Tagged articles
33 articles
Page 1 of 1
Java Architect Essentials
Java Architect Essentials
May 19, 2026 · Backend Development

Why Storing Tokens in Redis Is the Right Answer in Interviews

The article explains why many interviewers mock the Redis‑based token design, then systematically presents technical and security reasons—controllable logout, multi‑device SSO, high performance, dynamic permissions—and provides concrete implementation details, comparison with pure JWT, and best‑practice responses.

AuthenticationBackend SecurityJWT
0 likes · 6 min read
Why Storing Tokens in Redis Is the Right Answer in Interviews
php Courses
php Courses
Jan 8, 2026 · Backend Development

Secure PHP Password Storage: md5, password_hash, and crypt Explained with Code

This guide walks through three common PHP password‑hashing techniques—md5, password_hash (BCrypt), and crypt—showing complete registration and login code samples, highlighting security drawbacks of md5 and recommending stronger, salted hashing for safe user authentication.

Backend SecurityMD5crypt
0 likes · 5 min read
Secure PHP Password Storage: md5, password_hash, and crypt Explained with Code
Top Architect
Top Architect
Nov 17, 2025 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models

This article explains why strict permission management is essential for data security, walks through the evolution of access‑control models—from simple user‑permission tables to classic RBAC, RBAC1, RBAC2, role inheritance, constraints, user groups, organizational mapping, and finally presents ideal database schemas for scalable, maintainable permission systems.

Backend SecurityRBACRole Inheritance
0 likes · 18 min read
Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models
Java Tech Enthusiast
Java Tech Enthusiast
Jul 23, 2025 · Backend Development

Why a Username of "null" Can Break Your System and How to Prevent It

The article explains how using the literal string "null" as a username can confuse users, cause debugging nightmares, introduce security risks, and break data consistency, and it provides concrete Java validation code to reject such illegal inputs before they reach the backend.

Backend Securityinput sanitizationnull string
0 likes · 7 min read
Why a Username of "null" Can Break Your System and How to Prevent It
IT Services Circle
IT Services Circle
Jul 4, 2025 · Backend Development

Why Using "null" as a Username Can Break Your System and How to Prevent It

The article explains how treating the literal string "null" as a valid username leads to user confusion, debugging nightmares, security risks, and data inconsistencies, and provides practical validation techniques and code examples to safely reject such illegal inputs in backend systems.

Backend Securityinput sanitizationnull string
0 likes · 7 min read
Why Using "null" as a Username Can Break Your System and How to Prevent It
IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules

This article explains how to protect systems from massive malicious traffic reaching millions of queries per second by combining gateway rate limiting, distributed circuit breaking, device fingerprinting, behavior analysis, dynamic rule engines, and real‑time risk scoring, illustrated with Nginx‑Lua, Sentinel, Drools, and Flink examples.

Backend SecurityDDoS mitigationdevice fingerprinting
0 likes · 15 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules
Code Ape Tech Column
Code Ape Tech Column
Mar 8, 2025 · Information Security

Enterprise Data Desensitization Solutions Using MyBatis and Fastjson

The article explains why data desensitization is essential for enterprises, classifies common masking techniques, and provides concrete implementation guides for database, log, and output level masking in Java applications using MyBatis plugins and Fastjson filters, complete with sample code and configuration.

Backend SecurityJavaMyBatis
0 likes · 12 min read
Enterprise Data Desensitization Solutions Using MyBatis and Fastjson
macrozheng
macrozheng
Feb 27, 2025 · Information Security

Master One-Time Token Login with Spring Security 6.4: A Step-by-Step Guide

This guide explains Spring Security 6.4’s one-time token login feature, covering its concept, authentication flow, core components, and step‑by‑step implementation with code samples, enabling developers to add secure magic‑link authentication to Spring Boot applications.

Backend SecurityMagic LinkSpring Boot
0 likes · 7 min read
Master One-Time Token Login with Spring Security 6.4: A Step-by-Step Guide
Selected Java Interview Questions
Selected Java Interview Questions
Feb 25, 2024 · Information Security

Custom Authorization Annotations in Spring Security: Design, Implementation, and Usage

This article explores how to create and use custom authorization annotations in Spring Security to achieve more flexible, expressive, and maintainable permission checks, covering the basics of Spring Security, advantages of custom annotations, step‑by‑step implementation, and additional use‑case scenarios.

Backend SecurityCustom AnnotationJava
0 likes · 9 min read
Custom Authorization Annotations in Spring Security: Design, Implementation, and Usage
Code Ape Tech Column
Code Ape Tech Column
Dec 11, 2023 · Information Security

Design and Implementation of a Lightweight Maven Jar Encryption and Agent‑Based Decryption Solution for Java IP Protection

This article examines common Java jar obfuscation tools, identifies their limitations for protecting both proprietary code and third‑party dependencies, and proposes a lightweight Maven‑based encryption combined with a runtime agent that decrypts classes on demand while keeping performance impact under five percent.

