Tagged articles
431 articles
Page 1 of 5
Architect's Guide
Architect's Guide
May 6, 2026 · Backend Development

Quickly Implement API Encryption in Spring Boot with a Single Library

This article walks through using RSA to encrypt Spring Boot API responses, covering the theory behind RSA, two security scenarios, Maven dependency setup, configuration, controller annotations, encryption/decryption code, a front‑end JavaScript example, common pitfalls, and a final security summary.

BackendJavaRSA
0 likes · 11 min read
Quickly Implement API Encryption in Spring Boot with a Single Library
Java Architect Handbook
Java Architect Handbook
Apr 21, 2026 · Information Security

How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide

This article explains RSA encryption fundamentals, illustrates two practical scenarios, and walks through creating a Spring Boot project, adding Maven dependencies, configuring RSA keys, annotating controllers for automatic encryption/decryption, testing the endpoints, and handling client‑side encryption with JavaScript, while highlighting common pitfalls.

API SecurityBackendJava
0 likes · 13 min read
How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide
dbaplus Community
dbaplus Community
Apr 9, 2026 · Information Security

Designing Practical Encrypted Storage for Sensitive User Data

This article explains why encrypting sensitive fields like passwords, phone numbers, and ID numbers is essential, details a balanced approach using AES‑GCM encryption, HMAC indexes, and masked fields, and shares real‑world lessons from implementing the solution in a production system.

AES-GCMDatabase designHMAC
0 likes · 21 min read
Designing Practical Encrypted Storage for Sensitive User Data
ITPUB
ITPUB
Mar 30, 2026 · Information Security

Essential Network Security FAQ: 100+ Key Concepts Explained

This comprehensive guide defines network security, outlines its core attributes, enumerates common threats and attack types, and provides practical mitigation strategies, covering everything from encryption basics and access controls to advanced topics like zero‑day vulnerabilities, zero‑trust architecture, and security automation.

Threatsaccess controlcybersecurity
0 likes · 44 min read
Essential Network Security FAQ: 100+ Key Concepts Explained
Lisa Notes
Lisa Notes
Mar 25, 2026 · Fundamentals

Java Basics: Encryption and Multiplication Table Examples for Beginners

This tutorial walks through two Java examples—a simple Caesar‑style encryption/decryption program that shifts letters by four positions and a nested‑loop implementation of the 9×9 multiplication table—explaining the logic, code, and output step by step.

JavaLoopsencryption
0 likes · 8 min read
Java Basics: Encryption and Multiplication Table Examples for Beginners
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases

The article walks through six real penetration‑testing scenarios, dissecting common encryption and authentication mechanisms in mini‑programs and web applications, demonstrating how to reverse‑engineer, debug, and script the bypass of Hawk signatures, MD5 timestamps, RSA and AES encryptions to achieve unauthorized data access and account takeover.

AESAuthentication BypassHawk protocol
0 likes · 13 min read
Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases
ITPUB
ITPUB
Mar 23, 2026 · Information Security

Essential Network Security Q&A: From Fundamentals to Advanced Threats

This comprehensive guide answers 100 common network security questions, covering basic concepts, core properties, threat sources, attack types, encryption methods, access controls, incident response, and emerging technologies such as zero‑trust, quantum encryption, and SOAR.

ThreatsVulnerabilityaccess control
0 likes · 44 min read
Essential Network Security Q&A: From Fundamentals to Advanced Threats
Selected Java Interview Questions
Selected Java Interview Questions
Mar 3, 2026 · Backend Development

Automate Sensitive Data Encryption in MyBatis with Annotations and Interceptors

This article explains how to replace manual encryption code with a lightweight, annotation‑driven solution that uses a custom MyBatis interceptor to automatically encrypt and decrypt sensitive fields such as phone numbers, emails, and ID cards, improving code readability, maintainability, and security compliance.

InterceptorJavaMyBatis
0 likes · 20 min read
Automate Sensitive Data Encryption in MyBatis with Annotations and Interceptors
IT Services Circle
IT Services Circle
Mar 2, 2026 · Information Security

Why HTTPS Beats HTTP: Encryption, Certificates, and TLS Handshake Explained

This article explains why HTTP is insecure—prone to eavesdropping, tampering, and identity spoofing—and how HTTPS uses symmetric and asymmetric encryption, hash functions, digital certificates, and a four‑step SSL/TLS handshake to provide confidentiality, integrity, and authentication for web traffic.

HTTPSSSL handshakeTLS
0 likes · 17 min read
Why HTTPS Beats HTTP: Encryption, Certificates, and TLS Handshake Explained
Architect's Guide
Architect's Guide
Mar 2, 2026 · Information Security

Essential API Security Measures and How to Implement Them

This article outlines key API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist control, and data validation—and provides practical Java code examples and implementation guidelines for each technique.

