Tagged articles
7 articles
Page 1 of 1
Tech Freedom Circle
Tech Freedom Circle
Jan 24, 2026 · Operations

How to Tackle Excess Connections, DDoS/DoS, CORS and XSS Attacks – A Complete Practical Guide

This article walks through a systematic, production‑grade approach to diagnosing and mitigating connection‑overload, DoS/DDoS, XSS and cross‑origin attacks, covering log analysis, Linux kernel tuning, Nginx rate‑limiting, CDN/DDoS‑protection layers, WAF rules, safe rendering practices, and a hardened CORS configuration template.

BackendCORSDDoS mitigation
0 likes · 48 min read
How to Tackle Excess Connections, DDoS/DoS, CORS and XSS Attacks – A Complete Practical Guide
IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules

This article explains how to protect systems from massive malicious traffic reaching millions of queries per second by combining gateway rate limiting, distributed circuit breaking, device fingerprinting, behavior analysis, dynamic rule engines, and real‑time risk scoring, illustrated with Nginx‑Lua, Sentinel, Drools, and Flink examples.

Backend SecurityDDoS mitigationdevice fingerprinting
0 likes · 15 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules
Su San Talks Tech
Su San Talks Tech
Dec 21, 2022 · Information Security

Block Malicious IPs on a Small Linux Site with iptables and Cron

This guide explains how to detect traffic attacks on a low‑traffic Linux website, split Nginx logs daily, identify IPs with excessive requests, and automatically block them using iptables rules scheduled via cron, complete with ready‑to‑run Bash scripts and common firewall commands.

BashDDoS mitigationLinux
0 likes · 9 min read
Block Malicious IPs on a Small Linux Site with iptables and Cron
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 11, 2019 · Cloud Computing

Anycast Technology Overview and Its Application in Internal DNS System Deployment

Anycast assigns a single IP to multiple distributed DNS nodes, automatically routing queries to the nearest healthy server, which balances load, mitigates DDoS, and provides sub‑second failover; iQIYI’s internal tests confirmed UDP and TCP compatibility, enabling a self‑healing DNS deployment across data centers that cuts operational complexity and prepares for broader service use.

AnycastDDoS mitigationDNS
0 likes · 7 min read
Anycast Technology Overview and Its Application in Internal DNS System Deployment
Efficient Ops
Efficient Ops
May 11, 2017 · Information Security

Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies

This article shares practical insights from a security director at YY Live, detailing the complex Linux security landscape, common vulnerabilities, real‑world attack techniques such as Redis abuse and privilege escalation, and a multi‑layered defense approach that balances rapid business iteration with robust protection.

DDoS mitigationLinux securityVulnerability Management
0 likes · 21 min read
Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies
ITPUB
ITPUB
Feb 25, 2016 · Information Security

Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate

This guide explains how to protect Linux servers from SYN flood and DDoS attacks by tuning sysctl parameters, applying iptables rules, installing the free DDoS‑deflate script, and monitoring nginx logs to identify and block malicious IPs and user agents.

DDoS mitigationLinuxfirewall
0 likes · 10 min read
Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate