Tag

Information Security

0 views collected around this technical thread.

Java Captain
Java Captain
Jun 8, 2025 · Mobile Development

Unlock WeChat’s Hidden ‘recover’ Feature to Restore Deleted Chats

This article explains WeChat’s hidden “recover” feature, detailing its official purpose, technical limits, step‑by‑step recovery methods, effectiveness, backup strategies, and the risks of third‑party tools, helping users safely restore lost chat records.

BackupData RecoveryInformation Security
0 likes · 8 min read
Unlock WeChat’s Hidden ‘recover’ Feature to Restore Deleted Chats
Java Captain
Java Captain
May 28, 2025 · Information Security

WeChat Account Unblocking Guide: Self-Service and Manual Appeal Procedures (2025 Update)

This comprehensive guide explains the 2025 WeChat account unblocking process, covering identification of restriction types, required evidence, self‑service five‑step recovery, advanced manual appeal tactics, common issues, and post‑unblock security measures to help users restore access efficiently.

Account RecoveryInformation SecuritySelf-Service
0 likes · 10 min read
WeChat Account Unblocking Guide: Self-Service and Manual Appeal Procedures (2025 Update)
Efficient Ops
Efficient Ops
May 27, 2025 · Information Security

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Information SecurityTaiwan hacker groupcybersecurity
0 likes · 4 min read
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm
Java Tech Enthusiast
Java Tech Enthusiast
May 22, 2025 · Information Security

Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites

Google Chrome now offers an automatic password‑change function that detects leaked credentials, generates strong passwords, and updates them with minimal user effort, while websites must adopt specific autocomplete attributes and change‑password URLs to integrate seamlessly with this security enhancement.

Auto-Password ChangeChromeInformation Security
0 likes · 5 min read
Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites
Efficient Ops
Efficient Ops
May 20, 2025 · Information Security

How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services

A coordinated overseas cyber‑attack breached a Guangzhou tech firm's self‑service equipment backend, causing hours of service outage, data leakage, and significant losses, prompting swift police investigation, evidence preservation, and a detailed technical analysis of the attackers' methods.

ChinaInformation Securitycybersecurity
0 likes · 4 min read
How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services
Top Architect
Top Architect
May 7, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, expiration policies, two‑factor authentication and safe token refresh mechanisms.

Information SecurityWeb Developmentauthentication
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
macrozheng
macrozheng
Apr 29, 2025 · Information Security

Why Companies Ban IntelliJ IDEA: Legal, Security, and Cost Insights

The article explains why some companies prohibit IntelliJ IDEA, citing copyright risks, security vulnerabilities, efficiency losses from activation prompts, collaboration challenges, and the high cost of commercial licenses, while emphasizing the need to follow unified tool policies.

Information SecurityIntelliJ IDEASoftware Licensing
0 likes · 6 min read
Why Companies Ban IntelliJ IDEA: Legal, Security, and Cost Insights
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

HTTPSInformation SecurityTwo-Factor Authentication
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Java Architect Essentials
Java Architect Essentials
Apr 20, 2025 · Information Security

Free PC Firewall Recommendations and Comparative Analysis

This article provides a comprehensive comparison of free PC firewall solutions, detailing each software's core functions, suitable scenarios, drawbacks, and source references, followed by key recommendations, compatibility notes, performance assessments, and user feedback to help readers choose the most suitable firewall.

FirewallInformation SecurityPC security
0 likes · 14 min read
Free PC Firewall Recommendations and Comparative Analysis
php中文网 Courses
php中文网 Courses
Apr 11, 2025 · Information Security

Best Practices for Securing PHP Files and Directories

This article explains the risks of exposing sensitive PHP files, outlines common security threats, and provides concrete best‑practice measures such as proper permission settings, .htaccess rules, placing files outside the web root, configuration safeguards, and regular security audits to protect web applications.

Information SecurityWeb Developmentfile permissions
0 likes · 6 min read
Best Practices for Securing PHP Files and Directories
Selected Java Interview Questions
Selected Java Interview Questions
Apr 9, 2025 · Information Security

Using nmap4j in Java to Scan Services and Retrieve Database Version Information

This article explains how to integrate the nmap4j library into a Java SpringBoot project to perform Nmap scans for service and version detection, retrieve database details, handle both Windows and Linux environments, and process the XML results with Dom4j, providing complete code examples and parameter guidance.

Information SecurityJavabackend
0 likes · 11 min read
Using nmap4j in Java to Scan Services and Retrieve Database Version Information
AntTech
AntTech
Apr 2, 2025 · Information Security

ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group

The ISO/IEC JTC 1/SC 27 plenary meeting in Virginia approved the ISO/IEC 25330 Part 3 standard on Oblivious Transfer Extension, a cryptographic protocol standardized by Ant Group with contributions from Chinese researchers, aiming to improve OT efficiency and interoperability for secure multi‑party computation.

Ant GroupCryptographyISO/IEC 25330
0 likes · 4 min read
ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group
IT Architects Alliance
IT Architects Alliance
Mar 29, 2025 · Information Security

Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison

The article explains why data masking is essential for protecting sensitive information, then details three implementation methods—SQL, Java (with open‑source plugins), and the MyBatis‑Mate‑Sensitive‑Jackson ORM extension—comparing their principles, code examples, advantages, limitations, performance, suitable scenarios, and cost considerations.

DatabaseInformation SecurityJava
0 likes · 17 min read
Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison
Python Programming Learning Circle
Python Programming Learning Circle
Mar 27, 2025 · Information Security

Decrypting Password‑Protected Zip Files with Python

This article explains how to use Python's built‑in zipfile module and the third‑party rarfile library to brute‑force and decrypt encrypted zip archives, handle Chinese filename encoding issues, and generate password permutations efficiently with itertools for flexible password lengths.

Information SecurityPassword Crackingfile decryption
0 likes · 9 min read
Decrypting Password‑Protected Zip Files with Python
php中文网 Courses
php中文网 Courses
Mar 25, 2025 · Information Security

Using captainhook/secrets with Composer to Detect and Prevent Sensitive Information Leakage

This article explains how to automatically detect and block accidental commits of sensitive data such as database passwords or API keys in a PHP project by integrating the captainhook/secrets library via Composer, covering installation, predefined suppliers, custom regex, whitelist usage, and the benefits of CI/CD integration.

CI/CDComposerInformation Security
0 likes · 4 min read
Using captainhook/secrets with Composer to Detect and Prevent Sensitive Information Leakage
IT Architects Alliance
IT Architects Alliance
Mar 23, 2025 · Information Security

Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies

The article examines the often‑ignored hidden vulnerabilities in cloud architectures—such as API flaws, misconfigurations, and third‑party service risks—illustrates real‑world incidents, explains why enterprises neglect these issues, and offers concrete measures to strengthen cloud security.

API vulnerabilitiesInformation Securitycloud security
0 likes · 10 min read
Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies
IT Services Circle
IT Services Circle
Mar 22, 2025 · Information Security

Microsoft Restores Material Theme Extensions After False Security Flag

Microsoft reinstated the "Material Theme - Free" and "Material Theme Icons - Free" VSCode extensions after an AI‑driven security scan mistakenly flagged them as malicious, prompting a public apology and a review of its scanning policies.

AI scannerInformation SecurityMaterial Theme
0 likes · 5 min read
Microsoft Restores Material Theme Extensions After False Security Flag
Cognitive Technology Team
Cognitive Technology Team
Mar 22, 2025 · Information Security

Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances

The article examines how cryptographic watermarking can secure AI‑generated content by embedding robust, undetectable, and unforgeable signatures, reviews existing methods such as SynthID and Video Seal, and discusses recent research using pseudo‑random codes, error‑correcting codes, and diffusion inversion to improve watermark resilience.

AI watermarkingCryptographyGenerative AI
0 likes · 9 min read
Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances
Selected Java Interview Questions
Selected Java Interview Questions
Mar 16, 2025 · Information Security

Integrating Apache Tika with Spring Boot for Sensitive Information Detection and Data Leakage Prevention

This article explains Apache Tika's core features, architecture, and multiple application scenarios, then provides a step‑by‑step guide to embed Tika in a Spring Boot project to extract file content, detect personal data such as ID numbers, credit cards and phone numbers using regular expressions, and protect against data leakage.

Apache TikaFile UploadInformation Security
0 likes · 23 min read
Integrating Apache Tika with Spring Boot for Sensitive Information Detection and Data Leakage Prevention
Architecture and Beyond
Architecture and Beyond
Mar 15, 2025 · Information Security

Prompt Injection Attacks on Large Language Models: Risks, Types, and Defense Framework

This article explains how prompt injection attacks exploit large language models by altering their behavior through crafted inputs, outlines the major harms and attack categories—including direct, indirect, multimodal, code, and jailbreak attacks—and presents a comprehensive three‑layer defense framework covering input‑side, output‑side, and system‑level protections.

AI safetyInformation SecurityLLM security
0 likes · 16 min read
Prompt Injection Attacks on Large Language Models: Risks, Types, and Defense Framework