API SecurityAppIddata validation
0 likes · 10 min read
Essential API Security Measures and How to Implement Them
Black & White Path
Black & White Path
Feb 20, 2026 · Information Security

How Microsoft’s BitLocker Key Sharing Let the FBI Unlock a Windows Laptop

A recent U.S. court case revealed that Microsoft can hand over BitLocker recovery keys to law enforcement, allowing the FBI to bypass Windows encryption and access a suspect's laptop, prompting a discussion of the privacy trade‑offs and steps users can take to regain control of their keys.

BitLockerWindowsencryption
0 likes · 6 min read
How Microsoft’s BitLocker Key Sharing Let the FBI Unlock a Windows Laptop
Black & White Path
Black & White Path
Feb 19, 2026 · Information Security

How to Hard‑Code the Encryption Key of a WeChat Public Account

The article walks through a security test of a WeChat public account that uses AES‑encrypted payloads, RSA‑encrypted keys, and an MD5 signature, showing how the author first tried memory editing with Cheat Engine, then succeeded by intercepting and modifying the JavaScript in Burp Suite to fix the key, and finally summarises why front‑end encryption can be bypassed.

Burp SuiteFront-end securityJavaScript
0 likes · 7 min read
How to Hard‑Code the Encryption Key of a WeChat Public Account
Test Development Learning Exchange
Test Development Learning Exchange
Jan 28, 2026 · Information Security

One-Line Python Decorator to Auto‑Encrypt, Sign, and Secure API Requests

Learn how to replace repetitive manual signing, encryption, timestamp, and nonce handling in API tests with a single Python @secure_request decorator that automatically encrypts specified fields, adds security parameters, generates signatures, and sends the request, improving maintainability and reducing errors.

API SecurityDecoratorencryption
0 likes · 9 min read
One-Line Python Decorator to Auto‑Encrypt, Sign, and Secure API Requests
Architecture Digest
Architecture Digest
Jan 26, 2026 · Databases

How to Securely Backup Your Databases with the Open‑Source Databasus Tool

Databasus is a free, self‑hosted open‑source backup solution that supports PostgreSQL, MySQL, MariaDB and MongoDB, offers flexible scheduling, multiple storage backends, enterprise‑grade encryption, team collaboration features, and can be installed via a Linux script or Docker with detailed usage steps.

AutomationDatabase BackupDocker
0 likes · 7 min read
How to Securely Backup Your Databases with the Open‑Source Databasus Tool
360 Smart Cloud
360 Smart Cloud
Jan 20, 2026 · Information Security

How to Secure APIs: Core Risks and Multi‑Layer Defense Strategies

This article outlines the four primary API security risks—malicious calls, data tampering, sensitive data leakage, and XSS propagation—and presents a comprehensive, multi‑layered protection framework spanning frontend safeguards, firewalls, gateways, and fine‑grained API design guidelines within APICloud.

API SecurityAuthenticationencryption
0 likes · 12 min read
How to Secure APIs: Core Risks and Multi‑Layer Defense Strategies
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 23, 2025 · Frontend Development

Generate Multi‑Page PDFs Directly in the Browser with dompdf.js

dompdf.js v1.1.0 lets developers convert HTML to searchable, lightweight, multi‑page PDFs entirely on the front end, fixing blur, large size, and inaccurate pagination issues, and provides features such as custom headers/footers, encryption, compression, font handling, and browser‑compatible rendering options.

JavaScriptdompdf.jsencryption
0 likes · 12 min read
Generate Multi‑Page PDFs Directly in the Browser with dompdf.js
Top Architect
Top Architect
Dec 21, 2025 · Information Security

Securing API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS Principles

This article presents a comprehensive design for API request and response protection that combines symmetric and asymmetric encryption, HTTPS fundamentals, and WeChat Pay specific cryptographic mechanisms, detailing key exchange, data signing, parameter handling, implementation code, common pitfalls, and a security analysis.

API SecurityHTTPSJava
0 likes · 14 min read
Securing API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS Principles
IT Services Circle
IT Services Circle
Dec 13, 2025 · Information Security

Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data

This article explains how HTTPS upgrades plain HTTP by adding authentication, encryption, and integrity checks, walks through its three security layers, traces the protocol’s evolution from SSL 2.0 to TLS 1.3, and discusses the practical benefits, costs, and adoption challenges of securing web traffic.

HTTPSSSLTLS
0 likes · 16 min read
Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data
Ray's Galactic Tech
Ray's Galactic Tech
Dec 8, 2025 · Databases

Build a Production-Ready Automated MySQL Backup with mydumper

Learn how to install mydumper on various Linux distributions, use its multithreaded, compressed, and incremental backup features, and deploy a robust Bash script that automates full and incremental MySQL backups, handles encryption, cleanup, logging, notifications, and restoration with myloader.

AutomationBackupcron
0 likes · 10 min read
Build a Production-Ready Automated MySQL Backup with mydumper
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 7, 2025 · Information Security

How to Secure AI Vector Embeddings in MySQL: Risks and Best Practices

AI applications rely on vector embeddings for search and recommendation, but these rich vectors expose new security and privacy threats; this article explains the main risks, attack methods, and mature MySQL strategies—including secure storage, access control, encryption, auditing, and compliance—to protect vector data.

AI securityData Protectionaccess control
0 likes · 12 min read
How to Secure AI Vector Embeddings in MySQL: Risks and Best Practices
Architect
Architect
Dec 5, 2025 · Information Security

How to Secure API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS

This guide explains a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, HTTPS principles, and WeChat Pay encryption to protect against crawlers, tampering, replay attacks, and ensure data integrity, complete with design rationale, implementation steps, code examples, and security analysis.

JavaWeChat Payasymmetric encryption
0 likes · 13 min read
How to Secure API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS
Ray's Galactic Tech
Ray's Galactic Tech
Dec 4, 2025 · Information Security

How to Secure Phone Numbers in Databases: Threat Modeling, Envelope Encryption, and High‑Performance Key Rotation

This guide presents a comprehensive, enterprise‑grade solution for encrypting phone numbers in databases, covering threat modeling, layered schema design, envelope encryption with KMS, Python service implementation, searchable indexes, key rotation, performance tuning, auditing, and common pitfalls.

AES-GCMKMSPython
0 likes · 11 min read
How to Secure Phone Numbers in Databases: Threat Modeling, Envelope Encryption, and High‑Performance Key Rotation
NiuNiu MaTe
NiuNiu MaTe
Dec 3, 2025 · Information Security

How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption

This article explains why HTTPS is essential for secure web communication, detailing how it upgrades plain HTTP by adding certificate‑based identity verification, TLS handshake negotiation, and AES‑GCM encryption with MAC verification to protect against eavesdropping, tampering, and phishing attacks.

CertificateHTTPSSSL
0 likes · 16 min read
How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption
Xiaolei Talks DB
Xiaolei Talks DB
Nov 25, 2025 · Databases

What’s New in MongoDB 8.2? Performance Boosts, AI Features, and Multi‑Cloud Power

The article reviews MongoDB 8.2’s major upgrades, highlighting up to 36% read throughput gains, 59% write speed improvements, 200% faster time‑series aggregation, 50‑fold faster shard rebalancing, enhanced queryable encryption, native vector search, multi‑cloud Atlas support, and AI‑driven capabilities such as hybrid search and the MongoDB AMP platform.

AIMongoDBdatabase
0 likes · 7 min read
What’s New in MongoDB 8.2? Performance Boosts, AI Features, and Multi‑Cloud Power
Raymond Ops
Raymond Ops
Nov 21, 2025 · Information Security

Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This article explains the fundamentals of SSL/TLS, why transport‑layer encryption is essential, and provides a hands‑on guide to using OpenSSL on Linux for symmetric and asymmetric encryption, hashing, password generation, random number creation, and base64 encoding with clear command‑line examples.

Command-lineLinuxOpenSSL
0 likes · 12 min read
Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
Ray's Galactic Tech
Ray's Galactic Tech
Nov 2, 2025 · Information Security

How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption

To protect sensitive data in third‑party API integrations, this guide outlines a three‑layer security architecture—mutual TLS for channel protection, HMAC‑based request signing for integrity, and RSA encryption for data confidentiality—plus key management, monitoring, performance considerations, and implementation roadmaps.

API SecurityHMACRSA
0 likes · 10 min read
How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption
Architecture Digest
Architecture Digest
Oct 14, 2025 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article explores the challenges of fuzzy searching encrypted data, categorizes three implementation approaches—naïve, conventional, and advanced—examines their trade‑offs, provides practical examples and performance calculations, and offers recommendations for secure and efficient query solutions.

Securitydatabaseencryption
0 likes · 10 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
IT Architects Alliance
IT Architects Alliance
Oct 12, 2025 · Information Security

How to Secure Cross‑Region Access in Cloud Environments with Zero Trust

This article explores the complexities of cross‑region access control in cloud architectures, detailing latency, identity consistency, and policy uniformity challenges, and presents zero‑trust designs, distributed identity storage, multi‑layer encryption, edge policy execution, and monitoring strategies to achieve secure, high‑performance global access.

