Tagged articles
431 articles
Page 2 of 5
php Courses
php Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESHashingPHP
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Jun 29, 2024 · Information Security

Master OpenSSL: A Complete Guide to Encryption, Keys, and Certificates

This article provides a thorough walkthrough of OpenSSL, covering cryptographic standards, symmetric and asymmetric encryption commands, message digests, certificate creation and management, as well as useful utilities like random number generation and password hashing, all illustrated with practical command‑line examples.

OpenSSLcertificatescryptography
0 likes · 26 min read
Master OpenSSL: A Complete Guide to Encryption, Keys, and Certificates
MaGe Linux Operations
MaGe Linux Operations
Jun 27, 2024 · Information Security

Master OpenSSL: Comprehensive Guide to Encryption, Keys, and Certificates

This article provides a thorough walkthrough of OpenSSL, covering cryptographic standards, symmetric and public‑key encryption, message digests, digital certificate creation and management, plus practical command‑line examples for each operation, making it a valuable resource for security professionals and developers.

OpenSSLcommand-linedigital certificates
0 likes · 31 min read
Master OpenSSL: Comprehensive Guide to Encryption, Keys, and Certificates
Architect
Architect
Jun 19, 2024 · Information Security

Implementing RSA and AES Hybrid Encryption for API Security in Java

This article describes a real‑world API security incident, explains the fundamentals of asymmetric RSA and symmetric AES encryption, and provides a complete Java implementation—including a hybrid encryption strategy, custom @RequestRSA annotation, Spring AOP decryption aspect, and utility classes—to securely transmit and automatically decrypt request parameters.

AESJavaRSA
0 likes · 23 min read
Implementing RSA and AES Hybrid Encryption for API Security in Java
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API SecurityHTTPSWeChat Pay
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Architect's Guide
Architect's Guide
May 22, 2024 · Backend Development

Design and Implementation of a Spring Boot Starter for Request/Response Encryption and Decryption

This article explains how to build a reusable Spring Boot starter that automatically encrypts outgoing responses and decrypts incoming requests using hutool‑crypto, custom request wrappers, validation utilities, and Spring Boot advice components, providing a secure, zero‑boilerplate solution for Java backend services.

BackendJavaRequestBodyAdvice
0 likes · 21 min read
Design and Implementation of a Spring Boot Starter for Request/Response Encryption and Decryption
Programmer DD
Programmer DD
May 14, 2024 · Information Security

Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption

The article recounts a real‑world incident where a game’s leaderboard showed absurd scores due to insecure API parameters, then explains RSA and AES fundamentals, demonstrates how to combine asymmetric and symmetric encryption for secure request handling, and provides Java code, custom annotations, and AOP logic to automate decryption on the server side.

AESAPI SecurityBackend
0 likes · 23 min read
Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureMicrosoft Dynamics 365RBAC
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
Architect's Guide
Architect's Guide
May 10, 2024 · Backend Development

Implementing Request and Response Encryption in Spring Boot with ControllerAdvice and Jackson

This article demonstrates how to secure Spring Boot APIs by encrypting request and response bodies using custom ControllerAdvice, switching from FastJson to Jackson for proper enum and date serialization, and configuring ObjectMapper to produce consistent JSON output across encrypted and non‑encrypted endpoints.

API SecurityControllerAdviceJackson
0 likes · 13 min read
Implementing Request and Response Encryption in Spring Boot with ControllerAdvice and Jackson
macrozheng
macrozheng
May 7, 2024 · Information Security

10 Proven Strategies to Secure Your API Data

Ensuring API data security involves encrypting transmission, using signatures, token authentication, timestamps, nonces, rate limiting, black/white lists, data masking, and parameter validation, with detailed explanations of symmetric/asymmetric encryption, HTTPS, RSA, MD5, and practical implementation steps for robust protection.

API Securityencryptionrate limiting
0 likes · 13 min read
10 Proven Strategies to Secure Your API Data
Architecture Digest
Architecture Digest
May 6, 2024 · Information Security

RSA Encryption and Decryption in Spring Boot: A Practical Guide

This tutorial explains RSA asymmetric encryption and signing, then walks through securing Spring Boot API endpoints by adding annotations, configuring keys, integrating JavaScript decryption, and addressing practical deployment considerations to protect data from interception and tampering.

JavaRSASpring Boot
0 likes · 6 min read
RSA Encryption and Decryption in Spring Boot: A Practical Guide
Selected Java Interview Questions
Selected Java Interview Questions
Apr 25, 2024 · Information Security

Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations

The article examines why encrypted sensitive fields such as passwords, phone numbers, and bank details need special handling, categorises three families of fuzzy‑search solutions for encrypted data, evaluates their security, performance and storage costs, and recommends a balanced conventional method for production use.

Data Protectionalgorithmdatabase
0 likes · 10 min read
Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations
Alibaba Cloud Native
Alibaba Cloud Native
Apr 19, 2024 · Information Security

Securing Nacos with Zero‑Trust: TLS, Encryption, and Access Control

This article explains how to protect Nacos configuration data by applying zero‑trust principles, covering transport encryption with TLS, storage encryption using plugins, and fine‑grained access control through authentication and RBAC, while providing practical configuration steps.

Configuration SecurityNacosRBAC
0 likes · 18 min read
Securing Nacos with Zero‑Trust: TLS, Encryption, and Access Control
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Architect
Architect
Apr 5, 2024 · Backend Development

Implementing a Spring Boot Encryption/Decryption Starter with Hutool-Crypto

This article explains how to build a reusable Spring Boot starter that automatically encrypts response data and decrypts request payloads using Hutool-Crypto's AES utilities, covering request stream handling, validation, custom starter configuration, and example code for controllers and entities.

AESRequestBodyAdviceSpring Boot
0 likes · 23 min read
Implementing a Spring Boot Encryption/Decryption Starter with Hutool-Crypto
IT Services Circle
IT Services Circle
Apr 4, 2024 · Information Security

Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms

HTTPS secures web communication by adding SSL/TLS encryption to HTTP, providing confidentiality, integrity, authentication, and non-repudiation through a combination of symmetric and asymmetric cryptography, hash functions, digital signatures, and certificate authorities, while addressing migration concerns and performance considerations.

HTTPSSSL/TLSTLS
0 likes · 18 min read
Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Mar 28, 2024 · Backend Development

Master Spring Cloud Config: Logging, RefreshScope, Encryption & Custom Properties

This guide explains how to configure logging in Spring Boot, handle EnvironmentChangeEvent updates, use @RefreshScope limitations, encrypt properties with Spring Cloud, leverage Actuator endpoints for environment refresh, and create custom property sources via spring.factories, providing code examples throughout.

ActuatorConfigurationCustom Property Source
0 likes · 5 min read
Master Spring Cloud Config: Logging, RefreshScope, Encryption & Custom Properties
Top Architect
Top Architect
Mar 25, 2024 · Backend Development

Design and Evaluation of Java Backend Code Protection Solutions

This article analyses the challenges of protecting intellectual property in B2B Java applications, reviews existing obfuscation and encryption tools, and proposes a lightweight Maven‑based encryption plus javaagent decryption scheme that secures both proprietary code and third‑party dependencies while keeping performance impact below five percent.

BackendJavaProGuard
0 likes · 9 min read
Design and Evaluation of Java Backend Code Protection Solutions
Architect
Architect
Mar 23, 2024 · Information Security

How to Secure Front‑End JavaScript: Encryption, Obfuscation, and Anti‑Debugging Techniques

This article explains why protecting client‑side JavaScript is essential, describes interface signing, outlines common compression, obfuscation and encryption methods—including variable, string, property and control‑flow tricks—introduces Emscripten/WebAssembly protection, reviews practical tools, and details debugging, anti‑debugging and counter‑measures for front‑end security.

Anti-debuggingFront-end securityJavaScript
0 likes · 18 min read
How to Secure Front‑End JavaScript: Encryption, Obfuscation, and Anti‑Debugging Techniques
Liangxu Linux
Liangxu Linux
Feb 27, 2024 · Information Security

Understanding SSH: How Secure Shell Works and Why It Matters

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP by encrypting data, authenticating users, and supporting key exchange, with default port 22, various authentication methods, and tools such as PuTTY and OpenSSH for secure remote access.

OpenSSHPuttySSH
0 likes · 9 min read
Understanding SSH: How Secure Shell Works and Why It Matters
MaGe Linux Operations
MaGe Linux Operations
Feb 19, 2024 · Databases

Secure MySQL 8 with SSL: Step-by-Step Guide to Encrypt Your Data

Learn how to secure MySQL 8 connections by enabling SSL, covering the protocol’s encryption and authentication principles, generating certificates, configuring server and client settings, and testing the encrypted connection with detailed commands and practical examples.

