Tagged articles
431 articles
Page 4 of 5
Java Captain
Java Captain
Jan 24, 2021 · Backend Development

An Overview of the Hutool Java Utility Library and Its Common Tools

This article introduces Hutool, a comprehensive Java utility library, detailing its core modules, practical code examples for encryption, HTML handling, and scheduling, and provides guidance on how to integrate its features into Java projects.

HTMLJavaUtility Library
0 likes · 6 min read
An Overview of the Hutool Java Utility Library and Its Common Tools
Python Programming Learning Circle
Python Programming Learning Circle
Jan 12, 2021 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

The article explains the vulnerabilities of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and describes the evolution of security mechanisms—including symmetric and asymmetric encryption, TLS handshakes, and certificate authority verification—that together make HTTPS a robust solution for protecting web communications.

Certificate AuthorityHTTPHTTPS
0 likes · 8 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
MaGe Linux Operations
MaGe Linux Operations
Jan 1, 2021 · Backend Development

How to Package Python Apps with PyInstaller: Tips, Encryption, and Docker

This guide explains how to use PyInstaller to bundle Python programs into standalone executables, discusses libc compatibility issues, shows installation, CLI entry creation, encryption options, a full packaging command, and provides a Dockerfile example for cross‑distribution deployment.

encryptionpyinstallerpython packaging
0 likes · 5 min read
How to Package Python Apps with PyInstaller: Tips, Encryption, and Docker
Java Interview Crash Guide
Java Interview Crash Guide
Jan 1, 2021 · Information Security

How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, details the role of Certificate Authorities, illustrates the handshake process, and clarifies common misconceptions about its safety and vulnerability to packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks
Open Source Tech Hub
Open Source Tech Hub
Dec 22, 2020 · Information Security

Master SSH Quickly: Core Concepts and Practical Usage Guide

This guide explains what SSH (Secure Shell) is, why it’s essential for encrypted communication and Linux server access, and provides a concise overview of OpenSSH’s core concepts and basic commands, serving as a quick reference manual for users.

OpenSSHSSHencryption
0 likes · 2 min read
Master SSH Quickly: Core Concepts and Practical Usage Guide
macrozheng
macrozheng
Dec 18, 2020 · Information Security

How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates

This article explains why HTTP is insecure, outlines the four core principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and signatures to establish confidentiality, integrity, authentication, and non-repudiation for safe data transmission.

HTTPSTLScryptography
0 likes · 15 min read
How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates
Top Architect
Top Architect
Dec 17, 2020 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, demonstrates how its plaintext transmission enables man‑in‑the‑middle attacks, and then details how HTTPS (TLS/SSL) with certificate authority verification and asymmetric key exchange secures web communication against such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
JD Cloud Developers
JD Cloud Developers
Dec 9, 2020 · Information Security

Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide

Following a massive ransomware breach that encrypted thousands of servers and stole sensitive data, this guide outlines four essential self‑check steps—data backup, encryption, server permission management, and platform user access control—along with JD Cloud’s concrete best‑practice actions to harden your infrastructure.

access controlcloud securitydata backup
0 likes · 7 min read
Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 8, 2020 · Information Security

Understanding HTTPS: How Secure Communication Is Achieved Over HTTP

This article explains why plain HTTP is insecure, outlines the four fundamental principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and digital signatures to establish confidentiality, integrity, authentication, and non-repudiation for web traffic.

HTTPSTLSdigital certificate
0 likes · 13 min read
Understanding HTTPS: How Secure Communication Is Achieved Over HTTP
Architects' Tech Alliance
Architects' Tech Alliance
Nov 30, 2020 · Industry Insights

Cut Storage Costs and Boost Disaster Recovery with Deduplication and Encryption

Data deduplication eliminates redundant data blocks to lower storage and bandwidth costs, while source‑ and transmission‑level encryption safeguards data in transit and at rest; the article also compares hardware vs software deduplication, various storage architectures (DAS, SAN, NAS, object and distributed storage) and their trade‑offs.

