Tagged articles
15 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 12, 2026 · Information Security

Why Unknown Passengers Appear in Your 12306 Account and Can't Be Deleted

Recent reports show that many 12306 users suddenly find unfamiliar passengers listed in their account’s “frequent contacts” and are unable to remove them, a problem traced to third‑party ticketing apps that retain login credentials and expose personal data to misuse.

12306account securitycredential stuffing
0 likes · 8 min read
Why Unknown Passengers Appear in Your 12306 Account and Can't Be Deleted
Raymond Ops
Raymond Ops
Aug 10, 2025 · Information Security

Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques

This guide walks you through essential Linux security measures—including system account cleanup, password policies, command history restrictions, PAM authentication modules, sudo configuration, GRUB boot protection, weak‑password detection with John the Ripper, and network port scanning with nmap—to help you harden servers against unauthorized access and privilege escalation.

GRUBPassword policySudo
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques
MaGe Linux Operations
MaGe Linux Operations
Jan 30, 2025 · Information Security

Master Linux Account Security: PAM, sudo, GRUB Hardening & Weak Password Detection

This guide details comprehensive Linux security measures, including system account cleanup, password policies, command history limits, terminal auto‑logout, controlled use of the su command via PAM wheel module, PAM authentication fundamentals, sudo configuration, GRUB boot‑parameter protection, weak‑password detection with John the Ripper, and network port scanning techniques.

GRUBNetwork ScanningSudo
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, GRUB Hardening & Weak Password Detection
Liangxu Linux
Liangxu Linux
Jan 19, 2025 · Information Security

Hardening Linux Account Security: User Locks, Password Policies, PAM & Sudo

This guide explains how to secure Linux accounts by disabling logins, locking or deleting users, enforcing password expiration with chage, configuring PAM modules, restricting commands via sudo, protecting the GRUB bootloader, and performing controlled password‑cracking tests with John the Ripper.

GRUBJohn the RipperLinux
0 likes · 10 min read
Hardening Linux Account Security: User Locks, Password Policies, PAM & Sudo
IT Services Circle
IT Services Circle
Oct 21, 2024 · Information Security

Understanding Microsoft Account Fatigue Attacks and Security Recommendations

The article explains how fatigue attacks target Microsoft accounts by repeatedly sending login prompts, describes Microsoft's new numeric verification safeguard, and offers practical security measures such as changing passwords, using passkeys, switching to alternative authenticators, and updating the linked email to protect personal data.

Fatigue AttackMicrosoftPasskey
0 likes · 5 min read
Understanding Microsoft Account Fatigue Attacks and Security Recommendations
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Essential Linux Account Security: Disable Root, Harden Permissions, and Block Attacks

This guide details practical steps for securing Linux accounts, including disabling unnecessary super‑user accounts, enforcing strong password policies, locking critical files, restricting privileged commands, tightening file permissions, and configuring network and system settings to prevent spoofing, DoS, and SYN attacks.

InfoSecLinuxPassword policy
0 likes · 11 min read
Essential Linux Account Security: Disable Root, Harden Permissions, and Block Attacks
Open Source Linux
Open Source Linux
Apr 19, 2022 · Information Security

Ultimate Linux Server Security Checklist: Harden Accounts, Detect Rootkits, and Respond to Attacks

This comprehensive guide walks you through Linux server hardening—covering account and login security, remote access safeguards, file system protection, rootkit detection tools, and step‑by‑step incident response—to help you prevent breaches and recover swiftly if an attack occurs.

File PermissionsLinuxRootkit Detection
0 likes · 24 min read
Ultimate Linux Server Security Checklist: Harden Accounts, Detect Rootkits, and Respond to Attacks
Efficient Ops
Efficient Ops
Apr 5, 2021 · Information Security

Essential Linux Account Security & Intrusion Investigation Checklist

This guide explains how to secure Linux accounts, examine critical system files, use command‑line tools to monitor logins, detect suspicious activity, analyze logs, and investigate potential intrusions, providing practical steps for administrators to harden and audit their servers.

Linuxaccount securityintrusion detection
0 likes · 13 min read
Essential Linux Account Security & Intrusion Investigation Checklist
Liangxu Linux
Liangxu Linux
Jan 10, 2021 · Information Security

Essential Linux Account Security and Intrusion Detection Checklist

This guide provides a comprehensive, step‑by‑step walkthrough of Linux account security, user and shadow file inspection, login record analysis, process and startup script examination, cron job auditing, file integrity searches, and log‑based intrusion detection using practical commands and examples.

LinuxShell Commandsaccount security
0 likes · 17 min read
Essential Linux Account Security and Intrusion Detection Checklist
MaGe Linux Operations
MaGe Linux Operations
Dec 23, 2020 · Information Security

Essential Linux Account Security & Intrusion Detection Checklist

This guide details Linux account security fundamentals, including critical system files, user and privilege inspection commands, login monitoring, intrusion investigation techniques, startup script analysis, cron job auditing, file searching methods, process inspection, and log file examination to help secure and troubleshoot Linux servers.

LinuxShell Commandsaccount security
0 likes · 17 min read
Essential Linux Account Security & Intrusion Detection Checklist
Efficient Ops
Efficient Ops
Oct 27, 2020 · Information Security

How to Detect Account Security Threats Using Log Analysis and Alerts

This article explains practical methods for detecting account security threats—such as blacklisted, expired, or abnormal login behaviors—by analyzing Linux and Windows login logs, defining detection rules, and leveraging automated tools to generate timely alerts and reduce security risks.

Threat Detectionaccount securityincident response
0 likes · 27 min read
How to Detect Account Security Threats Using Log Analysis and Alerts
JD Tech Talk
JD Tech Talk
Mar 16, 2020 · Artificial Intelligence

JD Digits' Self‑Developed Intelligent Anti‑Fraud Platform and AI‑Powered Account Security Guarantee

JD Digits explains how its AI‑driven anti‑fraud platform, featuring automatic adversarial machine learning and graph neural networks, underpins a new one‑million‑yuan account security guarantee that proactively protects users from invisible financial fraud while improving the overall user experience.

AIGraph Neural Networkaccount security
0 likes · 10 min read
JD Digits' Self‑Developed Intelligent Anti‑Fraud Platform and AI‑Powered Account Security Guarantee
Tencent Cloud Developer
Tencent Cloud Developer
Dec 18, 2018 · Information Security

Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing

Designing a relatively secure account system requires integrating strong multi-factor authentication, fine-grained authorization models like RBAC or ABAC, and continuous real-time and offline auditing to mitigate breaches, while recognizing that absolute security is impossible and ongoing vigilance is essential.

AuthenticationAuthorizationaccess control
0 likes · 17 min read
Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing