Tagged articles
42 articles
Page 1 of 1
Code Mala Tang
Code Mala Tang
Dec 28, 2025 · Fundamentals

How to Find the Longest Substring Without Repeating Characters in O(n)

This article explains the problem of finding the longest substring without repeating characters, demonstrates a brute‑force O(n³) solution with code, then introduces an optimized sliding‑window approach that runs in linear time O(n), including detailed implementation, complexity analysis, and key insights.

Sliding WindowStringalgorithm
0 likes · 5 min read
How to Find the Longest Substring Without Repeating Characters in O(n)
Xiao Liu Lab
Xiao Liu Lab
Nov 5, 2025 · Information Security

Stop SSH Brute‑Force Attacks: 5 Ready‑to‑Use Scripts to Harden Your Server

The article reveals how thousands of SSH brute‑force attempts target servers daily, explains why password‑based root logins are a critical risk, and provides five practical Bash scripts—analysis, auto‑banning, security checks, user audits, and daily reporting—to quickly fortify SSH defenses.

LinuxSSHSecurity Scripts
0 likes · 10 min read
Stop SSH Brute‑Force Attacks: 5 Ready‑to‑Use Scripts to Harden Your Server
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2025 · Information Security

10 Proven SSH Hardening Techniques to Stop Bruteforce Attacks

This guide shares ten battle‑tested methods for hardening SSH, from changing the default port and disabling root login to using key authentication, fail2ban, IP whitelisting, two‑factor authentication, bastion hosts, and automated monitoring, helping you build a multilayered defense against brute‑force attacks.

HardeningSSHbrute force
0 likes · 23 min read
10 Proven SSH Hardening Techniques to Stop Bruteforce Attacks
Liangxu Linux
Liangxu Linux
Jul 3, 2025 · Information Security

Four Effective Ways to Stop SSH Brute‑Force Attacks

This guide explains four practical methods—using strong passwords, changing the default SSH port, disabling direct root login while granting sudo rights to a regular user, and enabling key‑based authentication—plus how to install and configure Fail2ban to automatically block repeated login failures on Linux servers.

SSHSecuritybrute force
0 likes · 10 min read
Four Effective Ways to Stop SSH Brute‑Force Attacks
Liangxu Linux
Liangxu Linux
Mar 10, 2024 · Information Security

How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks

This article explains common login security risks such as brute‑force cracking, CAPTCHA bypass, IP‑based blocking, man‑in‑the‑middle attacks, and shows practical countermeasures like captcha enforcement, login throttling, phone verification, HTTPS adoption, and data encryption.

CaptchaHTTPSMITM
0 likes · 10 min read
How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
IT Services Circle
IT Services Circle
Oct 29, 2023 · Fundamentals

Maximum Sum Submatrix – Solution Using 2D Prefix Sum

This article explains the maximum‑sum submatrix problem, presents a brute‑force enumeration, introduces a 2‑dimensional prefix‑sum technique to compute submatrix sums in O(1), and provides a complete Python implementation with complexity analysis.

2D prefix sumPythonalgorithm
0 likes · 9 min read
Maximum Sum Submatrix – Solution Using 2D Prefix Sum
php Courses
php Courses
May 20, 2023 · Information Security

Preventing Brute‑Force Attacks in PHP Applications

This article explains what brute‑force attacks are, why they threaten PHP applications, and presents three practical defenses—two‑factor authentication, enforced password policies, and brute‑force mitigation techniques—along with complete PHP code examples for each method.

PHPSecurityTwo-Factor Authentication
0 likes · 4 min read
Preventing Brute‑Force Attacks in PHP Applications
DevOps
DevOps
Apr 25, 2023 · Artificial Intelligence

The Bitter Lesson: Why Brute‑Force Computation Outperforms Hand‑Crafted Knowledge in AI

Richard Sutton’s “The Bitter Lesson” argues that over the past seven decades the most powerful driver of AI progress has been general‑purpose compute and large‑scale search, which consistently surpasses methods that rely on human‑engineered knowledge across domains such as chess, Go, speech recognition, and computer vision.

AIDeep Learningbrute force
0 likes · 7 min read
The Bitter Lesson: Why Brute‑Force Computation Outperforms Hand‑Crafted Knowledge in AI
Open Source Linux
Open Source Linux
Oct 19, 2022 · Information Security

How to Crack Wi‑Fi Passwords with Python: A Step‑by‑Step Guide

This tutorial walks through building a Python script that scans nearby Wi‑Fi networks and performs brute‑force password cracking, first using a command‑line approach and then enhancing it with a Tkinter graphical interface, while also discussing limitations and possible multithreading improvements.

PythonTkinterbrute force
0 likes · 14 min read
How to Crack Wi‑Fi Passwords with Python: A Step‑by‑Step Guide
Laravel Tech Community
Laravel Tech Community
Sep 26, 2022 · Information Security

Why Mobile Payment Passwords Are Limited to Six Digits: Security, Brute‑Force, and Human Memory Limits

The article explains why popular mobile payment platforms like WeChat and Alipay use six‑digit numeric passwords, discussing brute‑force attack complexity, the rapid growth of computing power, human short‑term memory limits, and additional authentication layers that together make six‑digit passwords a practical balance of security and usability.

brute forcecognitive psychologypassword length
0 likes · 5 min read
Why Mobile Payment Passwords Are Limited to Six Digits: Security, Brute‑Force, and Human Memory Limits
MaGe Linux Operations
MaGe Linux Operations
Sep 18, 2022 · Information Security

How to Build a Python Wi‑Fi Brute‑Force Cracker (CLI & GUI)

This tutorial walks through creating a Python Wi‑Fi password brute‑force tool, starting with a command‑line script that reads passwords from a dictionary, then adding network scanning for flexibility, and finally wrapping the logic in a Tkinter graphical interface while highlighting potential multithreading improvements.

SecurityTkinterWiFi
0 likes · 20 min read
How to Build a Python Wi‑Fi Brute‑Force Cracker (CLI & GUI)
Python Crawling & Data Mining
Python Crawling & Data Mining
Jul 27, 2022 · Fundamentals

How to Brute‑Force Account‑Password Pairs in Python with Simple Nested Loops

This article explains how to iterate through two files containing usernames and passwords using Python, demonstrating a straightforward double‑loop approach, providing sample code, output screenshots, and tips for handling mismatched line counts, helping readers efficiently test all credential combinations.

brute forcenested loopspassword cracking
0 likes · 3 min read
How to Brute‑Force Account‑Password Pairs in Python with Simple Nested Loops
Open Source Linux
Open Source Linux
Nov 24, 2021 · Information Security

Mastering Port Penetration: From Scanning to Exploitation

This comprehensive guide explains how to improve penetration testing efficiency by focusing on port enumeration, banner grabbing, service identification, default port knowledge, and a variety of attack techniques—including brute‑force, exploitation of known vulnerabilities, and protocol‑specific tricks—across common network services and applications.

brute forcenmappenetration testing
0 likes · 19 min read
Mastering Port Penetration: From Scanning to Exploitation
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Open Source Linux
Open Source Linux
Oct 12, 2021 · Information Security

Build a Python Wi‑Fi Password Cracker with CLI and GUI

This article walks through creating a Python script that uses the pywifi library to brute‑force Wi‑Fi passwords, shows how to improve flexibility with command‑line arguments, and demonstrates two graphical interfaces built with Tkinter for a more user‑friendly cracking tool.

PythonTkinterbrute force
0 likes · 16 min read
Build a Python Wi‑Fi Password Cracker with CLI and GUI
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

CaptchaHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
NiuNiu MaTe
NiuNiu MaTe
Sep 15, 2021 · Fundamentals

How to Maximize Mooncake Profit: Brute Force, Greedy, and DP Solutions

This article presents a classic stock‑like profit maximization problem using mooncake prices, explains the input and expected output, and walks through three solution strategies—brute‑force enumeration, a greedy linear scan, and a dynamic‑programming approach—complete with Go code examples and visual illustrations.

algorithmbrute forcedynamic programming
0 likes · 6 min read
How to Maximize Mooncake Profit: Brute Force, Greedy, and DP Solutions
MaGe Linux Operations
MaGe Linux Operations
Sep 9, 2021 · Information Security

Can You Crack WiFi Passwords with Python? A Step‑by‑Step Guide

This tutorial walks through building both command‑line and Tkinter‑based Python tools that scan nearby Wi‑Fi networks, read password dictionaries, and perform brute‑force attacks using the pywifi library, while also showing how to package the script as an executable and discussing potential multithreading improvements.

PythonTkinterWiFi
0 likes · 14 min read
Can You Crack WiFi Passwords with Python? A Step‑by‑Step Guide
NiuNiu MaTe
NiuNiu MaTe
Jul 27, 2021 · Fundamentals

Three Clever Ways to Solve the Circular Gas Station Problem

This article explains the classic circular gas‑station challenge, presents its key constraints, walks through a concrete example, and compares three solution strategies—brute‑force, reverse (backtrack) greedy, and a cumulative‑sum graphical method—highlighting their trade‑offs and insights.

algorithmbrute forcecoding interview
0 likes · 7 min read
Three Clever Ways to Solve the Circular Gas Station Problem
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Top Architect
Top Architect
Dec 19, 2020 · Information Security

Designing Secure Login Interfaces: Risks and Countermeasures

This article examines common security threats to login APIs such as brute‑force attacks, man‑in‑the‑middle interception, and credential enumeration, and presents practical countermeasures including captchas, IP and account lockout, mobile verification, HTTPS enforcement, and comprehensive logging to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
Designing Secure Login Interfaces: Risks and Countermeasures
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2020 · Information Security

Build a Python Brute‑Force Password Dictionary in Minutes

This guide explains how to use Python to create custom brute‑force password dictionaries—covering simple numeric PIN lists, targeted web‑backend wordlists, and practical usage tips—for quickly cracking basic encrypted files.

Dictionary AttackPythonbrute force
0 likes · 3 min read
Build a Python Brute‑Force Password Dictionary in Minutes
Python Crawling & Data Mining
Python Crawling & Data Mining
Sep 1, 2020 · Information Security

How to Perform SSH Brute‑Force Attacks with Python and Paramiko

This tutorial explains the concept of password‑brute‑force, introduces the open‑source sshfucker library and a custom multithreaded Python script that uses Paramiko to enumerate SSH credentials from a dictionary, and provides step‑by‑step code examples and usage instructions while warning against illegal use.

AutomationParamikoPython
0 likes · 7 min read
How to Perform SSH Brute‑Force Attacks with Python and Paramiko
Sohu Tech Products
Sohu Tech Products
Apr 8, 2020 · Fundamentals

Brute‑Force and Simple Hash‑Based Substring Search (Rabin‑Karp) Explained with Examples

This article explains the brute‑force (BF) substring search algorithm, demonstrates its step‑by‑step operation with examples, then introduces a simple hash‑based sliding‑window method (a basic Rabin‑Karp approach), provides Java code, and shows how to compute and update hashes efficiently to locate a pattern in a main string.

HashJavaRabin-Karp
0 likes · 7 min read
Brute‑Force and Simple Hash‑Based Substring Search (Rabin‑Karp) Explained with Examples