Identity ManagementPolicy Enginecloud security
0 likes · 12 min read
How to Secure Cross‑Region Access in Cloud Environments with Zero Trust
Architect's Tech Stack
Architect's Tech Stack
Sep 29, 2025 · Backend Development

Unlock Java Productivity: How Hutool Simplifies Common Tasks

This article introduces the open‑source Java utility library Hutool, showcasing how its concise APIs for date handling, file I/O, HTTP requests, encryption, and general utilities can dramatically reduce boiler‑plate code and boost developer efficiency.

HTTPJavaUtility Library
0 likes · 8 min read
Unlock Java Productivity: How Hutool Simplifies Common Tasks
AndroidPub
AndroidPub
Sep 28, 2025 · Mobile Development

How to Secure Your Android Room Database with SQLCipher and Keystore

Learn step-by-step how to encrypt an Android Room database using SQLCipher, generate a random AES-256 key, protect it with the Android Keystore, and ensure the key is cleared from memory, providing production-grade data security against reverse engineering and local tampering.

Mobile SecurityRoomSQLCipher
0 likes · 7 min read
How to Secure Your Android Room Database with SQLCipher and Keystore
AndroidPub
AndroidPub
Sep 22, 2025 · Mobile Development

Why EncryptedSharedPreferences Is Deprecated and What to Use Instead on Android

The article explains why Google deprecated EncryptedSharedPreferences and EncryptedFile, outlines the limitations of ESP, and guides developers on modern alternatives like Jetpack DataStore, Tink encryption library, and custom encrypted DataStore implementations for secure Android storage.

AndroidDataStoreEncryptedSharedPreferences
0 likes · 9 min read
Why EncryptedSharedPreferences Is Deprecated and What to Use Instead on Android
Java Tech Enthusiast
Java Tech Enthusiast
Sep 7, 2025 · Information Security

How to Protect Java Applications from Decompilation: Proven Techniques

This article explains why Java bytecode is easy to decompile and presents several practical protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—while discussing their strengths, weaknesses, and real‑world application examples.

ObfuscationSecuritydecompilation
0 likes · 12 min read
How to Protect Java Applications from Decompilation: Proven Techniques
Linux Tech Enthusiast
Linux Tech Enthusiast
Sep 7, 2025 · Information Security

Essential Truths You Must Know About Using VPNs

The article explains what a VPN is, clarifies its legal status in various countries, debunks common myths about privacy, describes how VPNs act as encrypted proxies requiring trust in providers, and offers guidance on selecting a reliable service or building your own.

ProxyVPNencryption
0 likes · 6 min read
Essential Truths You Must Know About Using VPNs
php Courses
php Courses
Sep 5, 2025 · Information Security

How to Secure Data in PHP: HTTPS, Hashing, Prepared Statements, and Encryption

This guide explains essential PHP techniques for protecting sensitive data, covering HTTPS usage, password hashing algorithms, prepared statements to prevent SQL injection, encryption methods like AES and RSA, and CAPTCHA implementation, with clear code examples for each security measure.

CaptchaHTTPSPrepared Statements
0 likes · 4 min read
How to Secure Data in PHP: HTTPS, Hashing, Prepared Statements, and Encryption
Architect's Guide
Architect's Guide
Sep 4, 2025 · Information Security

How to Secure Public APIs: Essential Measures and Java Implementation Guide

This article outlines essential security measures for public APIs—including data encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—explaining why each is needed and providing concrete Java implementation examples such as HTTPS, MD5 signatures, token‑bucket algorithms, and RateLimiter usage.

API SecurityAppIdencryption
0 likes · 10 min read
How to Secure Public APIs: Essential Measures and Java Implementation Guide
Chen Tian Universe
Chen Tian Universe
Aug 25, 2025 · Information Security

Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud

Payment security encompasses protecting sensitive data, preventing transaction tampering, fraud, and service attacks; this comprehensive guide details the main threats, core safeguards such as encrypted storage and transmission, digital signatures, PCI compliance, key management, and practical encryption algorithms like AES and RSA for robust, real‑world implementations.

PCI compliancedigital signaturesencryption
0 likes · 50 min read
Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud
Liangxu Linux
Liangxu Linux
Aug 24, 2025 · Information Security

Master OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This guide explains the fundamentals of SSL/TLS, why transport‑layer encryption is used, and provides step‑by‑step Linux OpenSSL commands for symmetric and asymmetric encryption, decryption, hashing, password generation, random data creation, and Base64 encoding, complete with examples and key options.

Base64LinuxOpenSSL
0 likes · 11 min read
Master OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
大转转FE
大转转FE
Aug 5, 2025 · Information Security

Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data

With SSL/TLS certificates now limited to 13 months and soon to just 47 days, this article explains why encryption is essential, details symmetric and asymmetric cryptography, illustrates HTTPS handshake and certificate verification, and shows how these mechanisms protect against man‑in‑the‑middle attacks.

CertificateHTTPSMITM
0 likes · 22 min read
Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data
Su San Talks Tech
Su San Talks Tech
Jul 15, 2025 · Information Security

Master the 7 Most Essential Encryption Algorithms for Secure Systems

Explore the seven most commonly used encryption algorithms—including MD5, SHA families, HMAC, AES, DES/3DES, RSA, and DSA—detailing their principles, Java implementations, performance, and practical security guidelines, while highlighting real-world attack scenarios and best‑practice recommendations for robust information protection.

HashingJavaasymmetric encryption
0 likes · 9 min read
Master the 7 Most Essential Encryption Algorithms for Secure Systems
MaGe Linux Operations
MaGe Linux Operations
Jun 22, 2025 · Information Security

Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This guide explains the fundamentals of SSL/TLS, why encryption occurs at the transport layer, and provides comprehensive OpenSSL command‑line examples for symmetric encryption/decryption, asymmetric key generation, hashing, password creation, and random number generation, illustrating each operation with clear syntax and usage notes.

OpenSSLSSLTLS
0 likes · 14 min read
Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
Raymond Ops
Raymond Ops
Jun 18, 2025 · Information Security

How SSH Secures Remote Logins: From Basics to Practical Setup

This article explains SSH as a secure remote login protocol, covering its encryption principles, protection against man‑in‑the‑middle attacks, password and public‑key authentication methods, key generation commands, and essential configuration files like known_hosts and authorized_keys.

Public Key AuthenticationSSHencryption
0 likes · 11 min read
How SSH Secures Remote Logins: From Basics to Practical Setup
JavaScript
JavaScript
Jun 15, 2025 · Information Security

Mastering HTTPS Interview Questions: Impress Recruiters with Deep Security Insight

This guide explains how to answer the common interview question “Can you talk about HTTPS?” by covering its fundamental differences from HTTP, the role of SSL/TLS, confidentiality, integrity and authentication, the TLS handshake process, performance considerations, certificate chains, and how to present this knowledge to showcase both depth and breadth of security expertise.

HTTPSSecurity InterviewTLS
0 likes · 9 min read
Mastering HTTPS Interview Questions: Impress Recruiters with Deep Security Insight
Code Ape Tech Column
Code Ape Tech Column
Jun 10, 2025 · Information Security

Securing OpenAPI Interfaces with AppId, AppSecret, and RSA Signatures

This article explains how to standardize and protect OpenAPI interfaces by using globally unique AppId/AppSecret pairs, generating RSA‑based signatures, implementing timestamp and nonce checks, and applying common security measures such as rate limiting, whitelist/blacklist controls, and sensitive data handling, all illustrated with complete Java code examples.

API SecurityAppIdAppSecret
0 likes · 28 min read
Securing OpenAPI Interfaces with AppId, AppSecret, and RSA Signatures
IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Securitydata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
Su San Talks Tech
Su San Talks Tech
May 17, 2025 · Information Security

6 Practical Data Masking Techniques to Secure Sensitive Information

This article presents six widely used data masking solutions—from simple regex string replacement to advanced K‑anonymity—detailing their principles, Java implementations, pros and cons, performance impact, and suitable application scenarios, helping developers protect sensitive data in production and test environments.

data maskingencryptioninformation security
0 likes · 10 min read
6 Practical Data Masking Techniques to Secure Sensitive Information
Java Architect Essentials
Java Architect Essentials
May 8, 2025 · Backend Development

How @Encrypt Simplifies API Security in SpringBoot

This article explains how the @Encrypt annotation in SpringBoot can automatically handle encryption and decryption of sensitive API parameters, eliminating repetitive manual code, improving maintainability, and allowing custom encryption strategies for real‑world applications.

API SecurityJavaSpringBoot
0 likes · 7 min read
How @Encrypt Simplifies API Security in SpringBoot
Code Mala Tang
Code Mala Tang
May 5, 2025 · Information Security

6 Essential Python Security Practices Every Developer Should Follow

Learn how to safeguard your Python applications by avoiding hard‑coded secrets, using .env files, employing virtual environments, validating and sanitizing inputs, handling files securely, encrypting sensitive data, and implementing proper exception handling—all essential steps for robust information security.

Environment VariablesException HandlingPython
0 likes · 5 min read
6 Essential Python Security Practices Every Developer Should Follow
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
php Courses
php Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architecture Tech Stack
Top Architecture Tech Stack
Apr 25, 2025 · Databases

MyBatis-Mate: Enterprise-Level Features for Sharding, Encryption, Data Permissions and Automatic DDL Management

mybatis-mate is an enterprise‑level MyBatis‑Plus extension that offers sharding, data auditing, dictionary binding, field encryption, sensitive‑word filtering, automatic DDL maintenance, multi‑datasource switching, performance logging, and data‑scope control, providing a comprehensive solution for agile and secure database operations.

Data PermissionJavaencryption
0 likes · 12 min read
MyBatis-Mate: Enterprise-Level Features for Sharding, Encryption, Data Permissions and Automatic DDL Management
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Apr 14, 2025 · Information Security

How a Key Gateway Secures Third‑Party API Calls and Prevents Key Leaks

This article analyzes the security risks of exposing third‑party service keys in modern applications, examines traditional and ideal key‑management approaches, and presents a detailed design of a Key Gateway that centralizes signing, encryption, token handling, multi‑tenant support, and robust exception management to protect sensitive credentials.

API Securityaccess controlencryption
0 likes · 17 min read
How a Key Gateway Secures Third‑Party API Calls and Prevents Key Leaks
Liangxu Linux
Liangxu Linux
Apr 13, 2025 · Fundamentals

Why HTTPS Matters: A Deep Dive into HTTP, Encryption, Cookies, and Sessions

This article explains the fundamentals of HTTP and HTTPS, detailing how web requests travel across the internet, the roles of IP and MAC addresses, port numbers, request and response structures, encryption methods, digital certificates, and the differences between cookies and sessions.

HTTPHTTPSSessions
0 likes · 18 min read
Why HTTPS Matters: A Deep Dive into HTTP, Encryption, Cookies, and Sessions
Architect
Architect
Apr 12, 2025 · Backend Development

Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP

This article walks through a complete solution for protecting data in Spring Boot applications, covering symmetric, asymmetric, and hybrid encryption schemes, utility classes for AES and RSA, a custom HttpServletRequestWrapper to enable multiple reads of the request body, a filter that transparently decrypts incoming parameters, and an AOP‑based response‑encryption mechanism triggered by a custom annotation.

AESRSASecurity
0 likes · 45 min read
Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP
Sohu Tech Products
Sohu Tech Products
Apr 9, 2025 · Mobile Development

DRM (FairPlay) Implementation and Key Management on iOS

The article explains iOS FairPlay DRM implementation, detailing the encryption workflow, SPC/CKC exchange, and key terminology, and compares two key‑management methods—AVAssetResourceLoader and the newer AVContentKeySession—while covering usage scenarios such as on‑demand, pre‑warming, offline playback, persistable keys, and video downloading via AVAssetDownloadTask.

AVFoundationContentKeyDRM
0 likes · 21 min read
DRM (FairPlay) Implementation and Key Management on iOS
vivo Internet Technology
vivo Internet Technology
Mar 26, 2025 · Big Data

Reading Encrypted ORC Files in StarRocks: Architecture and Implementation Details

The article details how StarRocks extends the Apache ORC C++ library to decrypt column‑level encrypted ORC files, describing the file hierarchy, AES‑128‑CTR key handling, the query‑time master‑key retrieval, a decorator‑based decryption/decompression pipeline, and the block‑skip‑read mechanism that enables efficient predicate push‑down.

Big DataFile FormatORC
0 likes · 19 min read
Reading Encrypted ORC Files in StarRocks: Architecture and Implementation Details
Lin is Dream
Lin is Dream
Mar 18, 2025 · Information Security

Master OpenSSL on CentOS: Install, Upgrade, and Generate RSA/SM2 Keys

This article explains OpenSSL’s origins, its role in encryption on CentOS, common use cases such as web servers and database security, provides step‑by‑step installation and upgrade commands, and demonstrates how to generate RSA, SM2, AES, and SM4 keys via the OpenSSL command line and Java alternatives.

CentOSJavaOpenSSL
0 likes · 8 min read
Master OpenSSL on CentOS: Install, Upgrade, and Generate RSA/SM2 Keys
Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

OpenSSLcommand-linecryptography
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
Code Ape Tech Column
Code Ape Tech Column
Mar 8, 2025 · Information Security

Enterprise Data Desensitization Solutions Using MyBatis and Fastjson

The article explains why data desensitization is essential for enterprises, classifies common masking techniques, and provides concrete implementation guides for database, log, and output level masking in Java applications using MyBatis plugins and Fastjson filters, complete with sample code and configuration.

Backend SecurityJavaMyBatis
0 likes · 12 min read
Enterprise Data Desensitization Solutions Using MyBatis and Fastjson
Python Programming Learning Circle
Python Programming Learning Circle
Feb 15, 2025 · Information Security

Building a File Encrypter in Python with AES and PBKDF2

This tutorial walks readers through building a Python‑based file encrypter using the Pycryptodome library, covering AES‑CBC encryption, PBKDF2 key derivation, functions for encrypting and decrypting files, environment setup on Windows, macOS and Linux, and a simple driver script for testing.

AESFile SecurityPyCryptodome
0 likes · 12 min read
Building a File Encrypter in Python with AES and PBKDF2
php Courses
php Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Techniques for Performing Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve in‑memory decryption, conventional database‑level approaches, and advanced algorithmic methods—evaluating their implementation steps, security implications, and performance trade‑offs.

algorithmencryptionfuzzy-search
0 likes · 11 min read
Techniques for Performing Fuzzy Queries on Encrypted Data
Architect
Architect
Nov 30, 2024 · Information Security

Secure Spring Boot API Data Transmission with AES/RSA Hybrid Encryption

This article explains how to protect front‑end and back‑end communication in a Spring Boot application by encrypting request and response data using a hybrid AES and RSA scheme, custom request wrappers, filters, and AOP‑based response encryption, complete with code examples and implementation details.

AESAPI SecurityBackend
0 likes · 48 min read
Secure Spring Boot API Data Transmission with AES/RSA Hybrid Encryption
Java Tech Enthusiast
Java Tech Enthusiast
Nov 21, 2024 · Information Security

The Rise and Fall of Lotus Notes: History, Features, and Legacy

Lotus Notes, launched in 1989 from a university project, pioneered client‑server groupware with email, calendar, encryption and a programmable low‑code platform, surged after IBM’s 1995 acquisition, but lost market share to web‑based rivals and costly, clunky design, eventually being sold to HCL in 2018 as a legacy cloud‑native solution.

Document DatabaseLotus Notesencryption
0 likes · 9 min read
The Rise and Fall of Lotus Notes: History, Features, and Legacy
MaGe Linux Operations
MaGe Linux Operations
Nov 21, 2024 · Information Security

Secure Enterprise Account Management: From Pain Points to a Deployable Solution

This article outlines the challenges of traditional credential handling in modern enterprises, presents a professional password‑management platform with advanced encryption, sharing, and audit features, and provides step‑by‑step Docker‑based deployment instructions to secure and streamline account administration.

Account ManagementDocker deploymentEnterprise
0 likes · 8 min read
Secure Enterprise Account Management: From Pain Points to a Deployable Solution
Data Thinking Notes
Data Thinking Notes
Oct 14, 2024 · Information Security

12 Critical Data Security Risks Every Enterprise Must Address

From data lifecycle vulnerabilities to inadequate audit coverage, API misconfigurations, weak privileged access, and insufficient encryption, this article outlines twelve common data security risks and their real‑world impacts, helping organizations identify and remediate gaps before breaches occur.

access controlauditdata security
0 likes · 21 min read
12 Critical Data Security Risks Every Enterprise Must Address
21CTO
21CTO
Oct 3, 2024 · Databases

MongoDB 8.0 Unveiled: Massive Performance Gains and New Vector Support

MongoDB 8.0 launches with up to 36% higher read throughput, 56% faster batch writes, 200% faster time‑series processing, 50‑fold faster sharding distribution, quantized vector search, and queryable encryption, delivering significant performance, cost, and security improvements for modern workloads.

MongoDBdatabaseencryption
0 likes · 4 min read
MongoDB 8.0 Unveiled: Massive Performance Gains and New Vector Support
Liangxu Linux
Liangxu Linux
Sep 19, 2024 · Information Security

Encrypt Your Shell Scripts with gzexe: A Complete Step‑by‑Step Guide

This tutorial explains how to use the gzexe utility to encrypt a shell script, covering script preparation, making it executable, running gzexe to produce a compressed encrypted file, verifying and executing the encrypted script, optional decryption, and notes on security limitations and installation.

LinuxSecurityencryption
0 likes · 4 min read
Encrypt Your Shell Scripts with gzexe: A Complete Step‑by‑Step Guide
Python Programming Learning Circle
Python Programming Learning Circle
Sep 6, 2024 · Information Security

Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, demonstrates why plain HTTP is insecure, and shows how HTTPS, TLS/SSL, asymmetric encryption, and certificate authorities together protect communications from interception and tampering.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks
MaGe Linux Operations
MaGe Linux Operations
Aug 10, 2024 · Backend Development

How to Encrypt Shell Scripts with gzexe: Step-by-Step Guide

This guide explains how to encrypt a shell script using gzexe, covering script preparation, making it executable, running gzexe to produce an encrypted file, verifying and executing the encrypted script, and optionally decrypting it, plus installation instructions for gzexe on Debian and Red Hat systems.

BashLinuxencryption
0 likes · 3 min read
How to Encrypt Shell Scripts with gzexe: Step-by-Step Guide
IT Architects Alliance
IT Architects Alliance
Aug 4, 2024 · Information Security

How to Perform Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and compares three implementation approaches—naïve, conventional, and advanced—detailing their principles, performance implications, storage costs, and security trade‑offs, ultimately recommending the conventional token‑based method for most practical applications.

algorithmdatabaseencryption
0 likes · 13 min read
How to Perform Fuzzy Search on Encrypted Data
php Courses
php Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

HTTPSasymmetric encryptiondata security
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
JD Tech Talk
JD Tech Talk
Jul 29, 2024 · Backend Development

Best Practices for Service Design and API Development in Enterprise Systems

This article presents comprehensive guidelines for designing robust, secure, and maintainable enterprise services, covering API path conventions, request handling, input/output parameter design, business logic recommendations, exception handling, dependency management, monitoring, degradation strategies, encryption, and system admission practices.

Error HandlingMicroservicesSecurity
0 likes · 19 min read
Best Practices for Service Design and API Development in Enterprise Systems
JD Cloud Developers
JD Cloud Developers
Jul 29, 2024 · Backend Development

Designing Robust Backend Services: Path Standards, Security, Monitoring, and Degradation Strategies

This article outlines comprehensive best‑practice guidelines for designing robust, secure, and maintainable backend services—covering API path conventions, request handling, parameter design, error codes, dependency management, monitoring, degradation strategies, legacy service handling, encryption, access control, and tamper‑proof mechanisms, with practical code examples.

BackendSecurityService Architecture
0 likes · 18 min read
Designing Robust Backend Services: Path Standards, Security, Monitoring, and Degradation Strategies
Java Captain
Java Captain
Jul 29, 2024 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, storage costs, and security implications for real‑world applications.

algorithmencryptionfuzzy-search
0 likes · 10 min read
How to Perform Fuzzy Queries on Encrypted Data
Test Development Learning Exchange
Test Development Learning Exchange
Jul 23, 2024 · Backend Development

Common Python Utility Interfaces: Validation, HTTP, File I/O, JSON, DateTime, Encryption, SQLite, Image Processing, Error Handling, and Config Loading

This article presents a collection of reusable Python utility interfaces—including data validation, HTTP request handling, file read/write, JSON parsing, date‑time formatting, symmetric encryption, SQLite persistence, image resizing, exception handling, and configuration loading—each illustrated with concise code examples to improve code readability and testability.

Backenddata-validationencryption
0 likes · 4 min read
Common Python Utility Interfaces: Validation, HTTP, File I/O, JSON, DateTime, Encryption, SQLite, Image Processing, Error Handling, and Config Loading
Tencent Cloud Developer
Tencent Cloud Developer
Jul 23, 2024 · Cloud Native

Design Evolution of Cloud Development Gateway: From Dual‑Layer to Single‑Layer Architecture

The Cloud Development gateway’s evolution from a dual‑layer design—separating encryption/decryption from Envoy—to a single‑layer architecture that embeds encryption directly into Envoy filters streamlines traffic handling, strengthens protection against MITM attacks, reduces CPU and operational overhead, and unifies monitoring for a more efficient cloud‑native solution.

EnvoyMicroservicesencryption
0 likes · 14 min read
Design Evolution of Cloud Development Gateway: From Dual‑Layer to Single‑Layer Architecture
Test Development Learning Exchange
Test Development Learning Exchange
Jul 22, 2024 · Fundamentals

Common Python Utility Interfaces: Validation, HTTP, File I/O, JSON, DateTime, Encryption, SQLite, Image Processing, Error Handling, and Config Loading

This article presents a collection of reusable Python utility interfaces—including data validation, HTTP request handling, file read/write, JSON parsing, date‑time formatting, symmetric encryption, SQLite persistence, image resizing, exception handling, and configuration loading—each illustrated with concise code examples to improve code readability and testability.

encryptionfile-ioutilities
0 likes · 4 min read
Common Python Utility Interfaces: Validation, HTTP, File I/O, JSON, DateTime, Encryption, SQLite, Image Processing, Error Handling, and Config Loading
JD Tech
JD Tech
Jul 17, 2024 · Information Security

Service Design Tips and Security Practices for Robust API Development

This article presents comprehensive guidelines for designing flexible, secure, and maintainable API services, covering standardized paths, request handling, parameter design, business logic, exception management, dependency classification, monitoring, degradation strategies, handling legacy services, and encryption measures to ensure robust service architecture.

Error HandlingService Architectureapi-design
0 likes · 19 min read
Service Design Tips and Security Practices for Robust API Development
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API SecurityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques