Tagged articles
431 articles
Page 3 of 5
Architect
Architect
Sep 22, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines various techniques for enabling fuzzy search on encrypted data, comparing naïve, conventional, and advanced algorithmic approaches, evaluating their security, performance, and storage trade‑offs, and provides practical implementation guidance and reference resources.

data privacydatabaseencryption
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Code Ape Tech Column
Code Ape Tech Column
Sep 14, 2022 · Information Security

Understanding BCrypt and Password Hashing in Spring Security

This article explains the differences between hashing and encryption, demonstrates Java's built‑in hash implementations, discusses the insecurity of MD5 and rainbow‑table attacks, and provides a detailed guide on using BCrypt with Spring Security, including code examples and the PasswordEncoder interface.

bcryptencryptioninformation security
0 likes · 12 min read
Understanding BCrypt and Password Hashing in Spring Security
Java High-Performance Architecture
Java High-Performance Architecture
Sep 13, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation approaches—from naive in‑memory decryption to conventional database tricks and advanced algorithmic solutions—evaluates their security, performance, and storage impacts, and provides practical references for real‑world systems.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs
Liangxu Linux
Liangxu Linux
Aug 28, 2022 · Information Security

10 Proven Strategies to Secure API Data: Encryption, Signing, Tokens & More

This article outlines ten practical methods to secure API data, covering encryption of transmission, digital signing, token authentication, timestamp and nonce replay protection, rate limiting, blacklist/whitelist controls, data masking, and parameter validation, with detailed explanations and implementation steps.

API SecurityParameter Validationdata masking
0 likes · 13 min read
10 Proven Strategies to Secure API Data: Encryption, Signing, Tokens & More
Top Architect
Top Architect
Aug 16, 2022 · Databases

How to Perform Fuzzy Queries on Encrypted Data: Methods, Trade‑offs, and Recommendations

This article examines the difficulty of fuzzy searching encrypted fields and compares three solution families—naïve memory‑loading or tag‑table tricks, conventional token‑based encryption with indexable columns, and advanced algorithmic designs—highlighting their security, performance, and storage implications while recommending the most practical approach.

Securityalgorithmdatabase
0 likes · 10 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods, Trade‑offs, and Recommendations
Baidu App Technology
Baidu App Technology
Aug 11, 2022 · Information Security

How Baidu’s bdtls Protocol Secures Mini‑Programs with TLS 1.3‑Inspired Design

This article explains Baidu’s custom bdtls security communication protocol for mini‑programs, detailing its TLS 1.3‑based architecture, DHE‑RSA key exchange, AES‑GCM encryption, implementation on both server and client sides, and the strategies used to achieve strong security, low latency, high availability, and extensibility.

TLSbdtlsencryption
0 likes · 23 min read
How Baidu’s bdtls Protocol Secures Mini‑Programs with TLS 1.3‑Inspired Design
Baidu Geek Talk
Baidu Geek Talk
Aug 10, 2022 · Information Security

Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs

Baidu’s bdtls protocol adapts TLS 1.3 for mini‑programs, delivering mutual authentication, AES‑128‑GCM encryption, RSA‑signed Diffie‑Hellman key exchange, sub‑10 % handshake latency, and extensible multi‑business support to defend against static, dynamic and cheating attacks while ensuring high availability.

Mobile SecurityTLSbdtls
0 likes · 22 min read
Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs
Python Programming Learning Circle
Python Programming Learning Circle
Aug 8, 2022 · Backend Development

Designing Robust Python Command-Line Interfaces with Click, argparse, and sys.argv

This article teaches Python developers how to build maintainable command‑line tools by applying four design principles, illustrating them with a Caesar‑cipher example implemented via sys.argv, argparse, and the Click library, and showing advanced features like file I/O, progress bars, and automated key breaking.

Caesar Cipherargparseclick
0 likes · 10 min read
Designing Robust Python Command-Line Interfaces with Click, argparse, and sys.argv
ITPUB
ITPUB
Jul 25, 2022 · Information Security

How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint

This article details 58.com’s end‑to‑end approach to securing mobile, H5, and server SDKs—covering security fundamentals, the 5A methodology, the 金盾 architecture, integration steps, data‑flow encryption, comprehensive risk‑based testing, performance evaluation, and release decision making.

MobileSDKSecurity
0 likes · 18 min read
How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint
ITPUB
ITPUB
Jul 4, 2022 · Information Security

10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

This article outlines ten practical methods for protecting API data, covering transmission encryption, digital signatures, token authentication, timestamp and nonce mechanisms, rate limiting, blacklist/whitelist controls, data masking, and parameter validation to ensure comprehensive interface security.

API SecurityParameter Validationdata masking
0 likes · 14 min read
10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More
Top Architect
Top Architect
Jul 3, 2022 · Backend Development

Implementing Request and Response Encryption in Spring MVC Using ControllerAdvice

This article demonstrates how to secure GET and POST API endpoints in a Spring MVC application by encrypting request bodies and responses with AES, using custom ControllerAdvice classes, handling serialization issues with FastJSON and Jackson, and configuring ObjectMapper for proper date and enum formatting.

AESControllerAdviceJackson
0 likes · 15 min read
Implementing Request and Response Encryption in Spring MVC Using ControllerAdvice
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 23, 2022 · Information Security

SSL Overview and DBLE SSL Configuration Guide

This article introduces the SSL protocol, explains why encryption is needed for database communication, and provides step‑by‑step instructions for generating self‑signed certificates with OpenSSL, converting them for Java, and configuring both DBLE server and client to use SSL, including experimental verification of encrypted versus unencrypted connections.

DBLEJavaOpenSSL
0 likes · 15 min read
SSL Overview and DBLE SSL Configuration Guide
Top Architect
Top Architect
May 30, 2022 · Information Security

Implementing Transparent Encrypted Communication with mTLS Using Nginx and OpenSSL

This article explains how to secure cross‑data‑center traffic by applying TLS principles, setting up a private Certificate Authority, generating self‑signed certificates with OpenSSL, configuring mutual TLS (mTLS) on Nginx proxies for both HTTP and TCP streams, and verifying the setup with curl and redis‑cli commands.

Certificate AuthorityNginxOpenSSL
0 likes · 24 min read
Implementing Transparent Encrypted Communication with mTLS Using Nginx and OpenSSL
Open Source Linux
Open Source Linux
May 30, 2022 · Information Security

Can Your WeChat Chats Be Snooped? Understanding Encryption and Network Monitoring

This article examines whether WeChat messages can be intercepted via network monitoring, explains the security guarantees of modern chat apps through asymmetric and symmetric encryption, explores how network behavior management tools could capture communications, and offers practical advice on protecting against such threats.

MITM attackNetwork MonitoringWeChat security
0 likes · 10 min read
Can Your WeChat Chats Be Snooped? Understanding Encryption and Network Monitoring
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESMD5RSA
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
Code Ape Tech Column
Code Ape Tech Column
May 16, 2022 · Information Security

Data Masking with Sharding-JDBC: Concepts, Configuration, and Custom Encryptors

This article explains how Sharding-JDBC can perform data masking at the persistence layer, detailing key concepts, configuration of data sources, encryptors, and tables, demonstrating practical examples with built‑in MD5 and AES encryptors, and showing how to implement custom encryptors and query‑assisted encryption for enhanced security.

Custom EncryptorDatabase SecuritySharding-JDBC
0 likes · 20 min read
Data Masking with Sharding-JDBC: Concepts, Configuration, and Custom Encryptors
MaGe Linux Operations
MaGe Linux Operations
May 7, 2022 · Information Security

Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures

This article introduces fundamental cryptography concepts, explaining how symmetric and asymmetric encryption work, the role of key exchange, the purpose and properties of hashing algorithms, and how digital signatures combine encryption and hashing to ensure data authenticity and integrity.

Hashingcryptographydigital signatures
0 likes · 7 min read
Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures
MaGe Linux Operations
MaGe Linux Operations
May 3, 2022 · Information Security

Can Your Wi‑Fi Spy on WeChat? Understanding Chat App Security and Encryption

This article explains how chat applications like WeChat protect messages with asymmetric and symmetric encryption, why network administrators generally cannot read chat content, and what alternative monitoring methods (such as installed surveillance software, system vulnerabilities, or compromised private keys) could expose your conversations.

MITM attackNetwork MonitoringWeChat security
0 likes · 9 min read
Can Your Wi‑Fi Spy on WeChat? Understanding Chat App Security and Encryption
Java Captain
Java Captain
Apr 30, 2022 · Information Security

Understanding Chat Application Security: Encryption, Network Monitoring, and Potential Vulnerabilities

The article explains how modern chat applications protect communication with asymmetric and symmetric encryption, why network eavesdropping alone cannot reveal messages, and how installed monitoring software or system vulnerabilities can still expose chat records, emphasizing the need for regular updates and careful device usage.

Network Monitoringchat securityencryption
0 likes · 9 min read
Understanding Chat Application Security: Encryption, Network Monitoring, and Potential Vulnerabilities
ELab Team
ELab Team
Apr 29, 2022 · Information Security

Why HTTPS Is Essential: A Deep Dive into HTTP, Encryption, and SSL/TLS

This article explains the evolution from HTTP to HTTPS, detailing HTTP’s history, its security shortcomings, the principles of symmetric and asymmetric encryption, digital signatures, certificate authorities, and the complete HTTPS handshake process, helping readers understand how secure web communication works.

Certificate AuthorityHTTPSTLS
0 likes · 16 min read
Why HTTPS Is Essential: A Deep Dive into HTTP, Encryption, and SSL/TLS
Programmer DD
Programmer DD
Apr 23, 2022 · Information Security

How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step handshake process—including connection establishment, version and algorithm negotiation, key exchange, and user authentication methods—while also describing common clients like PuTTY and OpenSSH and the role of symmetric and asymmetric encryption.

AuthenticationOpenSSHPutty
0 likes · 11 min read
How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained
Selected Java Interview Questions
Selected Java Interview Questions
Apr 21, 2022 · Backend Development

Encrypting Spring Boot Configuration with Jasypt and a Custom EnvironmentPostProcessor

This guide demonstrates how to secure Spring Boot configuration values by using Jasypt encryption and a custom EnvironmentPostProcessor with RSA, covering Maven dependencies, property setup, encrypted YAML syntax, utility classes, processor implementation, and registration via spring.factories.

EnvironmentPostProcessorJasyptRSA
0 likes · 9 min read
Encrypting Spring Boot Configuration with Jasypt and a Custom EnvironmentPostProcessor
Selected Java Interview Questions
Selected Java Interview Questions
Feb 11, 2022 · Backend Development

Implementing Sensitive Data Encryption and Decryption in Spring Boot Using MyBatis Interceptors and Custom Annotations

This article demonstrates how to automatically encrypt sensitive fields such as ID numbers and phone numbers before storing them in a database and decrypt them after retrieval by leveraging MyBatis plugins, custom annotations, and Spring Boot components, providing a clean, reusable solution for backend applications.

InterceptorJavaMyBatis
0 likes · 11 min read
Implementing Sensitive Data Encryption and Decryption in Spring Boot Using MyBatis Interceptors and Custom Annotations
Architecture Digest
Architecture Digest
Jan 18, 2022 · Databases

Implementing MyBatis TypeHandler for Field Encryption and Decryption

This article demonstrates how to securely store and retrieve sensitive user data such as phone numbers in a MySQL database by creating a custom MyBatis TypeHandler that automatically encrypts values on insert and decrypts them on query, complete with code examples and configuration steps.

Database SecurityJavaMyBatis
0 likes · 7 min read
Implementing MyBatis TypeHandler for Field Encryption and Decryption
Java Architect Essentials
Java Architect Essentials
Jan 13, 2022 · Backend Development

Encrypting Spring Boot Configuration Files with Jasypt

This article explains how to secure sensitive Spring Boot configuration properties such as database credentials by integrating the Jasypt library, adding the Maven dependency, configuring an encryption password, generating encrypted values via tests, and applying them in YAML files with optional runtime salt handling.

ConfigurationJasyptencryption
0 likes · 5 min read
Encrypting Spring Boot Configuration Files with Jasypt
Zhongtong Tech
Zhongtong Tech
Jan 4, 2022 · Information Security

Why VPN Is Giving Way to SDP: A Deep Dive into Zero‑Trust Architecture

This article explains how traditional VPNs are being replaced by Software‑Defined Perimeter (SDP) solutions, detailing the underlying protocols, encryption methods, SOCKS5 proxy integration, custom DNS handling, IAM integration, and the ZFE gateway architecture that together enable a zero‑trust network for modern enterprises.

IAMSDPSOCKS5
0 likes · 22 min read
Why VPN Is Giving Way to SDP: A Deep Dive into Zero‑Trust Architecture
21CTO
21CTO
Jan 2, 2022 · Information Security

How to Secure Public APIs: Signatures, OAuth2, and Encryption Strategies

This article explains practical methods to protect externally exposed APIs, covering token‑based access, OAuth2.0 authorization, signature verification, encryption techniques (hashing, symmetric and asymmetric), key management, and provides Java code samples for DES and RSA implementations.

API SecurityJavaOAuth2
0 likes · 13 min read
How to Secure Public APIs: Signatures, OAuth2, and Encryption Strategies
Code Ape Tech Column
Code Ape Tech Column
Dec 29, 2021 · Backend Development

Comprehensive Interview Questions and Answers on Backend Development Topics

This article presents a collection of interview questions covering backend fundamentals such as linked‑list sorting, encryption differences, TCP reliability, IO models, Hystrix, delayed tasks, HTTPS flow, transaction isolation, index pitfalls, virtual memory, Redis leaderboards, distributed locks, zero‑copy techniques, Java synchronized, and Snowflake ID generation.

Distributed LocksHystrixIO models
0 likes · 30 min read
Comprehensive Interview Questions and Answers on Backend Development Topics
Laravel Tech Community
Laravel Tech Community
Dec 19, 2021 · Operations

Understanding Common Linux Commands: crypt, kill, shred, zombies, at, and daemons

This article introduces several essential Linux commands—including crypt for file encryption, kill variants for terminating processes, shred for secure file deletion, zombie process identification, at for one‑time scheduling, and daemon management—explaining their purposes, usage syntax, and practical examples.

command-lineencryptionprocess-management
0 likes · 7 min read
Understanding Common Linux Commands: crypt, kill, shred, zombies, at, and daemons
Liangxu Linux
Liangxu Linux
Dec 16, 2021 · Information Security

Secure Fast File Transfers with croc: Install, Use, and Customize

This guide explains how to install the cross‑platform croc command‑line tool, use its relay‑based fast and end‑to‑end encrypted file and text transfer features, customize code phrases, handle pipes, set output folders, and access its full help options on Linux, macOS, and Windows.

command-linecroccross‑platform
0 likes · 9 min read
Secure Fast File Transfers with croc: Install, Use, and Customize
Python Crawling & Data Mining
Python Crawling & Data Mining
Nov 15, 2021 · Information Security

Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA

This article introduces common encryption methods—including Base64, MD5, SHA‑1, HMAC, DES, AES, and RSA—explains their principles, and provides complete Python code examples for encoding, decoding, and key handling, enabling readers to implement secure data transformations in their own projects.

AESBase64MD5
0 likes · 12 min read
Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA
Selected Java Interview Questions
Selected Java Interview Questions
Oct 13, 2021 · Information Security

Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication

This article explains the fundamentals of the HTTP protocol, illustrates how plain‑text communication enables man‑in‑the‑middle attacks, and describes how symmetric and asymmetric encryption, SSL/TLS handshakes, and CA certificate chains are used in HTTPS to secure web traffic.

HTTPHTTPSMan-in-the-Middle
0 likes · 8 min read
Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication
Python Programming Learning Circle
Python Programming Learning Circle
Oct 8, 2021 · Information Security

Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference

This guide explains how PyArmor encrypts and protects Python scripts through seamless replacement, dynamic encryption, licensing, hardware binding, and packaging, providing step‑by‑step installation, usage commands, project management techniques, and a comprehensive command reference for developers.

LicensingSecuritycode protection
0 likes · 7 min read
Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference
Programmer DD
Programmer DD
Sep 22, 2021 · Fundamentals

10 Classic Algorithms That Shaped Modern Computing – From Sorting to Encryption

This article explains what an algorithm is, outlines its three essential properties, and introduces ten foundational computer algorithms—including sorting methods, Fourier transforms, Dijkstra's shortest‑path, RSA encryption, hash functions, factorization, link analysis, PID control, data compression, and random‑number generation—highlighting their historical origins and real‑world impact.

AlgorithmsData StructuresSorting
0 likes · 9 min read
10 Classic Algorithms That Shaped Modern Computing – From Sorting to Encryption
21CTO
21CTO
Sep 18, 2021 · Fundamentals

10 Essential Algorithms That Shaped Modern Computing

This article introduces ten foundational algorithms—from sorting and Fourier transforms to encryption and graph analysis—explaining their core principles, historical origins, and the pivotal roles they play in today’s software, security, and data processing systems.

AlgorithmsSignal ProcessingSorting
0 likes · 9 min read
10 Essential Algorithms That Shaped Modern Computing
Ops Development Stories
Ops Development Stories
Sep 18, 2021 · Information Security

Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures

Learn the fundamentals of information security through a myth-inspired scenario, covering how symmetric and asymmetric encryption, message digests, and digital signatures ensure confidentiality, integrity, and authenticity when transmitting a simple invitation, and explore a practical secure email system design.

Symmetric Cryptographydigital signaturesencryption
0 likes · 7 min read
Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures
Top Architect
Top Architect
Sep 13, 2021 · Backend Development

Encrypting Spring Boot Configuration Properties with Jasypt

This article demonstrates how to use the Jasypt library to encrypt sensitive Spring Boot configuration properties such as database credentials, showing Maven dependency setup, encryption password configuration, test code for generating encrypted values, and how to replace plaintext with ENC() placeholders in application.yml, including deployment salt handling.

JasyptJavaSpring Boot
0 likes · 5 min read
Encrypting Spring Boot Configuration Properties with Jasypt
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Aug 31, 2021 · Fundamentals

Essential TCP Networking Concepts: OSI Model, Header Fields, Handshake, Flow Control and Related Protocols

This article provides a comprehensive overview of TCP networking fundamentals, covering the OSI seven‑layer model, TCP header fields, the three‑way handshake and four‑way termination, connection limits, packet fragmentation and reassembly, flow‑control mechanisms, HTTP/HTTPS differences, encryption methods and useful analysis tools.

Flow ControlHTTPHandshake
0 likes · 14 min read
Essential TCP Networking Concepts: OSI Model, Header Fields, Handshake, Flow Control and Related Protocols
21CTO
21CTO
Aug 25, 2021 · Information Security

Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens

This article examines common security flaws in basic web login forms, demonstrates how plain‑text passwords can be intercepted, and presents practical countermeasures such as client‑side encryption, hashing, captchas, tokens, and digital signatures to protect credentials and data integrity.

CaptchaMD5Token
0 likes · 13 min read
Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens
Selected Java Interview Questions
Selected Java Interview Questions
Aug 13, 2021 · Information Security

Understanding HTTPS: Encryption Methods, Handshake Process, and HttpClient Implementation

This article explains why HTTP lacks confidentiality, introduces symmetric, asymmetric, and hybrid encryption, describes the HTTPS handshake steps, and shows how Apache HttpClient builds SSL connections with code examples, highlighting key components such as SSLConnectionSocketFactory and HostnameVerifier.

HTTPSHttpClientJava
0 likes · 15 min read
Understanding HTTPS: Encryption Methods, Handshake Process, and HttpClient Implementation
Laravel Tech Community
Laravel Tech Community
Aug 7, 2021 · Information Security

Differences Between HTTP and HTTPS and How HTTPS Ensures Security

The article explains the key differences between HTTP and HTTPS—including transmission security, connection methods, port numbers, and certificate requirements—and describes how HTTPS uses SSL/TLS, public‑key cryptography, and session keys to guarantee secure data exchange.

HTTPHTTPSSSL/TLS
0 likes · 4 min read
Differences Between HTTP and HTTPS and How HTTPS Ensures Security
php Courses
php Courses
Aug 5, 2021 · Backend Development

Common PHP Utility Functions for String Handling, Encryption, and Validation

This article presents a collection of practical PHP utility functions—including string truncation with ellipsis, MD5-based encryption, phone number masking, mobile, numeric and email validation, as well as recursive category handling—complete with usage scenarios and full source code to help developers quickly implement common backend tasks.

BackendPHPString Manipulation
0 likes · 8 min read
Common PHP Utility Functions for String Handling, Encryption, and Validation
Programmer DD
Programmer DD
Aug 2, 2021 · Information Security

Why Simple HTML Login Forms Leak Passwords and How to Secure Them

This article examines common security flaws in basic HTML login forms, demonstrates how plaintext passwords can be intercepted over HTTP, evaluates symmetric and asymmetric encryption, discusses the limitations of HTTPS, and proposes practical safeguards such as MD5 hashing, token-based authentication, captchas, and digital signatures to protect user credentials.

HTTPSMD5Token
0 likes · 14 min read
Why Simple HTML Login Forms Leak Passwords and How to Secure Them
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2021 · Information Security

Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained

This article introduces common encryption algorithms—including symmetric, asymmetric, and digital signature methods—and provides detailed Go code examples for MD5, HMAC, SHA1, AES (with various modes), and RSA, helping developers understand and implement secure cryptographic operations in Go.

AESHMACMD5
0 likes · 16 min read
Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained
macrozheng
macrozheng
Jul 19, 2021 · Fundamentals

Mastering the Chain of Responsibility Pattern in Java: A Practical Guide

This article explains the Chain of Responsibility design pattern, outlines its four roles, demonstrates a real‑world Java implementation for encrypted request handling, and shows how to build an extensible processing chain that improves code readability and maintainability.

Backend DevelopmentChain of ResponsibilityJava
0 likes · 10 min read
Mastering the Chain of Responsibility Pattern in Java: A Practical Guide
Liangxu Linux
Liangxu Linux
Jun 26, 2021 · Information Security

Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018

Researchers from 360 Netlab have uncovered RotaJakiro, a stealthy Linux backdoor malware first seen in 2018, which uses ZLIB compression, AES/XOR/ROTATE encryption, and hidden plugins to exfiltrate data and evade detection, with twelve functions yet its true purpose remains unknown.

C2Linux malwareRotaJakiro
0 likes · 4 min read
Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018
Laravel Tech Community
Laravel Tech Community
Jun 23, 2021 · Information Security

Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation

The article outlines typical ways PHP projects mishandle sensitive data—such as storing passwords in plain text, transmitting credentials without encryption, using weak hashing algorithms, and exposing server details—and provides practical configuration and coding measures to secure data at rest and in transit.

ConfigurationSecurityencryption
0 likes · 6 min read
Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation
Laravel Tech Community
Laravel Tech Community
Jun 3, 2021 · Backend Development

Using mdecrypt_generic() to Decrypt Data in PHP

This article explains the PHP mdecrypt_generic() function, its parameters, and provides a complete example that demonstrates opening an encryption module, encrypting data, decrypting it back, and verifying the result while handling necessary initialization and cleanup steps.

decryptionencryptionmcrypt
0 likes · 2 min read
Using mdecrypt_generic() to Decrypt Data in PHP
Laravel Tech Community
Laravel Tech Community
Jun 1, 2021 · Backend Development

mcrypt_module_close() – Close Encryption Module (PHP)

The PHP function mcrypt_module_close() releases an opened encryption module by taking a resource descriptor as its argument and returns TRUE on success or FALSE on failure, providing a simple way to clean up cryptographic resources in backend applications.

Securityencryptionmcrypt
0 likes · 1 min read
mcrypt_module_close() – Close Encryption Module (PHP)
Laravel Tech Community
Laravel Tech Community
May 28, 2021 · Backend Development

PHP mcrypt_generic() Function for Data Encryption

The article explains PHP's mcrypt_generic() function, detailing its purpose for encrypting data, required parameters ($td as the encryption descriptor and $data as the plaintext), the need for block-size-aligned input, initialization and cleanup steps, and the nature of its returned encrypted output.

PHPSecurityencryption
0 likes · 2 min read
PHP mcrypt_generic() Function for Data Encryption
Laravel Tech Community
Laravel Tech Community
May 15, 2021 · Backend Development

PHP hash_pbkdf2() Function: Generating PBKDF2 Key Derivation

This article explains the PHP hash_pbkdf2() function, detailing its parameters, return values, and usage with a complete example that demonstrates how to derive a PBKDF2 key using a chosen hash algorithm, password, salt, iteration count, and output format.

PBKDF2Securityencryption
0 likes · 3 min read
PHP hash_pbkdf2() Function: Generating PBKDF2 Key Derivation
Liangxu Linux
Liangxu Linux
May 5, 2021 · Information Security

Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM

This guide reviews the most frequent TCP/IP attacks—including IP spoofing, SYN flooding, UDP flooding, TCP reset hijacking, man‑in‑the‑middle, and DDoS—explains their underlying protocols, demonstrates practical exploitation with Python/Scapy and Netcat, and outlines mitigation techniques and cryptographic fundamentals.

DDoSMITMPython
0 likes · 27 min read
Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM
Open Source Linux
Open Source Linux
Apr 26, 2021 · Fundamentals

Mastering Computer Network Architecture: From OSI to TCP/IP and Beyond

An in‑depth guide to computer network architecture covers layered models, the OSI reference model versus TCP/IP, protocol functions from the physical to application layer, TCP three‑way handshake and four‑way termination, HTTP basics, encryption methods, and common interview questions for network engineers.

Computer NetworksHTTPOSI model
0 likes · 28 min read
Mastering Computer Network Architecture: From OSI to TCP/IP and Beyond
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

HTTPSSQL injectionSecure Coding
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
vivo Internet Technology
vivo Internet Technology
Apr 14, 2021 · Information Security

Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA

This article explains the fundamentals of encryption by walking through a relatable story, defining keys, comparing symmetric and asymmetric methods, illustrating key‑exchange techniques such as paint‑mixing, multiplication tricks, Diffie‑Hellman, AES block processing, and the RSA algorithm with step‑by‑step calculations.

Diffie-HellmanRSAasymmetric encryption
0 likes · 15 min read
Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA
Code Ape Tech Column
Code Ape Tech Column
Apr 13, 2021 · Backend Development

Implementing Sensitive Data Encryption and Decryption in Spring Boot with MyBatis Interceptors and Custom Annotations

This article demonstrates how to automatically encrypt sensitive fields such as ID numbers and phone numbers before storing them in a database and decrypt them after retrieval by using Spring Boot, MyBatis plugins, and custom annotations, eliminating manual encryption logic in business code.

BackendInterceptorMyBatis
0 likes · 11 min read
Implementing Sensitive Data Encryption and Decryption in Spring Boot with MyBatis Interceptors and Custom Annotations
DevOps
DevOps
Apr 8, 2021 · Cloud Native

Encrypting Kubernetes Secrets with Sealed Secrets, Helm Secrets, and Kamus

This article explains three practical methods—Sealed Secrets, Helm Secrets, and Kamus—for encrypting Kubernetes secrets, covering their principles, encryption and decryption processes, installation steps, and usage examples with full command‑line and manifest snippets to securely store sensitive data in GitOps workflows.

DevSecOpsKamusKubernetes
0 likes · 23 min read
Encrypting Kubernetes Secrets with Sealed Secrets, Helm Secrets, and Kamus
Programmer DD
Programmer DD
Apr 7, 2021 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms like HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, comparing short and persistent connections, and outlining the security, compatibility, extensibility, and performance requirements that drive HTTPS design.

HTTPSSSL/TLSencryption
0 likes · 13 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAHTTPHTTPS
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
Programmer DD
Programmer DD
Mar 2, 2021 · Backend Development

Create Encrypted and Unencrypted ZIP Archives in Java with Cloudmersive API

This guide shows Java developers how to use the Cloudmersive API to create both unencrypted and password‑protected ZIP archives, covering Maven setup, API key configuration, and complete code examples for handling up to ten files with optional AES‑256 encryption.

APICloudmersiveFile Compression
0 likes · 7 min read
Create Encrypted and Unencrypted ZIP Archives in Java with Cloudmersive API
Architects' Tech Alliance
Architects' Tech Alliance
Jan 25, 2021 · Fundamentals

Ceph Storage Architecture Overview and Detailed Technical Features

This article provides a comprehensive technical overview of Red Hat Ceph, covering its distributed object storage design, cluster architecture, storage pools, authentication, placement groups, CRUSH algorithm, I/O operations, replication, erasure coding, internal management tasks, high availability, client interfaces, data striping, and encryption mechanisms.

CRUSHCephData Striping
0 likes · 42 min read
Ceph Storage Architecture Overview and Detailed Technical Features