Tagged articles
98 articles
Page 1 of 1
Architect's Guide
Architect's Guide
Apr 26, 2026 · Backend Development

Building a Distributed Captcha Login with SpringBoot and Redis

This article walks through the design and implementation of a distributed image‑captcha login system using SpringBoot, Kaptcha, and Redis, comparing traditional session‑based approaches with a front‑back‑end separated architecture and providing complete code examples for each component.

BackendCaptchaDistributed Login
0 likes · 14 min read
Building a Distributed Captcha Login with SpringBoot and Redis
Java Web Project
Java Web Project
Apr 18, 2026 · Information Security

How a Midnight SMS Scam Revealed the Need for a Multi‑Layer Anti‑Abuse System

A night‑time SMS billing attack that drained ¥11,500 in two hours exposed flaws in a naïve Session‑based verification design, prompting a detailed, five‑layer defense architecture that combines gateway rate limiting, Redis token‑bucket controls, advanced captcha tracking, device fingerprinting, blacklist automation, and honey‑pot tactics to raise attack costs.

CaptchaNGINXSecurity
0 likes · 14 min read
How a Midnight SMS Scam Revealed the Need for a Multi‑Layer Anti‑Abuse System
Architect's Guide
Architect's Guide
Jan 21, 2026 · Backend Development

Designing a High‑Performance Flash Sale System: 7 Key Architecture Strategies

This article outlines a comprehensive backend architecture for flash‑sale (秒杀) systems, covering traffic control, Nginx and CDN setup, gateway rate‑limiting, Redis caching and distributed locks, message‑queue throttling, async order processing, hotspot isolation, and security measures to handle massive concurrent requests.

Captchaflash salehigh concurrency
0 likes · 12 min read
Designing a High‑Performance Flash Sale System: 7 Key Architecture Strategies
Architect's Guide
Architect's Guide
Nov 3, 2025 · Backend Development

How to Generate Custom Captcha Images in Spring Boot with Hutool

Learn step‑by‑step how to create various graphical captchas—including line, circle, shear, GIF, and custom numeric or arithmetic types—in a Spring Boot application, using both a hand‑written utility class and the Hutool‑captcha library, with full code examples and controller integration.

Backend DevelopmentCaptchaJava
0 likes · 14 min read
How to Generate Custom Captcha Images in Spring Boot with Hutool
Architect's Guide
Architect's Guide
Oct 28, 2025 · Backend Development

How to Prevent API Scraping in High‑Traffic Seckill Systems with Java

During high‑traffic flash‑sale events like Double 11, malicious users can flood seckill APIs, causing service collapse and inventory errors; this article explains the business pain points and presents a multi‑layer anti‑scraping solution—including rate limiting, behavior detection, captchas, request signing, token mechanisms, and asynchronous order processing—with concrete Java implementations.

API SecurityCaptchaDistributed Systems
0 likes · 7 min read
How to Prevent API Scraping in High‑Traffic Seckill Systems with Java
Python Programming Learning Circle
Python Programming Learning Circle
Oct 11, 2025 · Information Security

How Cloudflare Captcha Works and How to Bypass It with Python

Cloudflare Captcha is a security feature that distinguishes humans from bots, integrating with DDoS protection, WAF, and CDN, while employing intelligent traffic management, privacy‑focused design, and various detection methods such as device fingerprinting, IP proxy checks, browser authenticity, JavaScript challenges, cookie validation, and TLS fingerprinting.

CaptchaCloudflarePython automation
0 likes · 8 min read
How Cloudflare Captcha Works and How to Bypass It with Python
Selected Java Interview Questions
Selected Java Interview Questions
Sep 24, 2025 · Backend Development

How to Build a Math Image Captcha with Spring Boot 3.5.5

This step‑by‑step tutorial shows Java beginners how to create a Spring Boot 3.5.5 application that generates a math‑expression image captcha, stores the answer in session or an in‑memory map, provides REST endpoints, handles CORS, and includes a complete front‑end page with refresh and validation logic.

CaptchaJavaSpring Boot
0 likes · 30 min read
How to Build a Math Image Captcha with Spring Boot 3.5.5
Top Architect
Top Architect
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks

This article explains common security risks of login interfaces such as brute‑force attacks, CAPTCHA bypass, IP‑based rate limiting, mobile verification, and man‑in‑the‑middle threats, and provides practical mitigation techniques including code examples, HTTPS adoption, and additional hardening measures.

Brute-force protectionCaptchaHTTPS
0 likes · 13 min read
How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks
Java Captain
Java Captain
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse

This article explains common security risks in login interfaces—such as brute‑force attacks, captcha bypass, account and IP lockouts, man‑in‑the‑middle threats—and provides practical mitigation techniques like password attempt limits, captcha, phone verification, HTTPS, and comprehensive logging.

Brute-force protectionCaptchaHTTPS
0 likes · 9 min read
How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse
Architecture Digest
Architecture Digest
Sep 18, 2025 · Information Security

How to Harden Login APIs: From Brute‑Force to MITM Protection

This article examines common login security risks such as brute‑force attacks, captcha bypass, IP blocking, and man‑in‑the‑middle threats, and proposes layered defenses including password‑retry limits, captcha, phone verification, HTTPS, and encrypted payloads to significantly raise the attack cost.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Harden Login APIs: From Brute‑Force to MITM Protection
php Courses
php Courses
Sep 5, 2025 · Information Security

How to Secure Data in PHP: HTTPS, Hashing, Prepared Statements, and Encryption

This guide explains essential PHP techniques for protecting sensitive data, covering HTTPS usage, password hashing algorithms, prepared statements to prevent SQL injection, encryption methods like AES and RSA, and CAPTCHA implementation, with clear code examples for each security measure.

CaptchaHTTPSPrepared Statements
0 likes · 4 min read
How to Secure Data in PHP: HTTPS, Hashing, Prepared Statements, and Encryption
Open Source Tech Hub
Open Source Tech Hub
Aug 21, 2025 · Backend Development

Build a Scalable Distributed Captcha Login with PHP Webman and Redis

This guide explains how to replace traditional session‑based captcha authentication with a Redis‑backed, token‑driven solution using the high‑performance PHP Webman framework and the tinywan/captcha plugin, covering architecture, generation and verification flows, installation steps, and code examples.

CaptchaDistributed SystemsPHP
0 likes · 8 min read
Build a Scalable Distributed Captcha Login with PHP Webman and Redis
Lobster Programming
Lobster Programming
Jan 9, 2025 · Information Security

5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas

Hotlinking attacks steal popular media by fetching resources from major platforms, but developers can protect assets using anti-leech methods such as Nginx referer checks, SpringBoot filters, token validation, timestamp verification, and graphical captchas, each with strengths and limitations against forged requests.

CaptchaNGINXSpringBoot
0 likes · 7 min read
5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 17, 2024 · Information Security

Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks

After a night-time SMS spam attack that cost 400 RMB, the team analyzed the breach, evaluated various captcha methods—including text, slider, reCAPTCHA v2/v3, and 2FA—implemented temporary throttling, and ultimately adopted a combined reCAPTCHA and two‑factor authentication approach to strengthen account security.

2FACaptchaSMS attack
0 likes · 8 min read
Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks
Java Tech Enthusiast
Java Tech Enthusiast
Jul 13, 2024 · Backend Development

Implementing Captcha Login with Spring Boot and Redis

The guide demonstrates how to build a front‑end/back‑end separated captcha login using Spring Boot, Kaptcha and Redis, showing Redis‑based captcha storage with a unique key, Base64 image delivery, and verification logic that replaces traditional session‑based approaches.

APICaptchaJava
0 likes · 12 min read
Implementing Captcha Login with Spring Boot and Redis
Architect
Architect
Jun 10, 2024 · Backend Development

How to Build a Scalable Front‑Back‑Separated Captcha Login with Spring Boot and Redis

This article walks through the problem of traditional session‑based captcha login, compares it with a modern front‑back‑separated architecture, and provides a step‑by‑step implementation using Spring Boot, Kaptcha, and Redis, including full code snippets, configuration classes, and flow diagrams.

CaptchaFrontBackSeparationJava
0 likes · 12 min read
How to Build a Scalable Front‑Back‑Separated Captcha Login with Spring Boot and Redis
IT Services Circle
IT Services Circle
May 13, 2024 · Information Security

The Hidden Costs and Ineffectiveness of CAPTCHAs

CAPTCHAs, originally designed as human‑based computation tools to block bots, have become costly, discriminatory, and largely ineffective security measures that waste billions of dollars annually while providing profit to service providers, prompting a 2024 debate on their continued use.

AI trainingCaptchaHuman Computation
0 likes · 8 min read
The Hidden Costs and Ineffectiveness of CAPTCHAs
Java Tech Enthusiast
Java Tech Enthusiast
May 5, 2024 · Information Security

Preventing Malicious API Abuse: Security Measures and Best Practices

To prevent malicious API abuse, implement layered defenses such as firewalls to block unwanted traffic, robust captchas and SMS verification, mandatory authentication with permission controls, IP whitelisting for critical endpoints, HTTPS encryption, strict rate‑limiting via Redis, continuous monitoring with alerts, and an API gateway that centralizes filtering, authentication and throttling.

API SecurityCaptchaIP whitelist
0 likes · 9 min read
Preventing Malicious API Abuse: Security Measures and Best Practices
Architect
Architect
Apr 27, 2024 · Information Security

How to Stop Malicious API Calls: 8 Practical Defense Strategies

This article walks through eight concrete techniques—firewall rules, captchas, authentication checks, IP whitelists, HTTPS encryption, rate limiting, monitoring, and an API gateway—to prevent abusive requests from draining resources or compromising critical services.

API SecurityAuthenticationCaptcha
0 likes · 11 min read
How to Stop Malicious API Calls: 8 Practical Defense Strategies
Open Source Tech Hub
Open Source Tech Hub
Mar 13, 2024 · Artificial Intelligence

How to Use Google Gemini AI in PHP to Solve Image CAPTCHAs

This guide shows how to set up a PHP project, install the Gemini PHP client, and use Google Gemini's multimodal model to recognize text and solve image CAPTCHAs, providing complete code examples, dependency instructions, and sample outputs.

CaptchaGemini AIPHP
0 likes · 6 min read
How to Use Google Gemini AI in PHP to Solve Image CAPTCHAs
Liangxu Linux
Liangxu Linux
Mar 10, 2024 · Information Security

How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks

This article explains common login security risks such as brute‑force cracking, CAPTCHA bypass, IP‑based blocking, man‑in‑the‑middle attacks, and shows practical countermeasures like captcha enforcement, login throttling, phone verification, HTTPS adoption, and data encryption.

CaptchaHTTPSMITM
0 likes · 10 min read
How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks
Java Captain
Java Captain
Mar 7, 2024 · Information Security

Requirements Analysis and Technical Implementation of Java Image Captcha

This article analyzes the security, usability, performance, and scalability requirements of Java image captchas and proposes a technical solution covering generation, verification, and optimization to build a safe, efficient, and user‑friendly validation mechanism.

CaptchaJavaScalability
0 likes · 5 min read
Requirements Analysis and Technical Implementation of Java Image Captcha
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
Selected Java Interview Questions
Selected Java Interview Questions
Feb 29, 2024 · Information Security

How to Prevent Malicious API Abuse: Firewalls, Captchas, Authentication, IP Whitelists, Encryption, Rate Limiting, Monitoring, and Gateways

This article explains a comprehensive set of techniques—including firewalls, captchas, authentication checks, IP whitelists, data encryption, rate limiting, monitoring, and API gateways—to protect interfaces from malicious abuse and ensure secure, reliable service operation.

API SecurityAuthenticationCaptcha
0 likes · 12 min read
How to Prevent Malicious API Abuse: Firewalls, Captchas, Authentication, IP Whitelists, Encryption, Rate Limiting, Monitoring, and Gateways
Java Architecture Diary
Java Architecture Diary
Feb 18, 2024 · Artificial Intelligence

Boost Captcha Solving with Gemini AI: Spring Boot Integration Guide

This tutorial explains how to integrate Gemini's free API and long‑context capabilities into a Spring Boot starter to recognize image captchas, handle interference lines, and solve arithmetic challenges, providing code samples, configuration steps, and best practices for improving automation efficiency.

AICaptchaGemini
0 likes · 5 min read
Boost Captcha Solving with Gemini AI: Spring Boot Integration Guide
Su San Talks Tech
Su San Talks Tech
Feb 16, 2024 · Information Security

How to Prevent Malicious API Abuse: 8 Practical Security Measures

This article outlines eight effective techniques—including firewalls, captchas, authentication checks, IP whitelists, data encryption, rate limiting, monitoring, and API gateways—to protect interfaces from malicious traffic and costly abuse while balancing user experience.

API SecurityCaptchaencryption
0 likes · 9 min read
How to Prevent Malicious API Abuse: 8 Practical Security Measures
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 11, 2023 · Frontend Development

Bypassing Juejin Slider Captcha with Puppeteer and Canvas Image Recognition

This article demonstrates how to use Puppeteer and the Canvas API to automate login on Juejin, extract the slider captcha image, apply grayscale and binarization processing to locate the gap, calculate the required drag distance, and simulate human‑like mouse movements with easing functions for successful verification.

Captchaimage recognitionweb-scraping
0 likes · 17 min read
Bypassing Juejin Slider Captcha with Puppeteer and Canvas Image Recognition
php Courses
php Courses
Oct 11, 2023 · Information Security

Best Practices for Data Security and Encryption in PHP Development

This article explains essential PHP techniques—including HTTPS, password hashing, prepared statements, encryption algorithms, and captchas—along with practical code examples to help developers protect sensitive data from attacks and leaks.

CaptchaPHPPrepared Statements
0 likes · 4 min read
Best Practices for Data Security and Encryption in PHP Development
Selected Java Interview Questions
Selected Java Interview Questions
Oct 4, 2023 · Backend Development

Implementing Captcha‑Based Login in a Frontend‑Backend Separated Spring Boot Application

This article demonstrates how to implement a captcha‑based login mechanism in a Spring Boot application with a front‑end/back‑end separation, detailing the traditional session‑based approach, the new Redis‑backed token solution, and providing complete code examples for configuration, service, controller, and data objects.

BackendCaptchaKaptcha
0 likes · 12 min read
Implementing Captcha‑Based Login in a Frontend‑Backend Separated Spring Boot Application
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 26, 2023 · Artificial Intelligence

Using AI and RPA to Solve Slider Captcha: A Practical Implementation with YOLOv8 and PyAutoGUI

This article demonstrates how to combine AI‑based object detection (YOLOv8) with robotic process automation (pyautogui) to automatically locate, drag and release slider captchas, covering data preparation, model training, screen capture, coordinate extraction, mouse simulation, and robustness improvements.

AICaptchaComputer Vision
0 likes · 15 min read
Using AI and RPA to Solve Slider Captcha: A Practical Implementation with YOLOv8 and PyAutoGUI
php Courses
php Courses
Aug 8, 2023 · Backend Development

How to Build a Secure Online Voting System with PHP

This article explains how to design and implement a PHP-based online voting system with user registration, login, vote submission, and anti‑cheating measures such as session validation, duplicate‑vote checks, transactions, captchas, and vote‑limit enforcement.

Backend DevelopmentCaptchaPHP
0 likes · 9 min read
How to Build a Secure Online Voting System with PHP
php Courses
php Courses
May 30, 2023 · Information Security

PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms

This article explains three PHP‑based techniques—captcha verification, encrypted parameter transmission, and dynamic token validation—to protect web login pages from automated crawling and credential‑stealing attacks, while also noting their limitations and implementation details.

Captchaanti‑crawlerdynamic token
0 likes · 6 min read
PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms
Architecture Digest
Architecture Digest
Apr 20, 2023 · Backend Development

Designing a High‑Concurrency Flash Sale System Architecture

This article outlines a comprehensive backend architecture for flash‑sale (秒杀) systems, covering traffic‑spike handling, rate‑limiting, Nginx static‑resource separation, Redis locking and caching, message‑queue throttling, database sharding, asynchronous order processing, and captcha‑based anti‑bot measures.

Captchaflash salehigh concurrency
0 likes · 11 min read
Designing a High‑Concurrency Flash Sale System Architecture
Java High-Performance Architecture
Java High-Performance Architecture
Apr 11, 2023 · Backend Development

Designing a High‑Performance Flash‑Sale System: 7 Key Architecture Strategies

This article outlines a flash‑sale system architecture from seven perspectives—covering Nginx static‑dynamic separation, CDN caching, gateway rate‑limiting, Redis locking, MQ buffering, business processing, and database sharding—while detailing peak‑shaving, page optimization, security controls, and transaction trade‑offs for massive concurrent traffic.

BackendCaptchaMQ
0 likes · 10 min read
Designing a High‑Performance Flash‑Sale System: 7 Key Architecture Strategies
Python Programming Learning Circle
Python Programming Learning Circle
Mar 8, 2023 · Artificial Intelligence

Using ddddocr SDK for Captcha Recognition in Python

This article introduces the open‑source ddddocr SDK, demonstrates how to install it and use it in Python to automatically solve three common captcha types—slider, click‑based, and alphanumeric—providing code examples and result explanations for each.

CaptchaComputer VisionOCR
0 likes · 4 min read
Using ddddocr SDK for Captcha Recognition in Python
vivo Internet Technology
vivo Internet Technology
Sep 14, 2022 · Information Security

Web Crawling, Anti‑Crawling, and Anti‑Anti‑Crawling Techniques: Principles, Frameworks, and Code Examples

The article explains web‑crawling basics, Python and Scrapy examples, then surveys common anti‑crawling defenses such as CSS offsets, image camouflage, custom fonts, dynamic rendering, captchas, request signatures and honeypots, and finally presents anti‑anti‑crawling countermeasures—including CSS‑offset reversal, font decoding, headless‑browser rendering and YOLOv5‑based captcha cracking, while stressing legal compliance.

CaptchaPythonScrapy
0 likes · 25 min read
Web Crawling, Anti‑Crawling, and Anti‑Anti‑Crawling Techniques: Principles, Frameworks, and Code Examples
IT Services Circle
IT Services Circle
Jul 30, 2022 · Information Security

The Evolution and Challenges of CAPTCHAs: From Text Distortion to AI‑Driven Verification

CAPTCHAs, originally created by Carnegie Mellon researchers to block automated bots, have evolved from simple distorted text to complex image‑selection and behavior‑based challenges, prompting user frustration and driving innovations such as Google’s reCAPTCHA, Apple’s Private Access Tokens, and AI‑generated puzzles that aim to balance security, privacy, and usability.

AICaptchaUser experience
0 likes · 8 min read
The Evolution and Challenges of CAPTCHAs: From Text Distortion to AI‑Driven Verification
DataFunTalk
DataFunTalk
Jun 21, 2022 · Information Security

Trusted Traffic Governance and Anti‑Fraud Strategies Using Captcha

This talk explains how to use semantic-driven captcha mechanisms to classify and manage trusted versus untrusted traffic, detailing anti‑fraud strategies, flow identification, countermeasures against simulator and protocol cracking, and proactive updates to stay ahead of black‑market attacks.

CaptchaTraffic Classificationadversarial attacks
0 likes · 15 min read
Trusted Traffic Governance and Anti‑Fraud Strategies Using Captcha
Programmer DD
Programmer DD
Apr 18, 2022 · Artificial Intelligence

Unlocking Captcha Secrets: How the Open‑Source ddddocr Python Library Works

This article introduces the open‑source Python library ddddocr, explains its evolution from version 1.2.0 to 1.4.3—including OCR, target detection, and slider recognition features—and shows how it leverages deep‑learning and OpenCV to simplify captcha solving for developers.

CaptchaDeep LearningOCR
0 likes · 4 min read
Unlocking Captcha Secrets: How the Open‑Source ddddocr Python Library Works
Python Programming Learning Circle
Python Programming Learning Circle
Mar 26, 2022 · Information Security

Generating Image Captcha in Python Using graphic-verification-code and captcha Libraries

This tutorial demonstrates two Python approaches for creating image verification codes—using the graphic-verification-code library for a quick four‑line solution and the captcha library for customizable random captchas—complete with installation commands, code examples, and sample outputs.

CaptchaSecuritycaptcha-library
0 likes · 3 min read
Generating Image Captcha in Python Using graphic-verification-code and captcha Libraries
Laravel Tech Community
Laravel Tech Community
Mar 2, 2022 · Backend Development

Generating a PNG CAPTCHA Image with PHP

This tutorial explains how to create a simple PNG CAPTCHA using PHP by generating a random four‑character code, drawing it with random rotation and position, adding noise lines and dots, and outputting the image for use in form validation.

CaptchaSecurityimage generation
0 likes · 3 min read
Generating a PNG CAPTCHA Image with PHP
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Top Architect
Top Architect
Oct 7, 2021 · Backend Development

Implementation of Image and SMS Captcha Service in .NET Core

This article walks through the design and implementation of a complete captcha solution—including image and SMS verification—using .NET Core, covering background context, code details for generating graphics, unsafe handling, noise lines, caching strategies, rate limiting, validation logic, runtime results, and a link to the full source repository.

BackendCaptchaSecurity
0 likes · 14 min read
Implementation of Image and SMS Captcha Service in .NET Core
Programmer DD
Programmer DD
Oct 4, 2021 · Backend Development

Build a Secure SMS Verification Service with .NET – Full Code Walkthrough

This article introduces an open‑source SMS verification module, outlines essential security features such as code expiry, length limits, request throttling, and one‑time use, and provides complete C# implementations for generating, sending, and validating both image and SMS captchas.

ASP.NET CoreCCaptcha
0 likes · 9 min read
Build a Secure SMS Verification Service with .NET – Full Code Walkthrough
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

CaptchaHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Python Crawling & Data Mining
Python Crawling & Data Mining
Sep 11, 2021 · Artificial Intelligence

How to Preprocess Captcha Images with OpenCV for Python Scraping

This tutorial explains how to collect captcha images, preprocess them with OpenCV—including grayscale conversion, median blur, binarization, contour detection, and character segmentation—and provides core Python code and visual results for building a reliable Python web‑scraping pipeline.

CaptchaOpenCVWeb Scraping
0 likes · 7 min read
How to Preprocess Captcha Images with OpenCV for Python Scraping
21CTO
21CTO
Aug 25, 2021 · Information Security

Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens

This article examines common security flaws in basic web login forms, demonstrates how plain‑text passwords can be intercepted, and presents practical countermeasures such as client‑side encryption, hashing, captchas, tokens, and digital signatures to protect credentials and data integrity.

CaptchaMD5Token
0 likes · 13 min read
Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens
DataFunTalk
DataFunTalk
Aug 21, 2021 · Information Security

CAPTCHA: History, Development, and Its Role in Cybersecurity and Anti‑Fraud Strategies

This article reviews the origin and evolution of CAPTCHAs, examines early applications and OCR attacks, describes the three generations of reCAPTCHA and emerging verification methods, and discusses how CAPTCHAs are used to raise attack barriers, filter malicious traffic, and support risk assessment in modern anti‑fraud systems.

AICaptchaSecurity
0 likes · 13 min read
CAPTCHA: History, Development, and Its Role in Cybersecurity and Anti‑Fraud Strategies
MaGe Linux Operations
MaGe Linux Operations
Aug 1, 2021 · Backend Development

How to Simulate a Login with Python: Scrape Protected Websites

This guide explains how to programmatically log into a website using Python's urllib2 and cookielib modules, covering cookie handling, captcha retrieval, form data construction, request headers, and posting credentials to access protected pages.

CaptchaLogin AutomationWeb Scraping
0 likes · 5 min read
How to Simulate a Login with Python: Scrape Protected Websites
Programmer DD
Programmer DD
Jul 6, 2021 · Backend Development

Unified Multi-Channel Login with Spring Security: Password, SMS, and Mini‑App

This article demonstrates how to implement a unified authentication system in Spring Security that supports traditional username/password login, SMS-based captcha login, and WeChat Mini‑Program login, detailing the required components, custom filters, provider configurations, and code examples for a production‑ready solution.

AuthenticationCaptchaJava
0 likes · 14 min read
Unified Multi-Channel Login with Spring Security: Password, SMS, and Mini‑App
Programmer DD
Programmer DD
Jun 26, 2021 · Backend Development

Implementing a Spring Boot Anti‑Crawler Filter with kk‑anti‑reptile

This article explains how to integrate the kk‑anti‑reptile anti‑crawler component into a Spring Boot application, covering system requirements, filter workflow, rule configuration, Maven setup, Redis and Apollo settings, as well as front‑end handling of the 509 response and captcha verification.

Captchaanti‑crawleraxios
0 likes · 7 min read
Implementing a Spring Boot Anti‑Crawler Filter with kk‑anti‑reptile
Programmer DD
Programmer DD
May 9, 2021 · Information Security

How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More

This article explains practical security measures for login interfaces, covering brute‑force attacks, captcha integration, IP throttling, mobile verification, man‑in‑the‑middle protection with HTTPS, and additional best‑practice recommendations to harden web back‑end authentication.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
IT Xianyu
IT Xianyu
Apr 7, 2021 · Backend Development

EasyCaptcha Java Captcha Library – Features, Integration, and Usage Guide

This article introduces EasyCaptcha, a Java graphic captcha library supporting GIF, Chinese characters, and arithmetic types, explains how to integrate it via Maven, demonstrates usage in SpringBoot with controller and HTML snippets, and provides demo links and a concise summary for developers.

Backend DevelopmentCaptchaJava
0 likes · 3 min read
EasyCaptcha Java Captcha Library – Features, Integration, and Usage Guide
FunTester
FunTester
Feb 23, 2021 · Backend Development

Improving Software Testability: Practical Tips for Captcha Handling, Data Generation, Mocking, and Test Code Deployment

This article shares practical techniques to enhance software testability, covering strategies for bypassing graphical and SMS captchas, efficient test data creation, automated and brute‑force data injection, mocking services, and deploying test‑specific code without affecting production environments.

Backend testingCaptchaData Generation
0 likes · 11 min read
Improving Software Testability: Practical Tips for Captcha Handling, Data Generation, Mocking, and Test Code Deployment
Top Architect
Top Architect
Dec 19, 2020 · Information Security

Designing Secure Login Interfaces: Risks and Countermeasures

This article examines common security threats to login APIs such as brute‑force attacks, man‑in‑the‑middle interception, and credential enumeration, and presents practical countermeasures including captchas, IP and account lockout, mobile verification, HTTPS enforcement, and comprehensive logging to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
Designing Secure Login Interfaces: Risks and Countermeasures
DeWu Technology
DeWu Technology
Nov 26, 2020 · Artificial Intelligence

Automated Captcha Recognition Using Machine Learning

The article outlines a machine‑learning pipeline for automated captcha recognition, covering dataset generation, image preprocessing, segmentation via clustering or watershed methods, and classification using classic models and CNNs, achieving roughly 94% accuracy while noting the growing complexity of modern captchas and recommending developer collaboration when feasible.

CaptchaNeural NetworksPython
0 likes · 23 min read
Automated Captcha Recognition Using Machine Learning
Programmer DD
Programmer DD
Jul 8, 2020 · Backend Development

Integrating kk-anti-reptile Anti‑Crawler into Spring‑Boot Applications

This guide explains how the kk-anti-reptile component protects Spring‑Boot distributed systems from crawlers by using a servlet filter, configurable IP and User‑Agent rules, captcha challenges, Maven integration, and required Redis and Apollo settings, with full code examples.

Captchaanti‑crawlerfilter
0 likes · 9 min read
Integrating kk-anti-reptile Anti‑Crawler into Spring‑Boot Applications
Python Programming Learning Circle
Python Programming Learning Circle
Jun 3, 2020 · Information Security

Anti‑Crawling Techniques: Server‑Side and Client‑Side Detection Strategies

The article examines why web content needs protection, explains common server‑side header checks, describes client‑side JavaScript fingerprinting and headless‑browser detection methods, and outlines practical anti‑crawling measures such as CAPTCHAs and robots.txt, highlighting the ongoing cat‑and‑mouse game between crawlers and defenders.

CaptchaHTTP header inspectionWeb Crawling
0 likes · 12 min read
Anti‑Crawling Techniques: Server‑Side and Client‑Side Detection Strategies
MaGe Linux Operations
MaGe Linux Operations
Mar 22, 2020 · Backend Development

How to Build a Custom CAPTCHA Service with Python Sanic

This tutorial shows how to generate a simple image‑based CAPTCHA using Python's Pillow library and the Sanic web framework, store the code in a session, and validate user input, with notes on adding asynchronous refresh functionality.

CaptchaPythonWeb Development
0 likes · 6 min read
How to Build a Custom CAPTCHA Service with Python Sanic
MaGe Linux Operations
MaGe Linux Operations
Apr 9, 2019 · Artificial Intelligence

How to Build and Crack Image Captchas with Python and Tesserocr

This tutorial explains the types of captchas, demonstrates how to generate image captchas using the Claptcha library, outlines preprocessing steps such as grayscale conversion, binarization, and denoising, and shows how to recognize them with the Tesserocr OCR engine, including handling noise and interference lines.

CaptchaImage ProcessingOCR
0 likes · 7 min read
How to Build and Crack Image Captchas with Python and Tesserocr
Alibaba Cloud Developer
Alibaba Cloud Developer
Mar 11, 2019 · Artificial Intelligence

How Adversarial Attacks Threaten AI: Real-World Cases & Alibaba’s Defense

AI brings convenience but also new security challenges; this article explains the two main sources of AI safety issues, details adversarial example techniques, showcases applications such as face‑recognition attacks and robust captcha designs, and highlights Alibaba’s research and the IJCAI‑19 AI adversarial competition.

AI securityCaptchaadversarial examples
0 likes · 8 min read
How Adversarial Attacks Threaten AI: Real-World Cases & Alibaba’s Defense
MaGe Linux Operations
MaGe Linux Operations
Dec 17, 2018 · Artificial Intelligence

How to Build a KNN-Based CAPTCHA Solver with OpenCV in Python

This tutorial walks through using OpenCV and a K‑Nearest Neighbors model to preprocess, segment, manually label, train, and finally recognize distorted, noisy CAPTCHA images, achieving about 82% accuracy on a test set of one hundred samples.

CaptchaImage ProcessingOpenCV
0 likes · 12 min read
How to Build a KNN-Based CAPTCHA Solver with OpenCV in Python
MaGe Linux Operations
MaGe Linux Operations
Nov 18, 2018 · Artificial Intelligence

How to Crack Image Captchas with Python: Generation, Pre‑processing, and OCR

This tutorial walks through the four main captcha types, focuses on image captchas, explains generation with the Claptcha library, details preprocessing steps such as grayscale conversion, binarization, denoising, and character segmentation, and demonstrates recognition using tesserocr, while showing the impact of noise and interference lines.

CaptchaImage ProcessingOCR
0 likes · 6 min read
How to Crack Image Captchas with Python: Generation, Pre‑processing, and OCR
360 Tech Engineering
360 Tech Engineering
Jul 10, 2018 · Information Security

Bypassing Geetest Slider Captcha Using Selenium WebDriver

This article demonstrates how to use Selenium WebDriver with JavaScript to automate the Geetest slider captcha, covering the captcha background, WebDriver setup, element interaction, image capture, pixel analysis, and crafting human‑like sliding trajectories to attempt bypassing the security check.

CaptchaGeetestSelenium
0 likes · 9 min read
Bypassing Geetest Slider Captcha Using Selenium WebDriver
360 Quality & Efficiency
360 Quality & Efficiency
Jul 9, 2018 · Frontend Development

Bypassing Geetest Slider Captcha Using Selenium WebDriver

This article demonstrates how to use Selenium WebDriver with JavaScript to automate the Geetest sliding captcha, covering installation, element interaction, image capture, pixel analysis, and human‑like sliding trajectory generation to illustrate both the challenges and techniques involved.

CaptchaGeetestJavaScript
0 likes · 9 min read
Bypassing Geetest Slider Captcha Using Selenium WebDriver
System Architect Go
System Architect Go
Dec 29, 2017 · Information Security

Mitigating SMS API Abuse with Captcha, Signatures, and Third‑Party Verification

After suffering significant losses from malicious bulk requests to a registration‑focused SMS API, the author explains why simple phone‑number or IP restrictions are ineffective and proposes stronger defenses such as server‑validated captchas, request signatures, and integration with third‑party verification services like Geetest.

CaptchaGeetestSMS API
0 likes · 3 min read
Mitigating SMS API Abuse with Captcha, Signatures, and Third‑Party Verification
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2017 · Information Security

How to Defend Your Website Against Web Crawlers: Techniques & Tools

This article explores why web content needs protection, explains common server‑side and client‑side anti‑crawling methods—including User‑Agent checks, token cookies, headless‑browser detection, fingerprinting, captchas, and robots.txt—and offers practical guidance for raising the cost of unauthorized scraping.

Browser FingerprintingCaptchaHeadless Browser
0 likes · 12 min read
How to Defend Your Website Against Web Crawlers: Techniques & Tools
MaGe Linux Operations
MaGe Linux Operations
Nov 19, 2017 · Information Security

How to Crack Sliding Puzzle Captchas with Simple Python Image Analysis

This article explores the security weaknesses of sliding puzzle captchas by collecting multiple samples, performing qualitative and quantitative image analysis, and presenting a Python script that automatically identifies the puzzle gap using pixel differences and statistical thresholds.

CaptchaImage ProcessingPython
0 likes · 7 min read
How to Crack Sliding Puzzle Captchas with Simple Python Image Analysis
Ctrip Technology
Ctrip Technology
Jun 5, 2017 · Information Security

Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0

This article recounts the development of Ctrip's graphical captcha system, describing its early .NET‑based implementation, the challenges encountered such as uniform difficulty, limited data collection, and poor user experience, and how successive redesigns—including multilingual support, adaptive difficulty, and slider‑plus‑character selection—balanced security and usability.

AuthenticationCaptchaUser experience
0 likes · 14 min read
Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0
Qunar Tech Salon
Qunar Tech Salon
Dec 5, 2016 · Artificial Intelligence

Understanding Convolutional Neural Networks for OCR and CAPTCHA Recognition

This article introduces the fundamentals of neural networks for image recognition, explains regression vs classification, describes convolution, pooling and fully connected layers, illustrates the classic LeNet‑5 model on the MNIST dataset, and shows how a TensorFlow‑based CNN can be trained to recognize CAPTCHA images, achieving high accuracy.

CNNCaptchaLeNet-5
0 likes · 10 min read
Understanding Convolutional Neural Networks for OCR and CAPTCHA Recognition
Java High-Performance Architecture
Java High-Performance Architecture
Oct 6, 2015 · Information Security

Understanding CSRF Attacks and How to Prevent Them

This article explains how CSRF (Cross‑site request forgery) tricks authenticated users into performing attacker‑controlled actions, illustrates a typical admin‑addition scenario, and outlines two primary defenses—CAPTCHA verification and dynamic token validation—to effectively mitigate such attacks.

CSRFCaptchaCross-Site Request Forgery
0 likes · 3 min read
Understanding CSRF Attacks and How to Prevent Them
MaGe Linux Operations
MaGe Linux Operations
Jul 1, 2014 · Backend Development

Master Python Web Scraping: Proxies, Login, Multithreading, and Captcha Hacks

This guide walks through practical Python web‑scraping techniques using urllib2, covering basic page fetching, proxy usage, cookie handling for logins, form submission, header spoofing, anti‑hotlink tricks, multithreaded crawling, and strategies for bypassing simple captchas, all illustrated with code snippets.

CaptchaProxyWeb Scraping
0 likes · 7 min read
Master Python Web Scraping: Proxies, Login, Multithreading, and Captcha Hacks