Tagged articles
105 articles
Page 1 of 2
Su San Talks Tech
Su San Talks Tech
May 11, 2026 · Artificial Intelligence

How Google’s Open‑Source MCP Toolbox Secures AI Agent Database Access

The article analyzes the dangers of giving LLMs unrestricted database privileges, explains Google’s MCP Toolbox design that enforces least‑privilege, structured queries and authentication, provides a step‑by‑step Go integration guide, shares production pitfalls, and compares suitable use cases versus raw function calling.

AI AgentDatabase SecurityGo
0 likes · 18 min read
How Google’s Open‑Source MCP Toolbox Secures AI Agent Database Access
Java Architect Handbook
Java Architect Handbook
Mar 18, 2026 · Information Security

How to Enable Fuzzy Search on Encrypted Data: Methods, Pros & Cons

This article analyzes three categories of techniques—naïve, conventional, and advanced—for performing fuzzy queries on encrypted fields, compares their memory and performance trade‑offs, provides concrete code examples and storage calculations, and recommends the most practical approach for production systems.

Database Securityencrypted datafuzzy-search
0 likes · 13 min read
How to Enable Fuzzy Search on Encrypted Data: Methods, Pros & Cons
Java Backend Technology
Java Backend Technology
Mar 4, 2026 · Databases

Is MySQL Dying? Why MariaDB and PostgreSQL Offer Safer, Faster Alternatives

The article analyzes MySQL's dwindling open‑source credibility, mounting security vulnerabilities, performance regressions, and Oracle's commercial lock‑in, contrasting it with MariaDB's transparent development and the growing migration of applications to MariaDB or PostgreSQL for better security and performance.

Database SecurityMariaDBmigration
0 likes · 8 min read
Is MySQL Dying? Why MariaDB and PostgreSQL Offer Safer, Faster Alternatives
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 13, 2026 · Databases

Enforcing Client IP‑Based Access Control in MySQL InnoDB Cluster via Router

This article explains how to overcome MySQL InnoDB Cluster’s IP‑address loss and lack of Proxy Protocol by injecting real client IPs through MySQL Router connection attributes, configuring init_connect, creating a monitoring database and stored procedure, and testing access control for specific user‑IP ranges.

Database SecurityInnoDB ClusterRouter
0 likes · 8 min read
Enforcing Client IP‑Based Access Control in MySQL InnoDB Cluster via Router
ITPUB
ITPUB
Jan 10, 2026 · Information Security

How Oracle Secures Databases: Deep‑Defense Strategies and Domestic DB Comparison

This article examines the multi‑layered threats facing modern databases, outlines Oracle's comprehensive security capabilities—from firewalls and encryption to auditing and immutable tables—and compares them with the security features of leading domestic database products.

Database SecurityOracleaccess control
0 likes · 27 min read
How Oracle Secures Databases: Deep‑Defense Strategies and Domestic DB Comparison
Architecture Digest
Architecture Digest
Nov 19, 2025 · Information Security

Preventing SQL Injection: Use Prepared Statements and MyBatis Safely

SQL injection lets attackers turn simple input fields into destructive commands that can delete or compromise databases; the article explains how string‑concatenated queries become vulnerable, demonstrates the attack step‑by‑step, and shows how parameterized queries via PreparedStatement and MyBatis’ #{ } syntax, plus defense‑in‑depth measures, effectively mitigate the risk.

Database SecurityMyBatisParameterized Query
0 likes · 10 min read
Preventing SQL Injection: Use Prepared Statements and MyBatis Safely
Xiao Liu Lab
Xiao Liu Lab
Oct 29, 2025 · Databases

5 Underrated MySQL Security Settings That Block 90% of Attacks

Even if your database appears functional and backed up, a single SQL injection can expose all data; this article reveals five often‑overlooked MySQL security configurations—disabling remote root login, turning off dangerous functions, enabling audit logs, enforcing SSL, and cleaning ghost accounts—to dramatically harden your database in under 30 minutes.

Database SecuritySQL injectionSSL
0 likes · 6 min read
5 Underrated MySQL Security Settings That Block 90% of Attacks
Ops Development & AI Practice
Ops Development & AI Practice
Sep 25, 2025 · Databases

Master Passwordless PostgreSQL Logins: .pgpass, PGPASSWORD, and pg_hba.conf

This guide explains how to bypass interactive password prompts when using psql by configuring a per‑user .pgpass file, setting the PGPASSWORD environment variable for temporary sessions, and adjusting the server‑side pg_hba.conf file, while covering required file formats, permission settings, security trade‑offs, and best‑practice recommendations.

.pgpassDatabase SecurityPGPASSWORD
0 likes · 7 min read
Master Passwordless PostgreSQL Logins: .pgpass, PGPASSWORD, and pg_hba.conf
Raymond Ops
Raymond Ops
Aug 7, 2025 · Databases

How to Enable and Configure MariaDB Audit Logging Plugin

This guide walks you through verifying, installing, configuring, and activating the MariaDB server_audit plugin, including required ConfigMap edits, optional SQL commands, and a Kubernetes rollout to ensure comprehensive audit logging of connections, queries, and table events.

Audit loggingDatabase SecurityKubernetes
0 likes · 4 min read
How to Enable and Configure MariaDB Audit Logging Plugin
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 23, 2025 · Information Security

Securely Rotate Database Credentials with MSE Nacos, KMS, and Apache Druid

This article explains how to protect and dynamically rotate database usernames and passwords in modern applications by integrating MSE Nacos, Alibaba Cloud KMS, and Apache Druid, reducing leakage risk, eliminating manual maintenance, and achieving near‑instant, zero‑downtime credential updates.

Apache DruidDatabase SecurityDynamic Credential Rotation
0 likes · 9 min read
Securely Rotate Database Credentials with MSE Nacos, KMS, and Apache Druid
IT Xianyu
IT Xianyu
Apr 24, 2025 · Databases

PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening

This tutorial explains why DBAs need security hardening and log analysis, shows how to configure minimal‑privilege roles and precise permissions in PostgreSQL, demonstrates how to detect and revoke redundant privileges, and provides a step‑by‑step guide to installing and using pgBadger for log analysis and automated reporting.

DBADatabase SecurityPostgreSQL
0 likes · 8 min read
PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening
Huolala Tech
Huolala Tech
Mar 18, 2025 · Information Security

Mastering MSSQL Attack Chains: Exploit Techniques and Defense Strategies

This article provides a comprehensive analysis of MSSQL attack vectors—including stored procedures, COM components, CLR, sandbox bypass, triggers, proxy jobs, Kerberoasting, and linked servers—detailing prerequisites, exploitation steps with code examples, and practical mitigation recommendations to harden database security.

Attack TechniquesCLRCOM
0 likes · 21 min read
Mastering MSSQL Attack Chains: Exploit Techniques and Defense Strategies
Aikesheng Open Source Community
Aikesheng Open Source Community
Feb 27, 2025 · Information Security

Improving Data Export Workflows and Security: From 1.0 to 2.0 with Classification and Dynamic Approval

This article examines the security challenges of data export work orders in MySQL environments, outlines the shortcomings of the original 1.0 workflow, and presents a comprehensive 2.0 redesign that introduces dynamic approvals, data classification, execution‑plan analysis, and code‑level solutions to mitigate data leakage risks.

Data ExportDatabase SecuritySQL parsing
0 likes · 15 min read
Improving Data Export Workflows and Security: From 1.0 to 2.0 with Classification and Dynamic Approval
Tencent Cloud Developer
Tencent Cloud Developer
Jan 14, 2025 · Information Security

Can Database Signatures Prevent Tampering? An Analysis of Financial Risk Controls

The article revisits the debate on tampering with WeChat balances, explaining that joint database signatures can detect but not stop alterations, that risk‑control checks and code safeguards block unauthorized withdrawals, that identity verification prevents cross‑account transfers, and that a layered, real‑time monitoring system is essential for robust fund protection.

Database SecurityWeChatfinancial fraud
0 likes · 6 min read
Can Database Signatures Prevent Tampering? An Analysis of Financial Risk Controls
Efficient Ops
Efficient Ops
Nov 26, 2024 · Information Security

When Ops Go Wrong: Real Database Deletion Cases and Their Legal Fallout

This article reviews several high‑profile incidents where operations staff deleted or sabotaged critical databases, detailing the legal consequences, financial losses, and lessons for improving security and operational safeguards.

Database Securitydata loss preventioninformation security
0 likes · 7 min read
When Ops Go Wrong: Real Database Deletion Cases and Their Legal Fallout
Efficient Ops
Efficient Ops
Nov 13, 2024 · Information Security

How Leading Companies Stop Insider Data Theft: Real Ops & Security Practices

This article compiles practical insights from Zhihu discussions and real‑world experience on preventing insider spying and tampering with databases, covering least‑privilege policies, mutual supervision, strict access controls, audit mechanisms, and cultural factors that shape effective information security operations.

Database Securityaccess controlaudit
0 likes · 11 min read
How Leading Companies Stop Insider Data Theft: Real Ops & Security Practices
Open Source Tech Hub
Open Source Tech Hub
May 8, 2024 · Databases

How Yearning Automates MySQL SQL Auditing and Rollback – A Complete Guide

Yearning is an open-source MySQL SQL audit platform built with Go and Vue.js that automates statement review, generates rollback scripts, provides audit logging, supports multi-channel notifications, and offers fine-grained permission control, with installation instructions and configuration details for rapid deployment.

Database SecurityGoSQL audit
0 likes · 5 min read
How Yearning Automates MySQL SQL Auditing and Rollback – A Complete Guide
Java Tech Enthusiast
Java Tech Enthusiast
May 3, 2024 · Databases

MySQL Data Recovery: Strategies for Handling Accidental Deletion

The article explains how to respond to accidental MySQL data deletion by analyzing loss causes, choosing recovery methods such as mysqldump backups, binary‑log point‑in‑time restores, or Percona’s InnoDB tool, provides step‑by‑step commands, and recommends preventive practices like regular backups, transactions, and strict permissions.

BinlogData RecoveryDatabase Backup
0 likes · 3 min read
MySQL Data Recovery: Strategies for Handling Accidental Deletion
php Courses
php Courses
Apr 10, 2024 · Information Security

Preventing SQL Injection in PHP Using mysqli_real_escape_string

This article explains how SQL injection attacks can compromise web applications and demonstrates how to securely handle user input in PHP by using the mysqli_real_escape_string function to escape special characters before constructing SQL queries, thereby protecting the database from malicious exploitation.

Database SecurityPHPSQL injection
0 likes · 4 min read
Preventing SQL Injection in PHP Using mysqli_real_escape_string
MaGe Linux Operations
MaGe Linux Operations
Feb 19, 2024 · Databases

Secure MySQL 8 with SSL: Step-by-Step Guide to Encrypt Your Data

Learn how to secure MySQL 8 connections by enabling SSL, covering the protocol’s encryption and authentication principles, generating certificates, configuring server and client settings, and testing the encrypted connection with detailed commands and practical examples.

ConfigurationDatabase SecuritySSL
0 likes · 6 min read
Secure MySQL 8 with SSL: Step-by-Step Guide to Encrypt Your Data
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jan 8, 2024 · Information Security

Understanding SQL Injection and Prevention with Spring Boot and MyBatis

This article explains the concept of SQL injection, demonstrates a vulnerable query example, and provides a step‑by‑step Spring Boot and MyBatis implementation—including table creation, Java controller, service, DAO, mapper, and configuration—to illustrate how proper parameter handling prevents injection attacks.

Database SecurityJavaMyBatis
0 likes · 10 min read
Understanding SQL Injection and Prevention with Spring Boot and MyBatis
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 13, 2023 · Databases

Verifying OceanBase Transparent Data Encryption Using ob_admin dumpsst

This article demonstrates how to configure transparent encryption in OceanBase 4.1.0.0 Enterprise, create encrypted and non‑encrypted tables, perform major merges, and use the ob_admin dumpsst tool to inspect macro blocks, confirming that encrypted data is not readable while non‑encrypted data is visible.

Database SecurityOceanBaseTransparent Encryption
0 likes · 17 min read
Verifying OceanBase Transparent Data Encryption Using ob_admin dumpsst
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 12, 2023 · Databases

Understanding MySQL 8.0 Password Policy Options and Common Misunderstandings

This article analyzes MySQL 8.0 password‑related parameters, explains the meaning of NULL values in the mysql.user table, demonstrates how global settings interact with per‑user attributes, and clarifies the priority rules between password_history and password_reuse_interval through practical test scenarios.

ALTER USERCREATE USERDatabase Administration
0 likes · 9 min read
Understanding MySQL 8.0 Password Policy Options and Common Misunderstandings
ITPUB
ITPUB
Aug 18, 2023 · Databases

Key Takeaways from DTCC2023: Vector Databases, Data Privacy, and Intelligent Ops

The 14th China Database Technology Conference (DTCC2023) showcased cutting‑edge advances in vector databases, data privacy, MySQL security, and AI‑driven intelligent operations, featuring insights from industry leaders at Huawei, Tencent, eBay, Bilibili and more.

AIBig DataDatabase Security
0 likes · 10 min read
Key Takeaways from DTCC2023: Vector Databases, Data Privacy, and Intelligent Ops
Java Architect Essentials
Java Architect Essentials
Aug 13, 2023 · Information Security

How to Perform Fuzzy Searches on Encrypted Data Without Breaking Security

This article examines three categories of approaches—naïve, conventional, and advanced—for enabling fuzzy queries on encrypted fields, comparing their implementation steps, performance trade‑offs, storage costs, and security implications, and provides practical examples such as in‑memory decryption, tag mapping, database functions, tokenization, and algorithm‑level designs.

Database Securityencrypted dataencryption
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data Without Breaking Security
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 27, 2023 · Information Security

Comparison of User Management and Access Control between OceanBase (MySQL Mode) and MySQL

This article compares OceanBase (MySQL mode) and MySQL in terms of user management, password syntax, user locking, permission levels, grant statements, grant tables, network white‑list access control, row‑level security, and role management, highlighting similarities, differences, and migration considerations.

Database SecurityOceanBasePrivileges
0 likes · 18 min read
Comparison of User Management and Access Control between OceanBase (MySQL Mode) and MySQL
Aikesheng Open Source Community
Aikesheng Open Source Community
Feb 3, 2023 · Databases

SQLE 2.2302.0-pre3 Release Notes and Feature Overview

The SQLE 2.2302.0-pre3 release introduces a preview version of the SQL audit tool with enhanced SQL Server audit plugin, new rule support, context-aware auditing, rollback generation, and several UI optimizations, while providing links to repositories, documentation, and demo environments.

Database SecurityRelease NotesSQL Server
0 likes · 4 min read
SQLE 2.2302.0-pre3 Release Notes and Feature Overview
Tencent Cloud Developer
Tencent Cloud Developer
Sep 13, 2022 · Databases

Implementing a Transparent Data Encryption Framework for Database Security

The article presents a transparent data‑encryption framework for database security that uses an AOP‑based driver interceptor to rewrite SQL, encrypt/decrypt sensitive fields, manage performance with locks and caching, support configurable algorithms via SPI/YAML, and guide a three‑phase migration with minimal code intrusion.

Data MigrationDatabase SecurityPerformance Optimization
0 likes · 11 min read
Implementing a Transparent Data Encryption Framework for Database Security
dbaplus Community
dbaplus Community
Jun 26, 2022 · Information Security

How to Build a Lightweight MySQL/MariaDB Audit Log Platform with LogAnalyzer

This guide explains how to set up a lightweight database audit log platform using MariaDB's audit plugin, Rsyslog, and the LogAnalyzer web interface, covering environment preparation, plugin installation, syslog forwarding, MySQL schema creation, and LogAnalyzer configuration for real‑time monitoring and compliance reporting.

Database SecurityLogAnalyzerMariaDB
0 likes · 11 min read
How to Build a Lightweight MySQL/MariaDB Audit Log Platform with LogAnalyzer
21CTO
21CTO
May 18, 2022 · Information Security

Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence

A former Lianjia database administrator was sentenced to seven years for deleting critical financial data, revealing how insider misuse of root privileges, inadequate security response, and ignored vulnerability reports can cripple a multi‑billion‑dollar enterprise, while similar incidents underscore the broader risks of insider threats.

Database Securitydata deletioninformation security
0 likes · 8 min read
Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence
Code Ape Tech Column
Code Ape Tech Column
May 16, 2022 · Information Security

Data Masking with Sharding-JDBC: Concepts, Configuration, and Custom Encryptors

This article explains how Sharding-JDBC can perform data masking at the persistence layer, detailing key concepts, configuration of data sources, encryptors, and tables, demonstrating practical examples with built‑in MD5 and AES encryptors, and showing how to implement custom encryptors and query‑assisted encryption for enhanced security.

Custom EncryptorDatabase SecuritySharding-JDBC
0 likes · 20 min read
Data Masking with Sharding-JDBC: Concepts, Configuration, and Custom Encryptors
Architecture Digest
Architecture Digest
Jan 18, 2022 · Databases

Implementing MyBatis TypeHandler for Field Encryption and Decryption

This article demonstrates how to securely store and retrieve sensitive user data such as phone numbers in a MySQL database by creating a custom MyBatis TypeHandler that automatically encrypts values on insert and decrypts them on query, complete with code examples and configuration steps.

Database SecurityJavaMyBatis
0 likes · 7 min read
Implementing MyBatis TypeHandler for Field Encryption and Decryption
HomeTech
HomeTech
Dec 28, 2021 · Information Security

SQL Injection Vulnerability Analysis and Defense Strategies

This article provides a comprehensive analysis of SQL injection vulnerabilities, covering their principles, testing tools, repair methods, and defense strategies, with practical implementation guidance for secure web application development.

Database SecurityOWASPParameterized Queries
0 likes · 15 min read
SQL Injection Vulnerability Analysis and Defense Strategies
ITPUB
ITPUB
Nov 2, 2021 · Databases

Why Open-Source Databases Like PostgreSQL Boost Security for Hybrid Workforces

Since the pandemic forced remote work, organizations must protect growing data across hybrid teams, and the article argues that open-source databases such as PostgreSQL offer stronger, more adaptable security than legacy closed-source systems by enabling rapid patching, community scrutiny, and cost-effective protection.

Data ProtectionDatabase SecurityPostgreSQL
0 likes · 5 min read
Why Open-Source Databases Like PostgreSQL Boost Security for Hybrid Workforces
dbaplus Community
dbaplus Community
Oct 12, 2021 · Information Security

How d18n Enables Cross‑Platform Data Desensitization for Secure Databases

This article introduces d18n, a Go‑based, cross‑platform data‑desensitization tool that supports multiple databases and file formats, explains common desensitization scenarios, details its sensitive‑data identification techniques—including keyword, regex, and NLP‑based DFA—and outlines six practical masking algorithms with export and import workflows.

Database SecurityGod18n
0 likes · 11 min read
How d18n Enables Cross‑Platform Data Desensitization for Secure Databases
Programmer DD
Programmer DD
Aug 24, 2021 · Databases

Seamless Data Encryption with ShardingSphere: A Spring Guide

This article explains why encrypting sensitive customer data in databases is essential, outlines common pain points, and demonstrates how Apache ShardingSphere’s data‑desensitization module can be quickly configured in Spring (XML and Boot) to provide transparent AES encryption and decryption without altering business code.

AESDatabase SecurityJava
0 likes · 8 min read
Seamless Data Encryption with ShardingSphere: A Spring Guide
Architect's Tech Stack
Architect's Tech Stack
Jul 29, 2021 · Databases

Quick Start Guide to Data Encryption (Masking) with Apache ShardingSphere in Spring and Spring Boot

This article explains how to use Apache ShardingSphere's encryption module to transparently store and query sensitive customer data such as ID numbers and bank cards by configuring encryption rules in Spring or Spring Boot, eliminating manual SQL encryption and simplifying compliance for legacy systems.

Database SecurityJavaSQL Masking
0 likes · 9 min read
Quick Start Guide to Data Encryption (Masking) with Apache ShardingSphere in Spring and Spring Boot
Programmer DD
Programmer DD
Jul 29, 2021 · Databases

Secure Sensitive Data in ShardingSphere: Quick Start Guide for Spring

This tutorial explains why encrypting sensitive fields like ID numbers and bank cards is required, outlines common pain points, and shows how to configure ShardingSphere's data‑desensitization module using Spring namespace or Spring Boot with full code examples and configuration files.

Database SecurityJavaShardingSphere
0 likes · 8 min read
Secure Sensitive Data in ShardingSphere: Quick Start Guide for Spring
Aikesheng Open Source Community
Aikesheng Open Source Community
May 14, 2021 · Databases

Understanding and Managing MySQL User Password Expiration

This article explains the MySQL password expiration mechanism, introduces the relevant columns in the mysql.user table, demonstrates how to set passwords to never expire, expire after a specific interval, or expire immediately, and shows how to configure the global default_password_lifetime variable.

Database SecuritySQLUser Management
0 likes · 10 min read
Understanding and Managing MySQL User Password Expiration
dbaplus Community
dbaplus Community
Apr 25, 2021 · Information Security

Essential MySQL Security Practices: From Storage to Data Encryption

Learn comprehensive MySQL security strategies covering storage RAID configurations, network whitelisting, OS hardening, account management, privilege restrictions, audit logging, regular backups, data encryption, and disaster recovery to protect enterprise data against breaches and ensure stable, high‑performance operations.

BackupDatabase Securityaccess control
0 likes · 13 min read
Essential MySQL Security Practices: From Storage to Data Encryption
Alibaba Cloud Developer
Alibaba Cloud Developer
Jan 4, 2021 · Databases

Why Cloud‑Native Distributed Databases Are the Future of Enterprise Data

The article reviews the evolution of database systems driven by cloud computing, big‑data demands and distributed architectures, highlights Alibaba Cloud’s cloud‑native offerings such as PolarDB and AnalyticDB, and discusses trends, security, and best practices for modern enterprise data platforms.

Alibaba CloudBig DataDatabase Security
0 likes · 14 min read
Why Cloud‑Native Distributed Databases Are the Future of Enterprise Data
ITPUB
ITPUB
Dec 13, 2020 · Information Security

How Hackers Ransom MySQL Databases on the Dark Web

Over 85,000 MySQL databases are being sold on the dark web for around $550 each, with attackers automating ransom portals, demanding Bitcoin payments, and auctioning unpaid data after nine days, while victims share ransom notes across forums and Bitcoin abuse trackers monitor the growing threat.

BitcoinDatabase Securitymysql
0 likes · 5 min read
How Hackers Ransom MySQL Databases on the Dark Web
Programmer DD
Programmer DD
Nov 12, 2020 · Information Security

Uncovering MySQL Exploits: From File Reads to Remote Code Execution

This article provides a comprehensive overview of common MySQL attack techniques—including client‑side arbitrary file reads, SSRF‑based data extraction, server‑side file read/write, remote code execution vulnerabilities (CVE‑2016‑6662), and authentication bypass (CVE‑2012‑2122)—and supplies practical command examples and mitigation insights.

CVEDatabase SecurityExploitation
0 likes · 14 min read
Uncovering MySQL Exploits: From File Reads to Remote Code Execution
Architects Research Society
Architects Research Society
Aug 6, 2020 · Information Security

SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies

This article examines the prevalence of SQL injection attacks, presenting Imperva’s recent statistics, common attack vectors, real-world examples, and practical defenses such as prepared statements, input sanitization, and web application firewalls, while also offering Python code illustrations of secure and insecure database queries.

Database SecurityPythonSQL injection
0 likes · 11 min read
SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies
MaGe Linux Operations
MaGe Linux Operations
Jun 18, 2020 · Databases

Master MongoDB Permissions: From Basic Users to Super Admins

This guide explains MongoDB permission levels, clarifies common misconceptions, and provides step‑by‑step commands to create ordinary, administrative, authorization, and super‑admin users, enable authentication, and verify read/write access across multiple databases.

Database SecurityMongoDBPermissions
0 likes · 7 min read
Master MongoDB Permissions: From Basic Users to Super Admins
ITPUB
ITPUB
Feb 29, 2020 · Information Security

What the Weimeng Database Deletion Reveals About Backup and Permission Strategies

The article analyzes the recent Weimeng data‑loss incident, explains why recovery took 36 hours, highlights insider abuse, and offers a practical guide for small and large teams covering reliable backups, minimal‑privilege management, and cloud‑based disaster‑recovery solutions.

Database SecurityPrivilege Managementbackup strategy
0 likes · 9 min read
What the Weimeng Database Deletion Reveals About Backup and Permission Strategies
ITPUB
ITPUB
Feb 26, 2020 · Information Security

What We Learned from the Weimeng Data Deletion Disaster: Backup and Permission Strategies

The article analyzes the recent Weimeng database deletion incident, explains why recovery took 36 hours, and provides practical guidance on backup practices, minimal‑privilege management, and cloud‑based disaster recovery to prevent similar data loss in small and large organizations.

BackupDatabase SecurityOperations
0 likes · 9 min read
What We Learned from the Weimeng Data Deletion Disaster: Backup and Permission Strategies
JD Tech Talk
JD Tech Talk
Sep 5, 2019 · Information Security

Comprehensive Solution for Data Masking with Apache ShardingSphere (Part 2)

This article explains how to use Apache ShardingSphere's data‑masking (encryption) features to protect both new and existing MySQL/Oracle/PostgreSQL/SQLServer workloads, providing detailed YAML configurations, migration steps, advantages, applicable scenarios, and limitations for secure database operations.

Database SecurityEncrypt-JDBCShardingSphere
0 likes · 12 min read
Comprehensive Solution for Data Masking with Apache ShardingSphere (Part 2)
dbaplus Community
dbaplus Community
Aug 22, 2019 · Information Security

Transparent Data Masking with Apache ShardingSphere for New and Legacy Apps

Apache ShardingSphere provides a complete, transparent, low‑cost data masking solution that lets both new and existing applications encrypt sensitive fields without modifying business SQL, using Encrypt‑JDBC or Encrypt‑Proxy, configurable encryption rules, and step‑by‑step migration guidance for seamless, secure database transformations.

Database SecurityEncrypt-JDBCShardingSphere
0 likes · 19 min read
Transparent Data Masking with Apache ShardingSphere for New and Legacy Apps
Programmer DD
Programmer DD
Jul 12, 2019 · Databases

Critical Redis Remote Code Execution Flaw (CNVD‑2019‑21763): Risks & Fixes

A high‑severity Redis remote command execution vulnerability (CNVD‑2019‑21763) discovered in July 2019 allows unauthenticated attackers to load malicious modules and execute arbitrary code, affecting Redis 2.x‑5.x, with no official patch yet and only temporary mitigation steps available.

CNVDDatabase SecurityRemote Code Execution
0 likes · 3 min read
Critical Redis Remote Code Execution Flaw (CNVD‑2019‑21763): Risks & Fixes
NetEase Game Operations Platform
NetEase Game Operations Platform
Dec 14, 2018 · Information Security

Database Injection Attacks: Principles, Exploits, and Defense Strategies

This article explains why database injection remains a critical security threat, illustrates how attackers exploit vulnerable web applications using manual techniques and automated tools such as sqlmap, and provides comprehensive defensive measures spanning secure coding, database hardening, web‑server configuration, WAF deployment, and log‑analysis to protect sensitive data.

Database SecuritySQL injectionSQLMap
0 likes · 17 min read
Database Injection Attacks: Principles, Exploits, and Defense Strategies
ITPUB
ITPUB
Jan 3, 2018 · Information Security

How Ransomware Hijacks MySQL and What You Can Do to Stop It

The article explains how attackers compromise MySQL servers, create a WARNING table with ransom instructions demanding Bitcoin, and provides concrete SQL examples and four practical defense measures—including strong authentication, disabling public access, regular backups, and application hardening—to protect databases.

AuthenticationDatabase SecuritySQL injection
0 likes · 6 min read
How Ransomware Hijacks MySQL and What You Can Do to Stop It
Tencent Database Technology
Tencent Database Technology
Nov 29, 2017 · Information Security

Database Auditing: Concepts and Methods

Database auditing involves monitoring and recording database activities to detect and prevent security breaches, with methods ranging from application layer to kernel-level implementations across different database systems.

Database AuditingDatabase Securityinformation-security
0 likes · 17 min read
Database Auditing: Concepts and Methods
dbaplus Community
dbaplus Community
Nov 20, 2017 · Databases

Enabling IP Whitelisting in MongoDB 3.6: A Step‑by‑Step Guide

MongoDB 3.6 introduces authentication restrictions that let you enforce IP whitelists for both client and server connections, and this guide walks through creating a user, configuring bind_ip, restarting the server, and verifying the setup with concrete commands and screenshots.

Database SecurityIP whitelistMongoDB
0 likes · 5 min read
Enabling IP Whitelisting in MongoDB 3.6: A Step‑by‑Step Guide
UCloud Tech
UCloud Tech
Sep 5, 2017 · Information Security

How MongoDB Attacks Happen and What UCloud Does to Secure Your Data

The article explains why thousands of MongoDB instances are repeatedly compromised—due to password‑less logins and public exposure—details the inherent design flaws, and describes UCloud’s UDB MongoDB security measures such as mandatory authentication, VPC isolation, data backup, and performance‑friendly connection pooling.

AuthenticationDatabase SecurityMongoDB
0 likes · 6 min read
How MongoDB Attacks Happen and What UCloud Does to Secure Your Data
MaGe Linux Operations
MaGe Linux Operations
Aug 22, 2017 · Databases

Essential DBA Playbook: Avoid Common MySQL Mistakes and Master Database Operations

This comprehensive guide shares a senior DBA's hard‑learned lessons on MySQL environment awareness, security, configuration, routine operations, architecture, business understanding, and mindset, offering practical tips and tools to prevent costly mistakes and improve operational confidence.

DBA Best PracticesDatabase AdministrationDatabase Security
0 likes · 18 min read
Essential DBA Playbook: Avoid Common MySQL Mistakes and Master Database Operations
21CTO
21CTO
Jun 6, 2017 · Information Security

How to Search Encrypted Database Fields Securely with Blind Indexes

This article explains why deterministic encryption like ECB is unsafe for sensitive data, introduces nondeterministic authenticated encryption, and provides a practical blind‑index technique with PHP and SQL examples for searchable encryption of fields such as Social Security numbers.

Database SecurityPHPSQL
0 likes · 14 min read
How to Search Encrypted Database Fields Securely with Blind Indexes
dbaplus Community
dbaplus Community
Apr 4, 2017 · Information Security

Mastering Database Injection: Real‑World Attacks, Tools, and Defense Strategies

This comprehensive guide explains why database injection remains a critical security threat, illustrates real‑world attack techniques and toolchains, and provides layered defensive measures—from secure coding and DB‑proxy solutions to web‑server filtering, WAF deployment, and log‑analysis pipelines.

Database SecurityDefense StrategiesSQL injection
0 likes · 24 min read
Mastering Database Injection: Real‑World Attacks, Tools, and Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Mar 1, 2017 · Information Security

MySQL Ransomware Attacks: Security Analysis and Hardening Guide

MySQL has become a ransomware target because many servers expose the database to the internet with empty or weak passwords, so administrators should audit open ports, enforce strong authentication, restrict access via security groups or iptables, bind services to internal IPs, and avoid using root or high‑privilege accounts to harden MySQL, MongoDB, and Redis against compromise.

Database SecurityMongoDB hardeningMySQL security
0 likes · 8 min read
MySQL Ransomware Attacks: Security Analysis and Hardening Guide
ITPUB
ITPUB
Jan 16, 2017 · Information Security

Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do

Thousands of MongoDB databases were erased and replaced with ransom demands, yet almost no victims recovered their data, highlighting widespread misconfigurations, public exposure on Shodan, and the urgent need for proper security hardening of MongoDB deployments.

Database SecurityMongoDBShodan
0 likes · 4 min read
Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jan 10, 2017 · Information Security

8 Proven Strategies to Secure MongoDB and Prevent Ransomware

This article outlines eight practical measures—including changing the default port, blocking public access, running MongoDB under non‑root users, enabling authentication, tightening permissions, implementing robust backup and recovery plans, and encrypting sensitive data—to dramatically improve MongoDB security and keep ransomware at bay.

Database SecurityMongoDBRansomware Prevention
0 likes · 9 min read
8 Proven Strategies to Secure MongoDB and Prevent Ransomware
ITPUB
ITPUB
Nov 8, 2016 · Databases

Master MySQL User Permissions: Creation, Grants, and Best Practices

This guide explains how to create MySQL users, assign and manage privileges with GRANT, FLUSH, and REVOKE commands, and provides comprehensive best‑practice recommendations for naming, table design, indexing, and SQL optimization to secure and streamline database operations.

Database SecuritySQLmysql
0 likes · 15 min read
Master MySQL User Permissions: Creation, Grants, and Best Practices
360 Quality & Efficiency
360 Quality & Efficiency
Nov 1, 2016 · Information Security

Understanding SQL Injection Attacks and Defensive Techniques

The article reviews the author’s experience with security testing, explains the severe risks of SQL injection, demonstrates vulnerable server‑side code, and provides practical remediation methods such as input sanitization, type casting, and using prepared statements with PDO.

Database SecurityPDOSQL injection
0 likes · 5 min read
Understanding SQL Injection Attacks and Defensive Techniques
ITPUB
ITPUB
Aug 14, 2016 · Databases

14 Essential MySQL Security Practices to Protect Your Data

This guide outlines essential MySQL security measures—including removing default accounts, disabling unsafe LOCAL INFILE commands, enforcing strict user role permissions, encrypting sensitive data, ensuring data integrity through replication and backups, and standardizing operational practices—to protect database assets from irreversible breaches.

Database Securityaccess controldata integrity
0 likes · 6 min read
14 Essential MySQL Security Practices to Protect Your Data
ITPUB
ITPUB
Jul 21, 2016 · Information Security

How to Harden Oracle Database Security: Practical Hardening Steps

This guide outlines comprehensive Oracle database security hardening measures, covering system‑level protections, disaster‑recovery configuration, account privilege tightening, data access controls, network restrictions, password policies, audit settings, and patch management, with concrete commands and configuration examples for each step.

DataGuardDatabase SecurityHardening
0 likes · 19 min read
How to Harden Oracle Database Security: Practical Hardening Steps
dbaplus Community
dbaplus Community
Jun 26, 2016 · Databases

What’s New in MySQL 5.7? 16 Essential Features Every DBA Should Know

This article reviews the most important MySQL 5.7 enhancements—including stronger authentication, password expiration, account locking, simplified SSL, safer initialization, updated SQL_MODE, online DDL improvements, CJK full‑text support, temporary‑table optimizations, spatial data types, and NVM‑specific tweaks—providing practical guidance and configuration examples for DBAs.

5.7Database SecuritySQL Mode
0 likes · 11 min read
What’s New in MySQL 5.7? 16 Essential Features Every DBA Should Know
ITPUB
ITPUB
Jun 20, 2016 · Databases

Why Any MySQL User Can Access test* Databases and How to Fix It

This article explains that MySQL’s default mysql.db entries grant every user full privileges on databases named test or starting with test_, demonstrates the issue with a read‑only account, and shows how deleting those rows removes the unintended access.

Database SecurityPermissionsmysql
0 likes · 6 min read
Why Any MySQL User Can Access test* Databases and How to Fix It
ITPUB
ITPUB
Jun 15, 2016 · Information Security

How to Exploit and Defend Against MongoDB Injection Attacks

This article explains why MongoDB is chosen, demonstrates practical PHP injection techniques against MongoDB queries, shows how to enumerate databases and collections, and provides concrete defensive measures such as using implode(), addslashes() and regex sanitization to prevent attacks.

Database SecurityDefensive CodingMongoDB
0 likes · 5 min read
How to Exploit and Defend Against MongoDB Injection Attacks
Big Data and Microservices
Big Data and Microservices
Mar 28, 2016 · Information Security

Understanding Database SQL Injection: Types, Examples, and Defense Strategies

The article examines why databases are frequent targets of security breaches, explains the most common SQL injection vulnerability, categorizes injection paths, methods, and examples—including manipulation, code, function‑call, and buffer‑overflow attacks—then outlines practical defense measures such as input encryption, database firewalls, and patching.

Code InjectionDatabase SecurityOracle
0 likes · 14 min read
Understanding Database SQL Injection: Types, Examples, and Defense Strategies
dbaplus Community
dbaplus Community
Dec 7, 2015 · Information Security

How to Build Robust Database Security: Logical and Physical Protection Strategies

This article explains why protecting database‑stored sensitive data is critical, analyzes common attack vectors and breach statistics, and provides detailed logical and physical security measures—including user and permission management, auditing, encryption, disaster‑recovery planning, and Oracle replication technologies—to help organizations achieve comprehensive database protection.

Database SecurityOracleaccess control
0 likes · 20 min read
How to Build Robust Database Security: Logical and Physical Protection Strategies
ITPUB
ITPUB
Nov 23, 2015 · Databases

Essential MySQL Security Checklist: 14 Steps to Harden Your Database

To protect MySQL databases from unauthorized access and performance issues, this guide outlines fourteen essential security measures—including restricting remote access, regular backups, disabling default accounts, tightening user privileges, securing configuration files, and enabling logging—providing concrete commands and configuration snippets for robust protection.

BackupConfigurationDatabase Security
0 likes · 11 min read
Essential MySQL Security Checklist: 14 Steps to Harden Your Database