ConfigurationDatabase SecuritySSL
0 likes · 6 min read
Secure MySQL 8 with SSL: Step-by-Step Guide to Encrypt Your Data
Su San Talks Tech
Su San Talks Tech
Feb 16, 2024 · Information Security

How to Prevent Malicious API Abuse: 8 Practical Security Measures

This article outlines eight effective techniques—including firewalls, captchas, authentication checks, IP whitelists, data encryption, rate limiting, monitoring, and API gateways—to protect interfaces from malicious traffic and costly abuse while balancing user experience.

API SecurityCaptchaencryption
0 likes · 9 min read
How to Prevent Malicious API Abuse: 8 Practical Security Measures
Architect
Architect
Feb 7, 2024 · Backend Development

How to Secure Spring MVC APIs with Request/Response Encryption Using ControllerAdvice

This article walks through a real‑world scenario of adding symmetric encryption to Spring MVC endpoints for Android, iOS and H5 clients, detailing the requirements, code implementation of request and response interceptors, serialization pitfalls with enums and LocalDateTime, and the final solution using Jackson's ObjectMapper to keep encrypted and non‑encrypted responses consistent.

API SecurityControllerAdviceJackson
0 likes · 17 min read
How to Secure Spring MVC APIs with Request/Response Encryption Using ControllerAdvice
Sanyou's Java Diary
Sanyou's Java Diary
Feb 5, 2024 · Information Security

Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained

This article introduces the five most common encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their classifications, security properties, typical use cases, and providing complete Java implementations for each, while also showing how they underpin HTTPS security.

asymmetric encryptionencryptionhash algorithms
0 likes · 18 min read
Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained
Open Source Tech Hub
Open Source Tech Hub
Feb 4, 2024 · Backend Development

How to Build a Secure SQL Query Tool for Private Deployments

This article explains why a SQL query tool is essential for on‑premise systems, describes the challenges of remote access and data safety, and provides a step‑by‑step implementation covering frontend encryption, backend whitelist checks, decryption, and query execution with code examples.

Backend DevelopmentJavaScriptPHP
0 likes · 8 min read
How to Build a Secure SQL Query Tool for Private Deployments
php Courses
php Courses
Jan 30, 2024 · Information Security

Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to protect data transmission in PHP applications by employing HTTPS (SSL/TLS), implementing symmetric encryption such as AES, and using asymmetric encryption with OpenSSL, while highlighting key management practices to ensure confidentiality, integrity, and resistance to man‑in‑the‑middle attacks.

HTTPSOpenSSLPHP
0 likes · 4 min read
Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
FunTester
FunTester
Jan 29, 2024 · Information Security

Fundamentals of API Security: Principles, Practices, and Lifecycle Management

This article provides a comprehensive overview of API security, covering authentication and authorization, privacy and encryption, input validation, detection, rate limiting, logging, secure coding, vulnerability management, lifecycle phases, and the importance of education and training to protect modern software ecosystems.

API SecurityAuthenticationAuthorization
0 likes · 14 min read
Fundamentals of API Security: Principles, Practices, and Lifecycle Management
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jan 26, 2024 · Fundamentals

Android Partition Mounting Process and Common Issues

The article outlines Android’s partition mounting sequence—metadata, super (system), and userdata—detailing dm‑linear device creation, AVB verification, and encryption handling, then enumerates frequent failures such as set_policy_failed, init_user0_failed, enablefilecrypto_failed, userdata mount errors, and ServiceManager crashes, providing log examples and troubleshooting guidance.

AndroidBoot ProcessFBE
0 likes · 14 min read
Android Partition Mounting Process and Common Issues
MaGe Linux Operations
MaGe Linux Operations
Jan 12, 2024 · Operations

Master Linux Bash: From User ID Summation to Systemd Services and Encryption

This comprehensive guide walks through essential Linux administration techniques, including Bash scripts for summing user IDs, array and string manipulation, advanced variable usage, random number analysis, factorial recursion, process and thread concepts, job control, kernel design models, boot and GRUB workflows, service management with chkconfig and systemd, as well as CA creation, certificate handling, encryption fundamentals, and OpenSSH key‑based authentication.

BashOpenSSLawk
0 likes · 39 min read
Master Linux Bash: From User ID Summation to Systemd Services and Encryption
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 8, 2024 · Databases

MySQL General Tablespaces: A Powerful Storage Option

This article explains what MySQL general tablespaces are, outlines their main features and benefits, provides step‑by‑step commands for creating, managing, and assigning tables to them, and shows monitoring queries and practical usage scenarios for improved storage efficiency and performance.

