Tagged articles
431 articles
Page 5 of 5
21CTO
21CTO
Jul 20, 2017 · Backend Development

How Ctrip Built a Real-Time User Data Collection System with Netty and Kafka

This article details Ctrip's design and implementation of a high‑throughput, low‑latency user data collection platform that leverages Java NIO, Netty, and a custom Kafka‑based messaging layer, covering architecture, encryption, compression, disaster‑recovery, performance testing, and downstream analytics products.

AvroBackend ArchitectureData Streaming
0 likes · 17 min read
How Ctrip Built a Real-Time User Data Collection System with Netty and Kafka
dbaplus Community
dbaplus Community
Jul 19, 2017 · Information Security

How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment

This guide explains why plain HTTP is insecure, introduces SSL/TLS fundamentals, compares certificate types, and provides step‑by‑step instructions for configuring HTTPS on a web server (including Nginx redirects), while highlighting performance impacts and testing considerations.

HTTPSNGINXSSL
0 likes · 9 min read
How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment
21CTO
21CTO
Jul 18, 2017 · Information Security

Why ECC Is Outpacing RSA: History, Algorithms, and Performance Benchmarks

This article traces the evolution of cryptography from ancient substitution ciphers to modern standards like DES, RSA, and ECC, explains symmetric and asymmetric encryption, compares ECC and RSA in security and efficiency, and presents cloud‑server performance tests showing ECC‑256’s superiority in speed and resource usage.

ECCPerformance TestingRSA
0 likes · 9 min read
Why ECC Is Outpacing RSA: History, Algorithms, and Performance Benchmarks
21CTO
21CTO
Jun 6, 2017 · Information Security

How to Search Encrypted Database Fields Securely with Blind Indexes

This article explains why deterministic encryption like ECB is unsafe for sensitive data, introduces nondeterministic authenticated encryption, and provides a practical blind‑index technique with PHP and SQL examples for searchable encryption of fields such as Social Security numbers.

Database SecurityPHPSQL
0 likes · 14 min read
How to Search Encrypted Database Fields Securely with Blind Indexes
ITPUB
ITPUB
May 25, 2017 · Information Security

How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive

This article explains why HTTPS is considered secure, how it prevents man‑in‑the‑middle attacks through certificate verification, details the TLS handshake captured with Wireshark, and shows the cryptographic primitives behind RSA, ECDHE and AES, including practical code snippets and the cost of using HTTPS.

CertificateHTTPSMan-in-the-Middle
0 likes · 19 min read
How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive
dbaplus Community
dbaplus Community
Mar 23, 2017 · Databases

Secure MariaDB Connections with SSL: A Complete Step‑by‑Step Guide

This article explains why internet‑financial companies need encrypted MariaDB connections, shows how to verify SSL support, and provides a detailed eight‑step procedure—including OpenSSL upgrade, CA creation, server and client certificates, MySQL configuration, and verification—to enable secure client‑server communication.

MariaDBOpenSSLSSL
0 likes · 11 min read
Secure MariaDB Connections with SSL: A Complete Step‑by‑Step Guide
WeChat Backend Team
WeChat Backend Team
Dec 9, 2016 · Information Security

Understanding TLS Record Protocol: Encryption, MAC, and Key Management

This article explains how the TLS record layer encrypts and authenticates application data by fragmenting, sequencing, optionally compressing, encrypting, computing HMAC, and transmitting over TCP/IP, while detailing the security parameters, key derivation, and the evolution from MAC‑then‑Encrypt to AEAD modes.

AEADKey ExpansionMac
0 likes · 15 min read
Understanding TLS Record Protocol: Encryption, MAC, and Key Management
Baidu Intelligent Testing
Baidu Intelligent Testing
Nov 24, 2016 · Information Security

Analysis of Common Android App Vulnerabilities and Mitigation Strategies

This article analyzes recent Android app security scan data, detailing prevalent vulnerabilities such as log leakage, weak encryption, WebView password storage, unsafe PendingIntent usage, and dynamic broadcast receiver exposure, and provides concrete code examples and remediation recommendations for developers.

PendingIntentWebViewbroadcast
0 likes · 10 min read
Analysis of Common Android App Vulnerabilities and Mitigation Strategies
Ctrip Technology
Ctrip Technology
Oct 24, 2016 · Information Security

User Password Encryption and Cracking Techniques

This article explains common user password storage methods, compares their security characteristics, and details various cracking approaches—including hash collisions, rainbow tables, and advanced algorithms like PBKDF2, bcrypt, and scrypt—while emphasizing the importance of strong encryption to mitigate data breach risks.

HashingPBKDF2Security
0 likes · 8 min read
User Password Encryption and Cracking Techniques
ITPUB
ITPUB
Aug 14, 2016 · Databases

14 Essential MySQL Security Practices to Protect Your Data

This guide outlines essential MySQL security measures—including removing default accounts, disabling unsafe LOCAL INFILE commands, enforcing strict user role permissions, encrypting sensitive data, ensuring data integrity through replication and backups, and standardizing operational practices—to protect database assets from irreversible breaches.

Database Securityaccess controldata integrity
0 likes · 6 min read
14 Essential MySQL Security Practices to Protect Your Data
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jul 21, 2016 · Information Security

How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential

This article explains how DNS hijacking injects unwanted ads by exploiting HTTP's lack of encryption, identity verification, and integrity checks, and demonstrates how HTTPS, with SSL/TLS encryption, certificates, and integrity validation, protects users from such attacks while also discussing performance impacts.

