Tagged articles
9 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Dec 29, 2025 · Information Security

7 Proven Ways to Harden SSH and Block Brute‑Force Attacks

A senior operations engineer shares seven battle‑tested techniques—including port masking, key‑based authentication, Fail2ban, IP whitelisting, connection limits, two‑factor authentication, and a honeypot—to dramatically reduce SSH brute‑force attacks and protect critical servers.

2FAFail2banSSH
0 likes · 13 min read
7 Proven Ways to Harden SSH and Block Brute‑Force Attacks
IT Services Circle
IT Services Circle
Sep 27, 2025 · Information Security

GitHub’s New Moves to Harden npm Supply‑Chain Security

The article examines recent supply‑chain attacks on the front‑end ecosystem, explains pnpm’s cooling‑off feature, and details GitHub’s multi‑layered plan—including mandatory 2FA, package signing, backend refactoring, and automatic detection—to transform the time gap of attacks into a difficulty gap, while acknowledging the added overhead for maintainers.

2FAGitHubSupply Chain
0 likes · 5 min read
GitHub’s New Moves to Harden npm Supply‑Chain Security
Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 17, 2024 · Information Security

Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks

After a night-time SMS spam attack that cost 400 RMB, the team analyzed the breach, evaluated various captcha methods—including text, slider, reCAPTCHA v2/v3, and 2FA—implemented temporary throttling, and ultimately adopted a combined reCAPTCHA and two‑factor authentication approach to strengthen account security.

2FACaptchaSMS attack
0 likes · 8 min read
Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks
Programmer DD
Programmer DD
Sep 25, 2023 · Information Security

How to Bypass Missing China Option and Enable GitHub 2FA Easily

This guide explains why GitHub’s 2FA setup may lack a China option, shows a JavaScript workaround that no longer works, and details the reliable method of completing verification using authenticator apps and a QR code.

2FAAuthenticator AppsGitHub
0 likes · 3 min read
How to Bypass Missing China Option and Enable GitHub 2FA Easily
php Courses
php Courses
Jul 12, 2021 · Information Security

Implementing Google Authenticator 2FA in PHP (ThinkPHP 6)

This tutorial explains how to download, configure, and use the PHP GoogleAuthenticator class for two‑factor authentication in a ThinkPHP 6 environment, including code examples for generating secrets, QR‑code URLs, storing them, and verifying user tokens.

2FAAuthenticationGoogle Authenticator
0 likes · 9 min read
Implementing Google Authenticator 2FA in PHP (ThinkPHP 6)
Sohu Tech Products
Sohu Tech Products
Nov 6, 2019 · Information Security

Evolution of Web Authentication: From Passwords to WebAuthn

This article reviews the historical development, current practices, and future direction of web authentication, covering traditional password login, third‑party protocols like OpenID and OAuth2.0, two‑factor authentication methods, and the emerging password‑less WebAuthn standard.

2FAOAuth2.0OpenID
0 likes · 12 min read
Evolution of Web Authentication: From Passwords to WebAuthn