BackupNASSAN
0 likes · 15 min read
Cut Storage Costs and Boost Disaster Recovery with Deduplication and Encryption
php Courses
php Courses
Nov 10, 2020 · Backend Development

Common Pitfalls When Integrating WeChat Enterprise Callback with ThinkPHP

This article outlines three major pitfalls developers encounter when using ThinkPHP 3.2.3 with PHP 5.3 to handle WeChat enterprise callback decryption, and provides step‑by‑step solutions including library adjustments, constructor updates, signature handling, and output buffering cleanup.

EnterpriseWeChatcallback
0 likes · 4 min read
Common Pitfalls When Integrating WeChat Enterprise Callback with ThinkPHP
Architects' Tech Alliance
Architects' Tech Alliance
Nov 9, 2020 · Cloud Computing

Ceph Storage Architecture: Overview, Cluster Design, Client Interfaces, and Encryption

This article provides a comprehensive technical overview of Red Hat Ceph, covering its distributed storage architecture, cluster components, storage pool types, authentication, placement algorithms, I/O paths, replication and erasure‑coding strategies, internal management operations, high‑availability mechanisms, client libraries, data striping, and encryption details.

CRUSHCephData Striping
0 likes · 39 min read
Ceph Storage Architecture: Overview, Cluster Design, Client Interfaces, and Encryption
Programmer DD
Programmer DD
Nov 2, 2020 · Information Security

Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle

This article introduces Java developers to the Bouncy Castle library, detailing how to integrate it via Maven, demonstrating MD5 hashing and AES encryption/decryption code, and highlighting usage considerations and export compliance risks associated with cryptographic algorithms.

AESBouncy CastleJava
0 likes · 5 min read
Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle
Architecture Digest
Architecture Digest
Oct 17, 2020 · Information Security

Understanding HTTPS: Principles, Encryption, and Security

This article explains why HTTPS has become essential for web security, compares it with HTTP, describes the weaknesses of plain HTTP and hashing algorithms, and details how symmetric and asymmetric encryption together with TLS/SSL certificates secure data transmission over the Internet.

HTTPSTLSTLS/SSL
0 likes · 11 min read
Understanding HTTPS: Principles, Encryption, and Security
Fulu Network R&D Team
Fulu Network R&D Team
Sep 23, 2020 · Information Security

Generating and Using P12 Certificates with BouncyCastle in .NET Core

This article explains how to generate PKCS#12 (p12) certificates using BouncyCastle in .NET Core, extract keys with OpenSSL, install the certificates on Windows, and demonstrates encryption and decryption with the generated keys, providing complete code samples and step‑by‑step instructions.

.NET CoreBouncyCastleC
0 likes · 15 min read
Generating and Using P12 Certificates with BouncyCastle in .NET Core
OPPO Amber Lab
OPPO Amber Lab
Sep 22, 2020 · Information Security

Understanding Cryptography: From Basics to Symmetric & Asymmetric Ciphers

This article introduces the fundamentals of cryptography, explaining what passwords are, the difference between encryption and decryption, classifications of cryptographic algorithms such as symmetric, asymmetric, hash functions, and message authentication, and illustrates concepts with examples like RC4 and block cipher modes.

asymmetric cipherencryptionhash function
0 likes · 5 min read
Understanding Cryptography: From Basics to Symmetric & Asymmetric Ciphers
Alibaba Cloud Developer
Alibaba Cloud Developer
Sep 9, 2020 · Fundamentals

How Streaming ZIP Decompression Cuts Load Times by 50%

Streaming ZIP decompression enables extracting files while downloading, eliminating the need to fetch the entire archive; by leveraging Local File Header metadata and supporting both traditional and AES encryption, this technique dramatically reduces latency, as demonstrated by Youku’s 0.91‑second load for 30 MB books.

File FormatStreaming Decompressionencryption
0 likes · 11 min read
How Streaming ZIP Decompression Cuts Load Times by 50%
Tencent Cloud Developer
Tencent Cloud Developer
Aug 3, 2020 · Information Security

Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions

The article outlines enterprise data‑security risks and regulatory demands, reviews symmetric, asymmetric and hash techniques, highlights cloud‑encryption and key‑management challenges, and presents Tencent Cloud’s comprehensive solutions—including KMS, BYOK, white‑box keys, virtual HSMs, and integrated database encryption—to protect data throughout its lifecycle.

Tencent Cloudcloud computingcompliance
0 likes · 20 min read
Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions
Open Source Linux
Open Source Linux
Jul 13, 2020 · Information Security

Demystifying HTTPS: How Encryption and Certificates Secure the Web

This article explains in plain language what HTTPS is, how it encrypts data using symmetric and asymmetric techniques, how it verifies server identity with digital signatures and certificates, and why these mechanisms keep web communications safe from eavesdropping and tampering.

HTTPSTLSWeb Security
0 likes · 7 min read
Demystifying HTTPS: How Encryption and Certificates Secure the Web
Programmer DD
Programmer DD
Jul 3, 2020 · Information Security

Why HTTPS Matters: Understanding Symmetric & Asymmetric Encryption

This article explains why HTTPS is essential, compares symmetric and asymmetric encryption, illustrates how encryption keys are securely exchanged, and outlines the three core reasons HTTPS reliably protects data from eavesdropping and man‑in‑the‑middle attacks.

HTTPSTLSencryption
0 likes · 5 min read
Why HTTPS Matters: Understanding Symmetric & Asymmetric Encryption
MaGe Linux Operations
MaGe Linux Operations
Jun 24, 2020 · Information Security

How to Secure Zabbix Data Transfer with PSK and TLS Encryption

This guide explains why Zabbix data transmission in mixed‑cloud environments requires encryption, describes the TLS/PSK and certificate‑based security options supported since Zabbix 3.0, outlines their limitations, lists compatible encryption libraries, and provides step‑by‑step configuration commands for both GnuTLS and OpenSSL.

PSKTLSZabbix
0 likes · 13 min read
How to Secure Zabbix Data Transfer with PSK and TLS Encryption
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying cryptographic processes—including certificate verification, asymmetric and symmetric encryption, and the role of Certificate Authorities—while also addressing common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security Mechanisms of HTTPS
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSPublic Key InfrastructureTLS
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Java Architecture Diary
Java Architecture Diary
May 26, 2020 · Backend Development

Secure Your Data with MyBatis‑Plus 3.3.2: New Encryption Features Explained

Version 3.3.2 of MyBatis‑Plus introduces elegant data‑security measures, including YML‑based encrypted configuration, AES key generation, and encrypted database credentials, while also delivering numerous bug fixes and enhancements such as pagination improvements, generator updates, and support for additional databases.

BackendJavadata security
0 likes · 4 min read
Secure Your Data with MyBatis‑Plus 3.3.2: New Encryption Features Explained
Architecture Digest
Architecture Digest
May 23, 2020 · Information Security

Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions

This article explains how HTTPS works by detailing the certificate verification and data transmission phases, the use of asymmetric and symmetric encryption, the role of Certificate Authorities, potential man‑in‑the‑middle attacks, browser validation steps, and why HTTPS does not fully prevent packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions
Java Captain
Java Captain
May 17, 2020 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamps, AppId authentication, rate limiting, blacklisting, and data validation—and provides practical Java implementation examples and code snippets.

AppIdBlacklistencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
Laravel Tech Community
Laravel Tech Community
May 16, 2020 · Fundamentals

Master PHP Sorting Algorithms: Insertion, Selection, Bubble, Quick, Shell & More

This comprehensive guide walks through classic PHP sorting techniques—including insertion, selection, bubble, quick, and shell sorts—along with essential string utilities such as length calculation, reversal, comparison, substring search, replacement, insertion, deletion, copying, concatenation, simple encoding/decoding, and basic encryption/decryption, providing clear explanations and ready‑to‑run code examples for each algorithm.

AlgorithmsData StructuresPHP
0 likes · 15 min read
Master PHP Sorting Algorithms: Insertion, Selection, Bubble, Quick, Shell & More
Laravel Tech Community
Laravel Tech Community
May 13, 2020 · Information Security

PHP AES Encryption and Decryption Using OpenSSL

This article demonstrates how to replace the deprecated mcrypt functions in PHP with OpenSSL by providing a compact Aes class that handles AES‑128‑CBC encryption and decryption, including configuration of key, IV, and method, and shows practical usage examples.

