Linux Capabilities Unraveled

In the traditional Unix world, the typical way to grant a command (executable file) the superuser (root) privileges is to enable the SUID bit and have it owned by root. Look at the permission of the ping command in Linux – it does *NOT* have the SUID bit set and yet is able to open a raw socket connection … curious to know more ???

Here is the link to the article:

Linux Capabilities Unraveled

Enjoy 🙂 !!!

Java Rules Engine – Drools :: Part 3

Here is the Part-3 of the series on the open source Java Rules Engine called Drools.

In this part, we will demonstrate two examples (that would be relevant in a typical enterprise environment) – one to showcase the situation of hierarchical decisions and the other to execute rules in parallel.

Here is the link to the article: Java Rules Engine – Drools :: Part 3

Enjoy 🙂 !!!