Tagged articles
9 articles
Page 1 of 1
Python Programming Learning Circle
Python Programming Learning Circle
Oct 11, 2025 · Information Security

How Cloudflare Captcha Works and How to Bypass It with Python

Cloudflare Captcha is a security feature that distinguishes humans from bots, integrating with DDoS protection, WAF, and CDN, while employing intelligent traffic management, privacy‑focused design, and various detection methods such as device fingerprinting, IP proxy checks, browser authenticity, JavaScript challenges, cookie validation, and TLS fingerprinting.

CaptchaCloudflarePython automation
0 likes · 8 min read
How Cloudflare Captcha Works and How to Bypass It with Python
Huolala Tech
Huolala Tech
Sep 19, 2023 · Information Security

How to Detect and Block Malicious Bot Traffic Using Log Analysis

This guide explains how to identify and differentiate malicious bot traffic from legitimate requests by analyzing web server logs, leveraging fields such as IP, user‑agent, referer, and parameters, and then applying WAF rules, automation, and security platforms to mitigate attacks and improve operational metrics.

AutomationWAFWeb Security
0 likes · 31 min read
How to Detect and Block Malicious Bot Traffic Using Log Analysis
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Sep 22, 2022 · Big Data

Graph Computing Algorithms for E‑commerce Anti‑Fraud and Reselling Bot Detection

The Xiaohongshu anti‑fraud team combats sophisticated same‑group and crowdsourced reselling bots by ingesting real‑time transaction streams into a Nebula Graph, using multi‑hop sub‑graph sampling, label propagation, and modularity‑based community detection to identify suspicious clusters, update risk pools, and enforce personalized purchase‑limit rules.

Big Dataanti-fraudbot detection
0 likes · 9 min read
Graph Computing Algorithms for E‑commerce Anti‑Fraud and Reselling Bot Detection
IT Services Circle
IT Services Circle
Jul 30, 2022 · Information Security

The Evolution and Challenges of CAPTCHAs: From Text Distortion to AI‑Driven Verification

CAPTCHAs, originally created by Carnegie Mellon researchers to block automated bots, have evolved from simple distorted text to complex image‑selection and behavior‑based challenges, prompting user frustration and driving innovations such as Google’s reCAPTCHA, Apple’s Private Access Tokens, and AI‑generated puzzles that aim to balance security, privacy, and usability.

AICaptchaUser experience
0 likes · 8 min read
The Evolution and Challenges of CAPTCHAs: From Text Distortion to AI‑Driven Verification
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
May 11, 2022 · Information Security

Detecting and Blocking Malicious Bot Traffic with Web Log Analysis

This article explains how to identify and mitigate malicious bot traffic by analyzing web server logs, using command‑line queries, specialized log‑analysis tools, centralized platforms, and automated security workflows, while also outlining operational metrics and response processes for effective protection.

Log MonitoringWAFbot detection
0 likes · 32 min read
Detecting and Blocking Malicious Bot Traffic with Web Log Analysis
High Availability Architecture
High Availability Architecture
Mar 11, 2022 · Information Security

Technical Analysis of Y‑BotManager Anti‑Spam Mechanism and SensorData Reverse Engineering

This article presents a detailed technical analysis of the Y‑BotManager anti‑spam system, describing its architecture, the reverse‑engineering process of its SensorData generation, the device and user‑interaction features used for bot detection, and the practical attempts to bypass the protection.

BotnetFingerprintingSensor Data
0 likes · 12 min read
Technical Analysis of Y‑BotManager Anti‑Spam Mechanism and SensorData Reverse Engineering
Suning Technology
Suning Technology
Aug 26, 2019 · Information Security

Inside Suning’s Fight Against Online Scalpers: How Tech Teams Cracked Coupon‑Snatching Software

The Suning technology risk‑control team teamed with Nanjing police to dismantle a sophisticated network‑scalper operation, revealing how custom coupon‑snatching software harms consumers and platforms, and showcasing advanced anti‑bot techniques such as emulator fingerprinting, captcha automation blocking, and data‑driven fraud models.

Fraud Preventionbot detectione-commerce security
0 likes · 5 min read
Inside Suning’s Fight Against Online Scalpers: How Tech Teams Cracked Coupon‑Snatching Software
58 Tech
58 Tech
May 8, 2019 · Information Security

Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System

This article introduces the fundamentals of web crawlers, typical crawling methods, and a comprehensive set of anti‑crawling strategies—including IP control, browser and device simulation, CAPTCHA cracking, and traffic analysis—while detailing the architecture and capabilities of the 58 anti‑crawling platform.

Traffic analysisWeb Crawlinganti‑crawling
0 likes · 17 min read
Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System