Certificate AuthorityDNS hijackingHTTPS
0 likes · 15 min read
How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential
MaGe Linux Operations
MaGe Linux Operations
Apr 21, 2016 · Information Security

Understanding SSL/TLS: From Handshake Basics to Secret Keys Explained

This article provides a comprehensive overview of SSL/TLS, covering its architecture, differences between SSL and TLS, detailed handshake steps, key exchange processes, secret generation, security considerations, proxy handling, and references, aiming to clarify the complex concepts for readers.

HandshakeSSLSecurity
0 likes · 22 min read
Understanding SSL/TLS: From Handshake Basics to Secret Keys Explained
21CTO
21CTO
Apr 13, 2016 · Information Security

Why HTTPS Slows You Down and How It Secures Your Data

The article explains that HTTPS combines HTTP with TLS to provide encryption, authentication, and data integrity, describes TLS versions, key‑exchange algorithms such as RSA and ECDHE, and analyzes the network round‑trip and CPU overhead that HTTPS introduces, while also discussing deployment costs and optimization considerations.

HTTPSSecurityTLS
0 likes · 29 min read
Why HTTPS Slows You Down and How It Secures Your Data
Architecture Digest
Architecture Digest
Apr 10, 2016 · Information Security

Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies

This article provides a comprehensive overview of HTTPS, explaining its purpose, advantages, and drawbacks, and delves into the underlying cryptographic concepts such as symmetric and asymmetric encryption, hash algorithms, digital signatures, digital certificates, and the detailed SSL/TLS handshake process.

HTTPSSSLTLS
0 likes · 19 min read
Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies
21CTO
21CTO
Apr 1, 2016 · Information Security

Understanding HTTPS: How SSL/TLS Secures Web Communication

This article explains HTTPS fundamentals, its encryption mechanisms, differences from HTTP, the roles of symmetric and asymmetric cryptography, hash functions, digital signatures, certificate issuance and validation, as well as SSL/TLS protocols, handshake steps, and session resumption techniques that secure web communications.

HTTPSSSLTLS
0 likes · 18 min read
Understanding HTTPS: How SSL/TLS Secures Web Communication
dbaplus Community
dbaplus Community
Dec 7, 2015 · Information Security

How to Build Robust Database Security: Logical and Physical Protection Strategies

This article explains why protecting database‑stored sensitive data is critical, analyzes common attack vectors and breach statistics, and provides detailed logical and physical security measures—including user and permission management, auditing, encryption, disaster‑recovery planning, and Oracle replication technologies—to help organizations achieve comprehensive database protection.

Database SecurityOracleaccess control
0 likes · 20 min read
How to Build Robust Database Security: Logical and Physical Protection Strategies
21CTO
21CTO
Nov 4, 2015 · Information Security

Master PHP Encryption: From MD5 to OpenSSL Asymmetric Techniques

This article explains PHP's various encryption methods, covering one-way hash functions like MD5 and SHA1, symmetric algorithms, the rarely used crypt() function, and detailed implementations of asymmetric encryption with OpenSSL, including key generation, encryption, decryption, and practical code examples.

HashOpenSSLPHP
0 likes · 15 min read
Master PHP Encryption: From MD5 to OpenSSL Asymmetric Techniques
Architects' Tech Alliance
Architects' Tech Alliance
Sep 7, 2015 · Operations

Managed Data Remote Replication with DD Boost and NetWorker

DD Boost allows backup applications to manage and simplify file replication between multiple Data Domain systems, and using NetWorker as an example, the article details the step‑by‑step replication workflow, optional low‑bandwidth and encryption features, and how remote restores are performed.

DDBoostDataDomainLowBandwidth
0 likes · 4 min read
Managed Data Remote Replication with DD Boost and NetWorker
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2015 · Information Security

Demystifying SSL/TLS: A Complete Guide to Handshake, Keys, and Security

This article provides a thorough, easy-to-understand overview of SSL/TLS, covering its architecture, differences between SSL and TLS, the handshake process, key derivation (PreMaster, Master, Session secrets), data encryption, security improvements, and practical considerations such as proxy handling and common attacks.

HandshakeSSLTLS
0 likes · 21 min read
Demystifying SSL/TLS: A Complete Guide to Handshake, Keys, and Security
MaGe Linux Operations
MaGe Linux Operations
Jun 5, 2015 · Information Security

Mastering SSL and OpenSSL: From Encryption Basics to Private CA Setup

This article explains SSL fundamentals, encryption types, PKI components, and provides step‑by‑step Linux OpenSSL commands for symmetric/asymmetric encryption, hashing, password handling, key generation, private CA creation, certificate signing, and revocation, enabling secure data transmission over networks.

Certificate AuthorityLinuxOpenSSL
0 likes · 14 min read
Mastering SSL and OpenSSL: From Encryption Basics to Private CA Setup
Qunar Tech Salon
Qunar Tech Salon
May 5, 2015 · Databases

Encrypting Sensitive Data with PostgreSQL pgcrypto

This article explains how to protect user privacy by using PostgreSQL's built-in pgcrypto extension to encrypt and decrypt sensitive fields such as phone numbers and ID numbers, showing practical SQL examples for creating tables, altering columns, storing ciphertext, and querying encrypted data.

Database SecurityPostgreSQLSQL
0 likes · 5 min read
Encrypting Sensitive Data with PostgreSQL pgcrypto
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2015 · Information Security

How to Build a Private CA with OpenSSL: Step‑by‑Step Guide

This article explains why encrypting network traffic is essential, introduces OpenSSL’s cryptographic components, and provides a detailed, command‑line tutorial for creating a private Certificate Authority, issuing certificates, and handling revocation within a LAN environment.

Certificate AuthorityOpenSSLPrivate CA
0 likes · 8 min read
How to Build a Private CA with OpenSSL: Step‑by‑Step Guide