InnoDBencryptiongeneral tablespace
0 likes · 12 min read
MySQL General Tablespaces: A Powerful Storage Option
Architect's Guide
Architect's Guide
Jan 7, 2024 · Information Security

Implementing RSA Encryption and Decryption in Spring Boot APIs

This guide explains how to secure Spring Boot API responses using RSA asymmetric encryption, covering the theory of RSA, practical scenarios, Maven setup, annotation‑based encryption/decryption, configuration files, and a JavaScript front‑end example for encrypting request payloads.

API SecurityJavaRSA
0 likes · 10 min read
Implementing RSA Encryption and Decryption in Spring Boot APIs
Su San Talks Tech
Su San Talks Tech
Jan 6, 2024 · Information Security

11 Essential Techniques to Secure Your APIs: From Validation to Encryption

Learn eleven practical strategies to protect your APIs—including parameter validation, unified response handling, XSS escaping, permission and data access controls, captcha integration, rate limiting, IP whitelisting, sensitive word filtering, HTTPS adoption, data encryption, and risk management—to ensure robust security across your services.

API Securityencryptionrate limiting
0 likes · 17 min read
11 Essential Techniques to Secure Your APIs: From Validation to Encryption
Java High-Performance Architecture
Java High-Performance Architecture
Dec 28, 2023 · Backend Development

How to Perform Fuzzy Search on Encrypted Fields in Java Applications

This article explains why traditional LIKE queries fail on encrypted sensitive fields, analyzes common scenarios, and presents four practical solutions—including tokenized ciphertext mapping—along with environment setup, Maven dependencies, and complete Spring Boot code to enable secure fuzzy searches on encrypted data.

JavaMyBatisSpring Boot
0 likes · 13 min read
How to Perform Fuzzy Search on Encrypted Fields in Java Applications
Open Source Linux
Open Source Linux
Dec 15, 2023 · Information Security

Understanding Ransomware: Types, Attack Methods, and Effective Defenses

This article explains what ransomware is, outlines its main variants such as encryption‑based, lock‑screen and doxware ransomware, describes common infection vectors like brute‑force, phishing and exploit kits, and provides practical network‑ and host‑side defenses as well as response steps if an attack occurs.

cybercrimedefenseencryption
0 likes · 9 min read
Understanding Ransomware: Types, Attack Methods, and Effective Defenses
Code Ape Tech Column
Code Ape Tech Column
Dec 7, 2023 · Information Security

Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway

This article explains the principles of symmetric and asymmetric encryption, digital signatures, HTTPS with CA, and demonstrates how to generate RSA keys, handle symmetric keys, encrypt URLs with AES, and verify signatures using custom Spring Cloud Gateway filters, complete with Java code examples.

digital signatureencryptioninformation security
0 likes · 24 min read
Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway
MaGe Linux Operations
MaGe Linux Operations
Nov 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates

HTTPS protects online communications by combining TLS encryption, digital certificates, and cryptographic techniques such as symmetric and asymmetric encryption, hash functions, and certificate authorities, ensuring confidentiality, integrity, authentication, and non‑repudiation, while addressing key exchange, trust chains, and common security pitfalls.

Certificate AuthorityHTTPSTLS
0 likes · 17 min read
How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates
Open Source Tech Hub
Open Source Tech Hub
Nov 5, 2023 · Information Security

Mastering PHP Data Encryption with OpenSSL and SM4: A Practical Guide

This guide explains fundamental data encryption concepts, introduces PHP's openssl_encrypt function, compares common encryption modes, shows how to generate keys and initialization vectors, and provides a complete SM4‑CBC implementation with sample code and practical security precautions.

OpenSSLPHPSM4
0 likes · 8 min read
Mastering PHP Data Encryption with OpenSSL and SM4: A Practical Guide
Architect
Architect
Oct 24, 2023 · Information Security

How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide

This article walks through the theory behind RSA, illustrates two battlefield‑style scenarios for encryption and signing, and then shows how to integrate RSA‑based request/response encryption into a Spring Boot application using Maven, annotations, configuration files, and a JavaScript front‑end, complete with code snippets and troubleshooting tips.

Backend SecurityJavaRSA
0 likes · 12 min read
How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide
php Courses
php Courses
Oct 24, 2023 · Information Security

Using PHP Encryption Functions for Data Protection

This article explains PHP's built‑in encryption functions—including OpenSSL encryption/decryption, hashing, and password handling—shows how to generate keys, encrypt and decrypt data, and provides best‑practice tips for securely protecting sensitive information in PHP applications.

Data ProtectionOpenSSLencryption
0 likes · 5 min read
Using PHP Encryption Functions for Data Protection
macrozheng
macrozheng
Oct 19, 2023 · Information Security

How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores multiple strategies for enabling fuzzy search on encrypted phone numbers, including in‑memory caching, database decryption functions, segment‑wise storage, and dedicated fuzzy‑search fields, comparing their trade‑offs in performance, memory usage, and data consistency.

Backendencryptionfuzzy-search
0 likes · 10 min read
How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL
Java High-Performance Architecture
Java High-Performance Architecture
Oct 17, 2023 · Information Security

Secure Your Spring Boot APIs with RSA: A Hands‑On Encryption & Decryption Guide

This article walks you through implementing RSA‑based encryption and digital signatures in a Spring Boot application, covering the theory of asymmetric cryptography, practical code snippets for Maven, configuration, controller annotations, and a JavaScript client that encrypts requests and verifies responses to protect API data from eavesdropping and tampering.

Backend SecurityJavaRSA
0 likes · 11 min read
Secure Your Spring Boot APIs with RSA: A Hands‑On Encryption & Decryption Guide
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
Su San Talks Tech
Su San Talks Tech
Oct 12, 2023 · Information Security

How to Enable Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores practical methods for performing fuzzy searches on encrypted phone numbers, covering in‑memory caching, database decryption functions, segment‑based storage, and adding dedicated fuzzy‑search fields to balance security, performance, and scalability.

Database designencryptionfuzzy-search
0 likes · 10 min read
How to Enable Fuzzy Search on Encrypted Phone Numbers in MySQL
Liangxu Linux
Liangxu Linux
Oct 10, 2023 · Operations

Master Your Shell History with Atuin: Install, Sync, and Powerful Search

Atuin replaces the traditional shell history with a SQLite‑backed, feature‑rich UI, offering encrypted synchronization across machines, detailed command metadata, and flexible search capabilities, while providing multiple installation methods and shell plugin integrations for zsh, bash, and fish.

SQLiteShellatuin
0 likes · 8 min read
Master Your Shell History with Atuin: Install, Sync, and Powerful Search
ZhongAn Tech Team
ZhongAn Tech Team
Oct 9, 2023 · Information Security

Network Security Communication: Principles, Protocols, and Implementation in the ZA App

This article explains the fundamentals of symmetric and asymmetric encryption, one‑way and trapdoor functions, forward secrecy, TLS handshake, and how the ZA financial app applies a multi‑layered secure communication protocol—including certificate verification, replay protection, payload encryption, and request signing—to achieve robust, high‑performance network security across iOS, Android, and web platforms.

TLSasymmetric cryptographydigital certificates
0 likes · 21 min read
Network Security Communication: Principles, Protocols, and Implementation in the ZA App
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 6, 2023 · Backend Development

Secure Your Spring Boot Data with MyBatis Custom TypeHandler Encryption

This tutorial demonstrates how to integrate a custom MyBatis TypeHandler in a Spring Boot 2.6.12 application to automatically encrypt sensitive fields before persisting them to MySQL and decrypt them on retrieval, covering dependencies, configuration, entity definition, encryption utilities, mapper XML, and test cases.

Custom TypeHandlerJavaMyBatis
0 likes · 10 min read
Secure Your Spring Boot Data with MyBatis Custom TypeHandler Encryption
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Sep 11, 2023 · Backend Development

Secure Spring Boot Configs: Encrypt Sensitive Properties with EnvironmentPostProcessor

This guide explains how to protect plaintext Spring Boot configuration values by encrypting them using Spring Cloud Context's DecryptEnvironmentPostProcessor, covering dependency setup, key generation, JCE policy installation, code examples, and runtime decryption for secure property access.

ConfigurationEnvironmentPostProcessorJCE
0 likes · 9 min read
Secure Spring Boot Configs: Encrypt Sensitive Properties with EnvironmentPostProcessor
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 15, 2023 · Backend Development

Secure Spring Boot Configs: Encrypt Sensitive Properties with EnvironmentPostProcessor

This tutorial explains how to protect sensitive Spring Boot configuration values by encrypting them and automatically decrypting them at runtime using Spring Cloud Context's DecryptEnvironmentPostProcessor, complete with dependency setup, code examples, and JCE installation guidance.

ConfigurationEnvironmentPostProcessorSpring Boot
0 likes · 7 min read
Secure Spring Boot Configs: Encrypt Sensitive Properties with EnvironmentPostProcessor
Java Architect Essentials
Java Architect Essentials
Aug 13, 2023 · Information Security

How to Perform Fuzzy Searches on Encrypted Data Without Breaking Security

This article examines three categories of approaches—naïve, conventional, and advanced—for enabling fuzzy queries on encrypted fields, comparing their implementation steps, performance trade‑offs, storage costs, and security implications, and provides practical examples such as in‑memory decryption, tag mapping, database functions, tokenization, and algorithm‑level designs.

Database Securityencrypted dataencryption
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data Without Breaking Security
php Courses
php Courses
Aug 12, 2023 · Backend Development

Encrypting and Decrypting Form Data with PHP

This article explains how to securely encrypt and decrypt user‑submitted form data in PHP using the AES‑256‑CBC algorithm, providing step‑by‑step code examples for creating encryption/decryption functions, applying them to form inputs, and emphasizing key safety and HTTPS.

BackendForm SecurityPHP
0 likes · 4 min read
Encrypting and Decrypting Form Data with PHP
Weimob Technology Center
Weimob Technology Center
Jul 25, 2023 · Information Security

How to Secure Data: Practical Guide to Masking and Encryption Strategies

This comprehensive guide explains why modern enterprises must shift from network‑centric protection to data‑centric security, detailing practical approaches for data masking and storage encryption, evaluating regulatory requirements, outlining solution selection, and providing step‑by‑step implementation practices to safeguard sensitive information.

compliancedata maskingdata security
0 likes · 29 min read
How to Secure Data: Practical Guide to Masking and Encryption Strategies
MaGe Linux Operations
MaGe Linux Operations
Jul 15, 2023 · Cloud Native

How to Secure Your Kubernetes Clusters with DevSecOps Best Practices

This article explains how to integrate security into the DevOps pipeline for Kubernetes, covering DevSecOps concepts, image protection, role‑based access control, network policies, encryption, etcd safeguarding, and disaster‑recovery strategies to keep clusters safe and releases fast.

DevSecOpsKubernetesNetworkPolicy
0 likes · 21 min read
How to Secure Your Kubernetes Clusters with DevSecOps Best Practices
HomeTech
HomeTech
Jun 21, 2023 · Information Security

Transparent Data Masking with AutoProxy Middleware at AutoHome

This article describes AutoHome's data security challenges in the big‑data era and explains how the self‑developed AutoProxy encryption middleware provides transparent, compliant data masking across legacy and new sensitive data, reducing cost, improving performance, and enabling automated masking workflows.

Transparent Encryptionauto-proxycompliance
0 likes · 8 min read
Transparent Data Masking with AutoProxy Middleware at AutoHome
Su San Talks Tech
Su San Talks Tech
Jun 20, 2023 · Information Security

Master the 5 Most Common Encryption Algorithms in Java

This article introduces the five most widely used encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their principles, strengths, weaknesses, and providing complete Java code examples for hashing, symmetric, and asymmetric encryption, along with practical usage scenarios such as password storage and HTTPS.

Hashingasymmetricencryption
0 likes · 19 min read
Master the 5 Most Common Encryption Algorithms in Java
Laravel Tech Community
Laravel Tech Community
Jun 13, 2023 · Information Security

Understanding Tokens, JWT, and Authentication Security

This article explains the principles, structure, and workflow of token‑based authentication—including access and refresh tokens, JWT, CSRF attacks, same‑origin policy, cross‑origin solutions, and common encryption algorithms—highlighting their advantages, limitations, and practical usage in modern web and mobile applications.

AuthenticationJWTSecurity
0 likes · 18 min read
Understanding Tokens, JWT, and Authentication Security
Bitu Technology
Bitu Technology
Jun 1, 2023 · Backend Development

Elixir for Live HLS Video Streaming: Architecture and Implementation at Tubi

The article recaps Tubi’s eighth Elixir Meetup, detailing Horvo’s presentation on building a live HLS video streaming backend with Elixir, covering the system’s transcoder, scheduler, HLS server, encryption, ad‑insertion strategies, and why Elixir was chosen for high‑performance backend services.

Ad InsertionBackend DevelopmentElixir
0 likes · 9 min read
Elixir for Live HLS Video Streaming: Architecture and Implementation at Tubi
php Courses
php Courses
May 30, 2023 · Information Security

PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms

This article explains three PHP‑based techniques—captcha verification, encrypted parameter transmission, and dynamic token validation—to protect web login pages from automated crawling and credential‑stealing attacks, while also noting their limitations and implementation details.

Captchaanti‑crawlerdynamic token
0 likes · 6 min read
PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms
Architect's Guide
Architect's Guide
Apr 22, 2023 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—and provides practical Java implementation examples for each technique.

API SecurityJavaencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
Java Backend Technology
Java Backend Technology
Apr 10, 2023 · Information Security

What New Security Features Does JDK 20 Offer? Encryption, TLS, and JFR Highlights

JDK 20, released in March 2023, introduces a suite of security enhancements—including new exception constructors, expanded algorithm service attributes, stricter defaults for DTLS 1.0 and ECDH suites, performance‑boosting intrinsics for ChaCha20, Poly1305, MD5 and ECC, as well as new Java Flight Recorder events for tracking security properties—providing developers with stronger defaults and better observability.

JFRJava SecurityTLS
0 likes · 8 min read
What New Security Features Does JDK 20 Offer? Encryption, TLS, and JFR Highlights
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Mar 30, 2023 · Backend Development

Implement Field Encryption with ShardingSphere in Spring Boot 2.6

This guide walks through setting up a Spring Boot 2.6.14 project with ShardingSphere 5.3.0 encryption, covering Maven dependencies, YAML configurations for data sources and encryptors, defining the users table schema, implementing CRUD operations with MyBatis‑Plus, and troubleshooting connection‑pool settings.

CRUDJavaShardingSphere
0 likes · 6 min read
Implement Field Encryption with ShardingSphere in Spring Boot 2.6
Python Programming Learning Circle
Python Programming Learning Circle
Mar 7, 2023 · Fundamentals

Python Automation Scripts: Web Requests, URL Shortening, Fake Data Generation, Video Downloading, NATO Encryption, and Selenium Login

This article presents a series of Python automation examples—including HTTP requests, URL shortening, fake data creation, YouTube video downloading, NATO‑style message encryption, and Selenium‑driven social‑media login—showcasing concise code snippets and explanations that highlight Python's simplicity and versatility for repetitive tasks.

Data GenerationSeleniumencryption
0 likes · 7 min read
Python Automation Scripts: Web Requests, URL Shortening, Fake Data Generation, Video Downloading, NATO Encryption, and Selenium Login
Open Source Linux
Open Source Linux
Mar 3, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamental weaknesses of HTTP, demonstrates how man‑in‑the‑middle attacks exploit clear‑text communication, and shows how HTTPS—through SSL/TLS handshakes, certificate validation, and CA hierarchies—protects web traffic from interception and tampering.

HTTPHTTPSMan-in-the-Middle
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 16, 2022 · Information Security

Analysis of OP-TEE SFS Secure Storage Implementation (OPTEE 3.18)

The article examines OP‑TEE 3.18’s SFS secure storage, detailing its GP API, kernel file‑system module, REE daemon interactions, file format with header, hash‑tree nodes, key hierarchy (SSK, TSK, FEK), and encryption using AES‑GCM, and highlights the single‑point‑of‑failure risk of the dirf.db directory.

OP-TEESFSSecure Storage
0 likes · 13 min read
Analysis of OP-TEE SFS Secure Storage Implementation (OPTEE 3.18)
Top Architect
Top Architect
Dec 13, 2022 · Backend Development

Implementing Request/Response Encryption and Decryption with a Spring Boot Starter

This article explains how to create a reusable Spring Boot starter that automatically encrypts outgoing responses and decrypts incoming requests using AES, provides a request‑wrapper to allow multiple reads of the input stream, and integrates Spring Validation to simplify parameter checking, all illustrated with complete Java code examples.

JavaSpring BootStarter
0 likes · 25 min read
Implementing Request/Response Encryption and Decryption with a Spring Boot Starter
Su San Talks Tech
Su San Talks Tech
Dec 12, 2022 · Backend Development

Designing Secure and Robust APIs: Signatures, Encryption, Rate Limiting, and More

This article outlines essential practices for building secure, reliable API interfaces—including request signing, data encryption, IP whitelisting, rate limiting, parameter validation, unified responses, exception handling, logging, idempotency, payload limits, performance testing, asynchronous processing, data masking, and comprehensive documentation—to help developers meet safety, stability, and maintainability requirements.