AgentBackend SecurityIP Protection
0 likes · 9 min read
Design and Implementation of a Lightweight Maven Jar Encryption and Agent‑Based Decryption Solution for Java IP Protection
Architect
Architect
Oct 24, 2023 · Information Security

How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide

This article walks through the theory behind RSA, illustrates two battlefield‑style scenarios for encryption and signing, and then shows how to integrate RSA‑based request/response encryption into a Spring Boot application using Maven, annotations, configuration files, and a JavaScript front‑end, complete with code snippets and troubleshooting tips.

Backend SecurityJavaRSA
0 likes · 12 min read
How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide
Java High-Performance Architecture
Java High-Performance Architecture
Oct 17, 2023 · Information Security

Secure Your Spring Boot APIs with RSA: A Hands‑On Encryption & Decryption Guide

This article walks you through implementing RSA‑based encryption and digital signatures in a Spring Boot application, covering the theory of asymmetric cryptography, practical code snippets for Maven, configuration, controller annotations, and a JavaScript client that encrypts requests and verifies responses to protect API data from eavesdropping and tampering.

Backend SecurityJavaRSA
0 likes · 11 min read
Secure Your Spring Boot APIs with RSA: A Hands‑On Encryption & Decryption Guide
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2023 · Backend Development

Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow

This article explains Spring Security's core functions, underlying filter‑based mechanism, various request‑access control methods, the distinction between hasRole and hasAuthority, how to encrypt passwords with BCryptPasswordEncoder, and the complete username‑password authentication process for securing backend applications.

AuthenticationAuthorizationBackend Security
0 likes · 10 min read
Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow
ITPUB
ITPUB
Dec 5, 2022 · Information Security

Extending RBAC with Fine-Grained Data Permissions Using AOP

This article explains how to augment the classic Role‑Based Access Control (RBAC) model with row‑level data permissions, detailing rule definition, database design, role‑rule binding, and an AOP‑based implementation for dynamic SQL filtering.

Backend SecurityData PermissionRBAC
0 likes · 8 min read
Extending RBAC with Fine-Grained Data Permissions Using AOP
MaGe Linux Operations
MaGe Linux Operations
Aug 13, 2022 · Information Security

Unveiling WebCrack: Automated Bulk Weak‑Password and Universal‑Password Cracking for Web Backends

When security testers need to scan thousands of web back‑ends for weak or universal passwords, WebCrack provides a fast, generic solution that automatically identifies login parameters, evaluates login success, applies dynamic dictionaries, rechecks results, and supports custom rules for a wide range of CMS platforms.

Backend SecurityCMS EnumerationWebCrack
0 likes · 9 min read
Unveiling WebCrack: Automated Bulk Weak‑Password and Universal‑Password Cracking for Web Backends
Code Ape Tech Column
Code Ape Tech Column
Jun 23, 2022 · Backend Development

Encrypting Spring Boot Configuration Files with jasypt-spring-boot

This guide explains how to protect sensitive Spring Boot configuration data by integrating the open‑source jasypt‑spring‑boot plugin, covering dependency addition, secret key setup, encryption of plaintext values, and customizing encrypted property syntax for seamless decryption at runtime.

Backend SecurityConfiguration EncryptionJasypt
0 likes · 5 min read
Encrypting Spring Boot Configuration Files with jasypt-spring-boot
Java Backend Technology
Java Backend Technology
Apr 2, 2022 · Information Security

How I Reproduced the Massive Spring RCE Vulnerability (CVE-2022-22965)

This article details the discovery, official announcement, prerequisite conditions, and step‑by‑step reproduction of the critical Spring Framework remote code execution vulnerability (CVE‑2022‑22965), including exploit payloads, JSP backdoor creation, and practical mitigation insights.

Backend SecurityCVE-2022-22965Exploit
0 likes · 10 min read
How I Reproduced the Massive Spring RCE Vulnerability (CVE-2022-22965)
转转QA
转转QA
Apr 1, 2022 · Information Security

Design and Implementation of the Cleaner Anti‑Crawler System for Real‑Time Bot Detection

This article presents a comprehensive design of the Cleaner anti‑crawler system, detailing its background, current challenges, related research, system architecture—including a Flink‑based data processing center, a strategy‑driven ban center, and a lightweight ban store—and evaluates its effectiveness in real‑time bot mitigation.

Backend Securityanti‑crawlerrate limiting
0 likes · 17 min read
Design and Implementation of the Cleaner Anti‑Crawler System for Real‑Time Bot Detection
Programmer DD
Programmer DD
Nov 14, 2021 · Information Security

Deep Dive into Spring Authorization Server: Configuring OAuth2 Filters

This article explains the modular configuration of Spring Security's OAuth2 components, showcases the core config classes for client, resource, and authorization servers, and details the default filter chain and customizable filter configurers used by Spring Authorization Server.

Backend SecurityJavaOAuth2
0 likes · 7 min read
Deep Dive into Spring Authorization Server: Configuring OAuth2 Filters
Java Architect Essentials
Java Architect Essentials
Oct 19, 2021 · Backend Development

Encrypting Spring Boot Configuration Files with Jasypt

This article explains how to secure sensitive Spring Boot configuration properties such as database credentials by integrating the Jasypt library, configuring encryption keys, generating encrypted values through test code, and applying the encrypted strings in application.yml, including deployment‑time salt handling for enhanced security.

Backend SecurityConfiguration EncryptionDevOps
0 likes · 5 min read
Encrypting Spring Boot Configuration Files with Jasypt
Code Ape Tech Column
Code Ape Tech Column
Jun 18, 2021 · Information Security

Mastering RBAC: From Basic Models to Advanced Permission Architectures

This article explains the fundamentals of permission management, detailing the classic RBAC0 model and its extensions RBAC1‑RBAC3, and explores how roles, users, groups, organizations, and positions interrelate in both single‑system and distributed micro‑service architectures, including practical table designs and framework options.

AuthorizationBackend SecurityMicroservices
0 likes · 12 min read
Mastering RBAC: From Basic Models to Advanced Permission Architectures
Top Architect
Top Architect
Oct 2, 2020 · Information Security

Designing Simple API Authentication for Internal Services

The article explores practical approaches for authenticating internal service APIs, comparing plain token usage, IP whitelisting, and salted signature schemes with timestamps, and explains their implementation details, security trade‑offs, and suitability for a B2B cloud‑operated platform.

API authenticationBackend SecurityIP whitelist
0 likes · 7 min read
Designing Simple API Authentication for Internal Services
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Sep 24, 2020 · Information Security

Permission System Design and RBAC Implementation Practice in Backend Applications

The article explains permission system fundamentals, classifies page, function, and data permissions, compares DAC, MAC, RBAC, and ABAC models, details RBAC variants, and demonstrates a practical Egg framework plugin implementation that configures roles, resources, and data rules to achieve flexible, secure backend access control.

Backend SecurityData PermissionsEgg Framework
0 likes · 10 min read
Permission System Design and RBAC Implementation Practice in Backend Applications
Top Architect
Top Architect
Aug 20, 2020 · Information Security

Understanding Permission Control in Frontend‑Backend Separation Architecture

The article explains how permission control in a front‑back separation architecture defines resources and permissions, outlines the distinct responsibilities of frontend and backend in enforcing access, and provides practical implementation examples with component tags and Java interceptor code.

Backend SecurityComponent DesignJava interceptor
0 likes · 6 min read
Understanding Permission Control in Frontend‑Backend Separation Architecture
Programmer DD
Programmer DD
Jul 25, 2020 · Backend Development

Designing Simple Yet Secure API Authentication for Internal Services

This article walks through practical methods for securing internal API calls—starting with simple token checks, then enhancing security with IP whitelisting, salted signatures, and timestamped requests—while weighing trade‑offs like HTTPS overhead and time synchronization.

API authenticationBackend SecurityToken
0 likes · 6 min read
Designing Simple Yet Secure API Authentication for Internal Services
Programmer DD
Programmer DD
Dec 19, 2019 · Information Security

Master Role-Based Access Control with Spring Security: Practical Guide

This article explains how to implement role‑based access control in Spring Security by embedding roles into UserDetails, configuring HttpSecurity with hasRole/hasAnyRole/hasAuthority, handling anonymous users, and using permitAll, providing code examples and detailed explanations for each approach.

AuthorizationBackend SecurityJava
0 likes · 7 min read
Master Role-Based Access Control with Spring Security: Practical Guide
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Oct 29, 2019 · Backend Development

How to Secure PHP Code with the Open‑Source screw‑plus Extension

This article explains how to protect commercial PHP projects from source leakage by using the open‑source screw‑plus extension to encrypt and obfuscate code, covering PHP extension lifecycle, hook mechanisms, encryption workflow, implementation details, and practical advantages and limitations.

Backend SecurityCode EncryptionExtension Development
0 likes · 9 min read
How to Secure PHP Code with the Open‑Source screw‑plus Extension
Meituan Technology Team
Meituan Technology Team
Sep 28, 2017 · Information Security

Analysis and Exploitation of Spring Data REST CVE-2017-8046 Remote Code Execution Vulnerability

The article examines Spring Data REST’s CVE‑2017‑8046 remote‑code‑execution flaw, showing how a malicious JSON Patch path is turned into an unchecked SpEL expression that can run arbitrary commands, reproduces the exploit on a sample Spring Boot app, and advises upgrading to versions that include the path‑verification fix.

Backend SecurityCVE-2017-8046Exploit
0 likes · 17 min read
Analysis and Exploitation of Spring Data REST CVE-2017-8046 Remote Code Execution Vulnerability