AESOpenSSLdecryption
0 likes · 3 min read
PHP AES Encryption and Decryption Using OpenSSL
Architect's Tech Stack
Architect's Tech Stack
Apr 16, 2020 · Backend Development

Introduction to the Hutool Java Utility Library and Sample Usage

This article introduces the Hutool Java utility library, describes its main modules such as encryption, HTML handling, and cron scheduling, and provides practical code examples demonstrating how to use SecureUtil, HtmlUtil, and CronUtil to simplify backend development tasks.

Backend DevelopmentCron schedulingHTML Sanitization
0 likes · 6 min read
Introduction to the Hutool Java Utility Library and Sample Usage
Liangxu Linux
Liangxu Linux
Mar 21, 2020 · Information Security

Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained

This article explains why HTTPS was created to address HTTP’s lack of encryption, authentication, and integrity, describes how TLS/SSL adds security, details the roles of symmetric and asymmetric encryption, hash algorithms, digital certificates, and the full handshake process that secures modern web communication.

HTTPSSSLTLS
0 likes · 19 min read
Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained
Tencent Tech
Tencent Tech
Feb 28, 2020 · Information Security

How to Safeguard Enterprise Data in the Cloud: Practical Strategies

This article explains why data security is vital for businesses, outlines common technical, process and human threats, and provides actionable cloud‑based measures—including backup strategies, snapshot usage, permission management, data classification, and encryption—to protect enterprise data throughout its lifecycle.

BackupCloud Servicesaccess control
0 likes · 13 min read
How to Safeguard Enterprise Data in the Cloud: Practical Strategies
21CTO
21CTO
Feb 24, 2020 · Information Security

Top 10 Open‑Source Security Tools Every Professional Should Know

This article introduces ten essential open‑source security tools—including Nessus, Snort, Nagios, Ettercap, Infection Monkey, Delta, Cuckoo Sandbox, The Sleuth Kit, Lynis, and Certbot—detailing their main features, licensing models, and typical use cases for vulnerability scanning, intrusion detection, network monitoring, and forensic analysis.

Network Monitoringdigital forensicsencryption
0 likes · 9 min read
Top 10 Open‑Source Security Tools Every Professional Should Know
Efficient Ops
Efficient Ops
Feb 19, 2020 · Information Security

How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained

This article explains how HTTPS protects data through encryption and identity authentication, describes symmetric and asymmetric algorithms, outlines PKI and certificate issuance processes, demonstrates Nginx certificate deployment, and shows how trust chains and cross‑certificates ensure reliable secure connections.

CertificateCross CertificateHTTPS
0 likes · 14 min read
How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained
Senior Brother's Insights
Senior Brother's Insights
Jan 10, 2020 · Information Security

Essential API Security Measures: Encryption, Signing, Rate Limiting, and More

This guide outlines key API security strategies—including data encryption, digital signatures, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—explaining their purpose, implementation details, code examples, and practical considerations for protecting transaction-related endpoints.

API SecurityAppIdJava
0 likes · 10 min read
Essential API Security Measures: Encryption, Signing, Rate Limiting, and More
FunTester
FunTester
Jan 9, 2020 · Information Security

Essential Security Checklist for Web Apps: From Unit Tests to Encryption

This article presents a practical checklist for securing web applications, covering unit testing, access control, change tracking, admin privilege management, least‑privilege principles, remote redundancy, monitoring, encryption, automated security scanning, and SQL injection prevention, offering actionable guidance for developers.

Web Securityaccess controlencryption
0 likes · 7 min read
Essential Security Checklist for Web Apps: From Unit Tests to Encryption
Efficient Ops
Efficient Ops
Jan 6, 2020 · Information Security

Why HTTPS Is Truly Secure: Deep Dive into Its Principles and Pitfalls

This article thoroughly explains how HTTPS ensures secure communication by detailing its certificate verification, the use of asymmetric encryption for authentication and symmetric encryption for data transfer, the role of Certificate Authorities, common attacks like man‑in‑the‑middle, and why HTTPS alone cannot prevent all forms of packet sniffing.

Certificate AuthorityHTTPSTLS
0 likes · 12 min read
Why HTTPS Is Truly Secure: Deep Dive into Its Principles and Pitfalls
Architect's Tech Stack
Architect's Tech Stack
Jan 1, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying TLS handshake and data transmission process, clarifies the roles of asymmetric and symmetric encryption, the necessity of CA‑issued certificates, and discusses common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding the Principles and Security Mechanisms of HTTPS
Java Captain
Java Captain
Dec 9, 2019 · Information Security

Understanding the Principles and Security of HTTPS

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, describes the role of Certificate Authorities, outlines the handshake process, discusses man‑in‑the‑middle attacks, and clarifies the limits of HTTPS against packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security of HTTPS
Programmer DD
Programmer DD
Nov 16, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Deep Dive

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security concepts that protect client‑server communication.

HTTPSPublic Key InfrastructureTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Deep Dive
360 Quality & Efficiency
360 Quality & Efficiency
Sep 27, 2019 · Mobile Development

Using ADBLib in Android: Setup, Step‑by‑Step Guide, and Underlying Principles

This article explains how to integrate and use ADBLib within an Android app, covering required Gradle and manifest configurations, step‑by‑step procedures for establishing a TCP/IP connection, generating encryption keys, retrieving the device IP, creating socket connections, and executing ADB commands, along with an overview of ADBLib’s underlying architecture.

ADBADBLibAndroid
0 likes · 6 min read
Using ADBLib in Android: Setup, Step‑by‑Step Guide, and Underlying Principles
MaGe Linux Operations
MaGe Linux Operations
Sep 9, 2019 · Information Security

Demystifying HTTPS: How Secure HTTP Protects Your Data

This article explains what HTTPS is, why it adds encryption to HTTP, how SSL/TLS, symmetric and asymmetric cryptography, certificates, and handshakes work together to ensure confidentiality, integrity, and authenticity, and discusses the performance impact of HTTPS connections.

HTTPSTLScertificates
0 likes · 11 min read
Demystifying HTTPS: How Secure HTTP Protects Your Data
Qunar Tech Salon
Qunar Tech Salon
Aug 6, 2019 · Information Security

Data Security Construction at Qunar: Practices and Experience

This article describes Qunar's comprehensive data security framework, covering data classification, warehouse access control, permission compliance, encryption, leakage detection, and the supporting institutional policies that together enable a small security team to protect large‑scale business data.

Qunaraccess controldata classification
0 likes · 13 min read
Data Security Construction at Qunar: Practices and Experience
dbaplus Community
dbaplus Community
Jul 27, 2019 · Fundamentals

How a Chinese Drama Illustrates Data Structures, Algorithms, and Time Complexity

The article uses the plot of the historical series “The Longest Day in Chang’an” to explain how proper use of data structures, recommendation algorithms, and time‑complexity optimizations—such as O(n²) brute‑force search, O(n) mapping, and O(log n) spatial tricks—can turn a desperate race against time into a successful mission, while also touching on big‑data analysis and simple encryption via the tower‑signal system.

AlgorithmsRecommendation Systemsencryption
0 likes · 4 min read
How a Chinese Drama Illustrates Data Structures, Algorithms, and Time Complexity
Ziru Technology
Ziru Technology
Jul 25, 2019 · Information Security

PKI, Digital Signatures & SSH: A Practical Guide to Information Security

This article explains the fundamentals of Public Key Infrastructure, the differences between symmetric and asymmetric encryption, how digital signatures and certificates ensure data integrity and authenticity, and illustrates the SSH protocol’s secure authentication mechanisms, providing a comprehensive overview of modern information security techniques.

PKISSHdigital signature
0 likes · 16 min read
PKI, Digital Signatures & SSH: A Practical Guide to Information Security
21CTO
21CTO
Jul 3, 2019 · Information Security

How HTTPS Secures Your Connection: From TCP Handshake to TLS Encryption

HTTPS combines HTTP with SSL/TLS encryption to protect data transmission, involving DNS lookup, TCP three‑way handshake, TLS negotiation with certificates and symmetric keys, and finally encrypted HTTP communication, while the article also explains TCP’s four‑way termination and the overall request‑response flow.

TCP handshakeTLSWeb Security
0 likes · 7 min read
How HTTPS Secures Your Connection: From TCP Handshake to TLS Encryption
21CTO
21CTO
May 9, 2019 · Information Security

Why HTTPS Matters: Encryption, Certificates, and Handshake Explained

HTTPS secures web communication by combining symmetric and asymmetric encryption, digital certificates, and signatures, addressing HTTP’s confidentiality, integrity, and authenticity flaws; the article explains these cryptographic concepts, the SSL/TLS handshake steps, and when HTTPS is appropriate despite its performance overhead.

HTTPSTLSWeb Security
0 likes · 12 min read
Why HTTPS Matters: Encryption, Certificates, and Handshake Explained
Meituan Technology Team
Meituan Technology Team
Mar 7, 2019 · Information Security

Enhancing Security of Mobile Web Activity Pages: Human Verification and Risk Control Strategies

To protect mobile web activity pages such as coupons and lotteries, the article proposes a layered security approach that combines professional risk‑control services, custom human‑verification logs, token‑based HTTPS signing, data encryption, and aggressive front‑end JavaScript obfuscation to block automated abuse while preserving user experience.

TokenWeb Securityencryption
0 likes · 16 min read
Enhancing Security of Mobile Web Activity Pages: Human Verification and Risk Control Strategies
Open Source Tech Hub
Open Source Tech Hub
Dec 26, 2018 · Information Security

How to Implement RSA Encryption and Decryption in PHP with OpenSSL

This guide explains how to generate RSA key pairs on Linux, use OpenSSL commands, and implement PHP code for public‑key encryption, private‑key decryption, padding options, data‑size limits, and helper functions for handling messages larger than the RSA block size.

OpenSSLRSAcryptography
0 likes · 6 min read
How to Implement RSA Encryption and Decryption in PHP with OpenSSL
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

HTTPSPublic Key InfrastructureTLS
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates
Architects' Tech Alliance
Architects' Tech Alliance
Dec 12, 2018 · Information Security

Understanding Enterprise Self‑Encrypting Drives (SED), Key Management Controllers (KMC) and NetApp Encryption Technologies

This article explains how enterprise self‑encrypting drives (SED) work with FIPS‑compliant key management controllers (KMC), details the encryption and key lifecycle processes, compares SED variants, and introduces NetApp's NSE and NVE storage encryption solutions for secure data protection.

KMCNetAppencryption
0 likes · 13 min read
Understanding Enterprise Self‑Encrypting Drives (SED), Key Management Controllers (KMC) and NetApp Encryption Technologies
JD Tech
JD Tech
Oct 25, 2018 · Information Security

Common Encryption Methods for Frontend Development

This article introduces the most frequently used encryption techniques in frontend development—including Base64 encoding, hash functions, salting, slow hash algorithms, key‑hashing, XOR, symmetric and asymmetric encryption, digital signatures, and practical CryptoJS usage—explaining their principles, appropriate scenarios, and providing ready‑to‑use code examples.

HashJavaScriptcrypto
0 likes · 14 min read
Common Encryption Methods for Frontend Development
Efficient Ops
Efficient Ops
Oct 23, 2018 · Information Security

Why HTTPS Matters: Performance, Security, and the Cryptography Behind It

This article explains why HTTPS is essential by comparing HTTP’s performance drawbacks, detailing its security vulnerabilities, and describing the cryptographic mechanisms—including TLS, symmetric and asymmetric encryption, certificates, and HMAC—that HTTPS employs to protect data and enable modern features like HTTP/2.

HTTP/2HTTPSTLS
0 likes · 7 min read
Why HTTPS Matters: Performance, Security, and the Cryptography Behind It
Java Captain
Java Captain
Oct 16, 2018 · Backend Development

Practical SpringBoot Tips: Mocking External Dependencies and Encrypting Configuration

This article shares practical SpringBoot techniques for locally mocking external service dependencies and encrypting configuration properties, detailing step-by-step bean replacement using PowerMockito, configuration encryption with Jasypt, and accompanying code examples for seamless development without starting full distributed services.

JavaMockingSpringBoot
0 likes · 8 min read
Practical SpringBoot Tips: Mocking External Dependencies and Encrypting Configuration
Manbang Technology Team
Manbang Technology Team
Sep 13, 2018 · Mobile Development

Design and Implementation of a High‑Performance, High‑Availability Logging System for iOS Apps

This article describes the motivation, design choices, memory‑mapped implementation, performance evaluation, and practical lessons learned while building a lightweight, crash‑resilient logging framework for the 运满满 iOS client, highlighting its superiority over traditional file‑write approaches.

Mobile DevelopmentencryptioniOS
0 likes · 8 min read
Design and Implementation of a High‑Performance, High‑Availability Logging System for iOS Apps
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2018 · Information Security

How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures

This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.

CertificateMacasymmetric key
0 likes · 14 min read
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures
Architects' Tech Alliance
Architects' Tech Alliance
Jun 13, 2018 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms such as HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, the differences between symmetric and asymmetric cryptography, and the core security requirements of confidentiality, integrity, authenticity, and performance.

HTTPHTTPSTLS
0 likes · 14 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
Java Backend Technology
Java Backend Technology
Jun 7, 2018 · Information Security

How to Secure API Calls with End-to-End Encryption Using Spring Boot

This article explains why API security is crucial in front‑end/back‑end separated systems and provides practical measures—including HTTPS, request signing, SSL pinning, and full request/response AES encryption—along with a Spring Boot starter and JavaScript Axios interceptor to protect data in transit.

AESAPI SecurityRSA
0 likes · 8 min read
How to Secure API Calls with End-to-End Encryption Using Spring Boot
Java Architect Essentials
Java Architect Essentials
May 28, 2018 · Information Security

How to Secure RESTful APIs: Authentication, Encryption, and Authorization Strategies

This guide explains the three core pillars of RESTful API security—client authentication, data encryption, and post‑authentication authorization—detailing practical methods such as signature keys, HTTP Basic/Digest, OAuth, SSL, selective encryption with salts, and role‑based access control.

AuthenticationAuthorizationHTTP Digest
0 likes · 4 min read
How to Secure RESTful APIs: Authentication, Encryption, and Authorization Strategies
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

HTTPSHashingPBKDF2
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
Programmer DD
Programmer DD
May 3, 2018 · Backend Development

Why Your Encrypted Config Loses ‘+’ and ‘=’ with curl – and How to Fix It

When using Spring Cloud Config's encryption/decryption endpoints via curl, special characters such as '+' and '=' can disappear because curl's default -d option does not URL‑encode the payload, but using --data-urlencode or setting the proper Content-Type header preserves these characters and ensures correct encryption and decryption.

Config ServerJavaOkHttp
0 likes · 4 min read
Why Your Encrypted Config Loses ‘+’ and ‘=’ with curl – and How to Fix It
21CTO
21CTO
Apr 2, 2018 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained

This article walks through a step‑by‑step reconstruction of HTTPS design, showing why secure communication requires per‑client symmetric keys negotiated via asymmetric encryption, digital certificates from trusted CAs, and how signatures and random numbers protect against man‑in‑the‑middle attacks.

HTTPSTLSdigital certificate
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained
MaGe Linux Operations
MaGe Linux Operations
Mar 26, 2018 · Information Security

Understanding HTTPS: Why Encryption Matters and How It Works

This article explains what HTTPS is, why encrypting HTTP traffic is essential, how symmetric and asymmetric encryption protect data, the role of certificates and public‑key infrastructure, and the performance impact of the HTTPS handshake, providing a concise Q&A guide for beginners.

HTTPSTLSencryption
0 likes · 11 min read
Understanding HTTPS: Why Encryption Matters and How It Works
Architects' Tech Alliance
Architects' Tech Alliance
Jan 3, 2018 · Information Security

Data Security and Encryption Technologies: Standards, Solutions, and Best Practices

Data breaches have surged, affecting governments, enterprises, and security vendors, prompting the need for robust encryption across storage, application, and gateway layers, with standards such as FIPS 140‑2 and solutions from Vormetric and SafeNet offering transparent, compatible, and managed encryption for on‑premises and cloud environments.

FIPS140-2cloud encryptiondata security
0 likes · 9 min read
Data Security and Encryption Technologies: Standards, Solutions, and Best Practices
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Dec 28, 2017 · Information Security

How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic

This article demystifies HTTPS by explaining its underlying encryption, signing, and certificate mechanisms, illustrating how zero‑knowledge proof concepts secure identity verification, and providing practical guidance on upgrading from HTTP, configuring certificates, capturing traffic with Fiddler, and understanding session recovery and performance considerations.

CertificateFiddlerHTTPS
0 likes · 11 min read
How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic
21CTO
21CTO
Nov 10, 2017 · Information Security

Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained

This article explains the fundamentals of symmetric and asymmetric encryption, the key distribution challenges they face, how hybrid cryptosystems combine their strengths, and introduces essential cryptographic tools such as hash functions, message authentication codes, digital signatures, and public‑key certificates, comparing their capabilities.

CertificateMacdigital signature
0 likes · 15 min read
Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained
dbaplus Community
dbaplus Community
Oct 9, 2017 · Information Security

How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies

This article explains how MongoDB’s security features—including access control, authentication, encryption, data discovery, retention policies, zone sharding, backup, monitoring, and audit logging—help organizations meet GDPR requirements while minimizing operational overhead and ensuring data sovereignty.

BackupGDPRMongoDB
0 likes · 18 min read
How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies
dbaplus Community
dbaplus Community
Sep 25, 2017 · Information Security

How GDPR Shapes Data Management Practices and Database Security

This article explains GDPR's key principles, the Discover‑Defend‑Detect framework, and concrete database controls such as data identification, retention, pseudonymisation, encryption, access control, disaster recovery, and audit logging needed to achieve compliance.

Audit loggingData ProtectionGDPR
0 likes · 12 min read
How GDPR Shapes Data Management Practices and Database Security
dbaplus Community
dbaplus Community
Sep 9, 2017 · Information Security

Why MongoDB Nodes Are Getting Hijacked and How to Secure Them

The article examines the widespread exposure of MongoDB instances on default ports, outlines how attackers hijack them, and provides concrete steps—including enabling authentication, configuring role‑based access, encrypting traffic, and limiting network exposure—to secure MongoDB deployments.

AuthenticationAuthorizationMongoDB
0 likes · 7 min read
Why MongoDB Nodes Are Getting Hijacked and How to Secure Them
21CTO
21CTO
Aug 27, 2017 · Information Security

How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt

This article examines common password‑storage techniques, explains why plain‑text, symmetric encryption, and simple hashes are insecure, and demonstrates how modern algorithms like PBKDF2, bcrypt, and scrypt, together with proper salting and iteration, can effectively protect user credentials against large‑scale cracking attacks.

HashingPBKDF2bcrypt
0 likes · 8 min read
How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt
Architecture Digest
Architecture Digest
Aug 11, 2017 · Information Security

Common Web Attacks and Their Mitigation Techniques

The article introduces major web security threats such as XSS, injection, CSRF, explains their mechanisms with examples, and presents defensive measures including input sanitization, HttpOnly cookies, web application firewalls, and encryption methods like hashing, symmetric and asymmetric cryptography.

CSRFSQL injectionWAF
0 likes · 10 min read
Common Web Attacks and Their Mitigation Techniques
Architects' Tech Alliance
Architects' Tech Alliance
Aug 6, 2017 · Industry Insights

Inside a Generic SSD Controller: Key Components and Their Roles

This article provides a detailed overview of the main building blocks of a generic SSD controller, explaining how each part—from host interfaces and SMART monitoring to wear leveling, encryption engines, and defect management—interacts with NAND flash to deliver performance, reliability, and security.

ControllerHardwareNAND
0 likes · 7 min read
Inside a Generic SSD Controller: Key Components and Their Roles