IdempotencySecurityapi-design
0 likes · 15 min read
Designing Secure and Robust APIs: Signatures, Encryption, Rate Limiting, and More
vivo Internet Technology
vivo Internet Technology
Dec 7, 2022 · Databases

vivo's Database Operations Platform: Challenges and Solutions in the Cloud-Native Era

Vivo’s Database‑as‑a‑Service platform tackles cloud‑native challenges by automating massive instance management with self‑service work orders and self‑healing, enabling elastic scaling through mixed‑deployment and multi‑threaded Redis tools, optimizing costs via automatic package shrinkage, and safeguarding personal data with full‑chain encryption, while outlining a roadmap toward AI‑driven fault handling, container‑based resources, and advanced privacy governance.

DaaSOperationscloud-native
0 likes · 14 min read
vivo's Database Operations Platform: Challenges and Solutions in the Cloud-Native Era
Top Architect
Top Architect
Dec 5, 2022 · Backend Development

Spring Boot Starter for Automatic Request and Response Encryption/Decryption

This article demonstrates how to create a custom Spring Boot starter that provides automatic request body decryption and response body encryption using Hutool‑crypto, HttpServletRequestWrapper, RequestBodyAdvice, ResponseBodyAdvice, and validation utilities, enabling secure data transmission with timestamp verification.

JavaRequestBodyAdviceSpring Boot
0 likes · 25 min read
Spring Boot Starter for Automatic Request and Response Encryption/Decryption
Architect's Guide
Architect's Guide
Nov 30, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article reviews why reversible encryption is needed for certain sensitive fields, classifies three categories of fuzzy‑search‑on‑encrypted‑data techniques—naïve, conventional, and advanced—and evaluates their implementation steps, performance trade‑offs, and practical recommendations.

AESalgorithmdata security
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Java Architect Essentials
Java Architect Essentials
Nov 27, 2022 · Backend Development

Encrypting Spring Boot Configuration with Jasypt – A Complete Guide

This article explains how to securely encrypt sensitive Spring Boot configuration properties such as database passwords using the Jasypt library, covering dependency setup, YAML configuration, encryption/decryption testing, custom encryptors, property detectors, resolvers, filters, and Maven plugin usage, all with practical code examples.

ConfigurationJasyptSpring Boot
0 likes · 22 min read
Encrypting Spring Boot Configuration with Jasypt – A Complete Guide
dbaplus Community
dbaplus Community
Nov 26, 2022 · Databases

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines why encrypted data hinders fuzzy queries and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation steps, performance trade‑offs, storage costs, and practical suitability for real‑world systems.

data securityencryptionfuzzy-search
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Qunar Tech Salon
Qunar Tech Salon
Nov 2, 2022 · Databases

Design of a Next‑Generation Qunar Database Automation Platform: Architecture, Communication Protocol, and Security

This article describes the layered architecture of Qunar's next‑generation database automation platform, outlines the design goals for secure Agent/Plugin‑Server communication, compares communication and encryption methods, and details the authentication and request flow using symmetric encryption and token‑based security.

Agent-Server CommunicationGoSecurity Protocol
0 likes · 9 min read
Design of a Next‑Generation Qunar Database Automation Platform: Architecture, Communication Protocol, and Security
Top Architect
Top Architect
Oct 27, 2022 · Databases

Techniques for Fuzzy Query on Encrypted Data

This article examines the challenges of performing fuzzy searches on encrypted data and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation methods, performance trade‑offs, storage costs, and security implications for real‑world applications.

Securitydatabaseencryption
0 likes · 12 min read
Techniques for Fuzzy Query on Encrypted Data
Java Architect Essentials
Java Architect Essentials
Oct 10, 2022 · Backend Development

Implementing MyBatis TypeHandler for Field Encryption in Java

This article demonstrates how to securely store and retrieve sensitive fields such as phone numbers in a MySQL database by creating a custom Java Encrypt class, a MyBatis TypeHandler for automatic encryption/decryption, configuring the mapper XML, and verifying the solution with test results.

MyBatisTypeHandlerdatabase
0 likes · 8 min read
Implementing MyBatis TypeHandler for Field Encryption in Java
Top Architect
Top Architect
Sep 24, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve (sand‑wich), conventional, and advanced (super)—detailing their implementation ideas, performance implications, and suitability for real‑world applications.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs