaleforAirQo Engineeringairqoengineering.hashnode.net·Apr 23, 2023Balancing Data Sharing and Privacy in Air Quality MonitoringThe need for sharing data in real time is essential for effective decision-making. However, the challenge lies in balancing data sharing with privacy concerns. The various fields we have on the AirQo devices schema, help in the management of the visi...Discussaccess control
Martin BbaaleforAirQo Engineeringairqoengineering.hashnode.net·Mar 28, 2023Role-based Access Control:In the world of IoT analytics platforms, data security is of utmost importance. With the growing number of connected devices and the increasing volume of data being generated, organizations must have the tools to manage and secure this information. O...Discuss·2 likes·29 readsInfrastructureaccess control
Prabhakar Yadavforprabhakar810.hashnode.net·Mar 6, 2023File Permissions and Access Control Lists#90DaysOfDevOps (1) Create a simple file and do ls -ltr to see the details of the files. Change the user permission of the file. (2)Write an article about File permissions in Linux. In Linux, Three types of users are there- owner-The owner of the ...Discuss·27 readsfile-permission
Kunal Mauryaforkunalmaurya.hashnode.net·Feb 28, 2023Day 6: File Permissions and Access Control ListsIn Linux, file permissions are a crucial aspect of ensuring that your files are secure and can only be accessed or modified by authorized users. In this blog, we will explain what file permissions are, how they work, and provide some examples to illu...Discuss·11 likes·70 readsfile-permission
Fayemi BoluwatifeforBovage's Blogbovage.hashnode.net·Feb 22, 2023Create Robust Access Control in Your Flask Application using Flask-login & PermifyIntroduction Access control is a popular mechanism used to protect and restrict access to resources and data in applications, networks, or organizations. As a result, it’s a really important concept in application security and privacy. Having been aw...Discuss·11 likes·44 readsFlask Framework
Sampath Kumar BasaforCloudnloud Tech Communitycloudnloud.hashnode.net·Jan 17, 2023New ML Governance Tools for Amazon SageMakerIntroduction As companies increasingly adopt machine learning (ML) for their business applications, they are looking for ways to improve governance of their ML projects with simplified access control and enhanced visibility across the ML lifecycle. A...Discuss·100 readsMLOPS Beginner SeriesMachine Learning
Wamaitha forWamaithawamaitha.hashnode.net·Dec 1, 2022How to Set Permission-based access on LinuxIn the previous article, we created a new user and enabled ssh key access to the user. This guide covers how to restrict access using permissions. Login as root To log in as root, retrieve the root password from Vultr on the specific instance. On ...Discuss·81 readsDevOpsLinux