Tagged articles
980 articles
Page 7 of 10
Code Ape Tech Column
Code Ape Tech Column
Jul 23, 2021 · Information Security

Mastering OAuth2 SSO with SpringBoot: A Step‑by‑Step Guide

This article explains the principles of Single Sign‑On using OAuth2.0, illustrates the flow with a real‑world analogy, and provides a complete SpringBoot implementation for both the authorization server and client, including role‑based permission control and microservice integration.

AuthenticationAuthorizationMicroservices
0 likes · 11 min read
Mastering OAuth2 SSO with SpringBoot: A Step‑by‑Step Guide
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Jul 22, 2021 · Information Security

Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout

This article explains a complete CAS-based single sign‑on solution, covering traditional session mechanisms, the CAS architecture, implementation of single sign‑on, session renewal, single logout, and practical extensions for multi‑system integration to ensure secure and seamless user experiences across enterprise applications.

AuthenticationCASSSO
0 likes · 12 min read
Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout
Beike Product & Technology
Beike Product & Technology
Jul 20, 2021 · Information Security

Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies

This article shares practical experiences from building a zero‑to‑one information security management system for enterprises, outlining common security challenges, the role of such systems in risk governance, and detailed implementation approaches including security policies, penalty mechanisms, and management operations to achieve closed‑loop risk mitigation.

Security Governanceenterprise securityinformation security
0 likes · 10 min read
Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies
Laravel Tech Community
Laravel Tech Community
Jul 13, 2021 · Information Security

The Rise and Decline of Ruixing Antivirus: History, Market Share, and Current Status

This article chronicles the evolution of Ruixing antivirus from its 1990s founding and dominant market share of up to 80% to its recent shift toward enterprise security, highlighting key industry competition, pricing changes, and user experience issues such as ads, performance slowdown, and uninstall difficulty.

AntivirusMarket analysisRuixing
0 likes · 5 min read
The Rise and Decline of Ruixing Antivirus: History, Market Share, and Current Status
ByteFE
ByteFE
Jul 13, 2021 · Information Security

Privacy vs. Personalization in Advertising: Technical Foundations and Emerging Solutions

The article examines how increasing privacy regulations—especially after iOS 14—challenge personalized advertising by focusing on the technical core of user identification, the risks of cross‑domain data sharing, and a range of mitigation strategies such as fingerprint protection, third‑party cookie blocking, and privacy‑preserving attribution frameworks like PCM, SKAdNetwork, AEM, and FLoC.

AdvertisingWebinformation security
0 likes · 34 min read
Privacy vs. Personalization in Advertising: Technical Foundations and Emerging Solutions
21CTO
21CTO
Jul 12, 2021 · Information Security

Why Are the US and Russia Negotiating Over Ransomware Threats?

Recent high‑profile ransomware attacks on US critical infrastructure have prompted President Biden to call President Putin, urging Russia to curb ransomware groups like REvil and DarkSide, while both nations discuss cybersecurity negotiations and potential retaliatory actions.

US-Russiacritical infrastructurecybersecurity
0 likes · 6 min read
Why Are the US and Russia Negotiating Over Ransomware Threats?
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 5, 2021 · Cloud Native

How Cloud‑Native Architecture Turns Security Into an Immune System

In this talk, Alibaba Cloud security leader Xiao Li shares two decades of network security experience, explains how cloud‑native technologies reshape protection from external add‑ons to built‑in, on‑demand immune systems, and outlines trends like zero‑trust, hardware‑rooted trust, and automatic remediation.

cloud securityhardware trustinformation security
0 likes · 10 min read
How Cloud‑Native Architecture Turns Security Into an Immune System
Tencent Cloud Developer
Tencent Cloud Developer
Jun 29, 2021 · Information Security

Tencent Cloud Object Storage Content Security: Comprehensive Multi-Modal Content Moderation Solution

Tencent Cloud Object Storage Content Security offers a comprehensive, multi‑modal moderation solution—leveraging YouTu Lab’s advanced image, video, audio and text analysis—to automatically detect and handle prohibited material across hundreds of violation types, providing one‑click task initiation, configurable callbacks, and visual tracking for platforms such as social media, online education, e‑commerce, and gaming.

AI content moderationAudio AnalysisContent Security
0 likes · 6 min read
Tencent Cloud Object Storage Content Security: Comprehensive Multi-Modal Content Moderation Solution
Open Source Linux
Open Source Linux
Jun 28, 2021 · Information Security

Top 100 Cybersecurity Tips to Strengthen Your Network Safety

This guide compiles 100 practical cybersecurity tips across ten key areas—including password hygiene, virus protection, safe browsing, online transactions, email handling, host computer safeguards, office environment practices, mobile device security, wireless network defenses, and sensitive data protection—to help readers build a more secure digital environment.

cybersecurityemail protectioninformation security
0 likes · 13 min read
Top 100 Cybersecurity Tips to Strengthen Your Network Safety
Python Programming Learning Circle
Python Programming Learning Circle
Jun 26, 2021 · Information Security

Security Analysis and Exploitation of a QQ Phishing Website

The article documents a step‑by‑step security investigation of a QQ phishing site, detailing its fake login page, POST endpoint, Python‑based credential flooding, network reconnaissance, port scanning, vulnerability scanning, and discovery of the backend control panel, while discussing the challenges of XSS and brute‑force attacks.

Network ScanningWeb Securityinformation security
0 likes · 7 min read
Security Analysis and Exploitation of a QQ Phishing Website
Efficient Ops
Efficient Ops
Jun 17, 2021 · Information Security

Linus Torvalds Slams Anti‑Vaccine Rhetoric, New Cloud Malware, and Tech Market Shifts

The article reports Linus Torvalds’ harsh response to anti‑vaccine comments, recent global website outages, Tim Berners‑Lee’s NFT auction of the web’s source code, the discovery of a Windows Server container‑escaping malware, rapid growth in China’s industrial cloud market, forecasts for the global telecom cloud market, Microsoft’s upcoming Windows 10 end‑of‑support, Google’s custom video‑processing hardware for YouTube, and a massive Volkswagen customer data leak.

Linus TorvaldsWindows Server malwarecloud security
0 likes · 9 min read
Linus Torvalds Slams Anti‑Vaccine Rhetoric, New Cloud Malware, and Tech Market Shifts
ITPUB
ITPUB
Jun 17, 2021 · Information Security

How Illegal Web Crawlers Stole Over 1 Billion Chinese Users’ Data and Got Sent to Prison

A recent Chinese court case reveals that a university graduate used a custom web‑crawler to harvest more than 1.18 billion Taobao user records, which were then sold to a partner who ran fraudulent WeChat groups, leading to both perpetrators’ conviction for violating personal information protection laws.

ChinaWeb Crawlerdata-scraping
0 likes · 10 min read
How Illegal Web Crawlers Stole Over 1 Billion Chinese Users’ Data and Got Sent to Prison
Java Architect Essentials
Java Architect Essentials
Jun 14, 2021 · Information Security

How the Qike PDF Converter Turns PCs into Botnets: Malware Analysis and Prevention

Huorong’s threat intelligence team discovered that the Qike PDF Converter carries a malicious proxy module that silently spreads via download‑site installers, hijacks system processes, persists as a startup service, and can turn infected machines into high‑CPU‑usage botnets, prompting immediate security updates.

BotnetHuorongPersistence
0 likes · 5 min read
How the Qike PDF Converter Turns PCs into Botnets: Malware Analysis and Prevention
DataFunTalk
DataFunTalk
Jun 7, 2021 · Information Security

Anti‑Fraud Strategies and Practices for the Jimu Social App

This article presents Xu Ming, head of risk control at Jimu, sharing comprehensive insights and practical experiences on combating black‑gray market fraud within the Jimu app, covering the platform’s risk points, common challenges, overall anti‑fraud strategy, detailed operational tactics, and reflective thoughts on future improvements.

App Securityanti‑fraudblack market
0 likes · 17 min read
Anti‑Fraud Strategies and Practices for the Jimu Social App
ITPUB
ITPUB
May 29, 2021 · Information Security

When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case

The article recounts a high‑profile Chinese case where a former developer, after a salary dispute, exploited server vulnerabilities to delete critical user data and application files, leading to massive user impact, a court trial, and an eleven‑month prison sentence under computer‑information‑system sabotage laws.

computer crimedata breachdata deletion
0 likes · 6 min read
When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case
58 Tech
58 Tech
May 10, 2021 · Information Security

Marketing Anti‑Fraud Algorithm Framework and Practice at 58.com

This article details the design, implementation, and evaluation of a multi‑layer anti‑fraud system for 58.com’s marketing activities, covering data and feature engineering, unsupervised and supervised models, graph‑based community detection, and semi‑supervised graph neural networks, with empirical results demonstrating their effectiveness.

Graph Neural NetworkMarketingUnsupervised Learning
0 likes · 18 min read
Marketing Anti‑Fraud Algorithm Framework and Practice at 58.com
MaGe Linux Operations
MaGe Linux Operations
May 9, 2021 · Information Security

How to Block Foreign IPs in Nginx Using the ngx_http_geoip2 Module

This guide walks you through installing the ngx_http_geoip2 module, upgrading Nginx, downloading the GeoLite2 database, configuring Nginx to detect foreign IPs, and applying rules that return a 404 response for non‑Chinese visitors, complete with command‑line examples and verification steps.

NginxServer Configurationblock foreign IP
0 likes · 7 min read
How to Block Foreign IPs in Nginx Using the ngx_http_geoip2 Module
DevOps
DevOps
May 7, 2021 · Information Security

Container Image Security: Challenges, Scanning in the SDLC, and Best Practices

This article examines the growing security concerns of container images, presents alarming vulnerability statistics, explains why image scanning should be placed before image push in the CI/CD pipeline, and outlines practical best‑practice recommendations such as using lightweight base images, non‑root users, secret management, minimal packages, Dockerfile linting, and avoiding unmaintained images.

Container SecurityDevSecOpsDocker
0 likes · 14 min read
Container Image Security: Challenges, Scanning in the SDLC, and Best Practices
21CTO
21CTO
Apr 26, 2021 · Information Security

Remembering Dan Kaminsky: The Hacker Who Secured the Internet

The article commemorates Dan Kaminsky, the renowned information‑security researcher who uncovered the critical DNS vulnerability in 2008, outlines his career, explains the impact of his discovery and coordinated patch, and dispels rumors surrounding his death.

DNS vulnerabilityDan Kaminskyinformation security
0 likes · 5 min read
Remembering Dan Kaminsky: The Hacker Who Secured the Internet
Programmer DD
Programmer DD
Apr 24, 2021 · Information Security

When a Research Paper Turned Into a Linux Kernel Security Disaster

A controversial university paper on covertly injecting vulnerabilities into open‑source software sparked a chain of malicious Linux kernel patches, provoked a fierce response from maintainer Greg Kroah‑Hartman, and forced the University of Minnesota to suspend the research amid heated community debate.

Academic PaperCode InjectionVulnerability
0 likes · 7 min read
When a Research Paper Turned Into a Linux Kernel Security Disaster
Su San Talks Tech
Su San Talks Tech
Apr 21, 2021 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains what data masking (also called data de‑identification) is, why it is essential for protecting personal data in sectors like finance and healthcare, and details static and dynamic masking methods along with common techniques such as truncation, randomization, replacement, encryption, averaging and offsetting.

DDMSDMdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
21CTO
21CTO
Apr 17, 2021 · Information Security

Critical WeChat PC 0‑Day, M1 Chip Upgrade & More: Top Tech Security News

This article reports a high‑severity WeChat PC zero‑day, a Chinese engineer’s M1‑chip memory and storage upgrade, Slackware 15.0 Beta release, Google Project Zero’s extended disclosure windows, and the debut of the world’s first officially certified semi‑cyborg, highlighting major tech security and innovation news.

Hardware HackingM1 ChipProject Zero
0 likes · 5 min read
Critical WeChat PC 0‑Day, M1 Chip Upgrade & More: Top Tech Security News
58 Tech
58 Tech
Apr 16, 2021 · Artificial Intelligence

Graph Neural Network Based Anti‑Fraud Solution for Online Information Services

The article presents a comprehensive anti‑fraud framework that analyzes black‑market fraud characteristics, reviews conventional fraud‑mitigation methods, and proposes a multimodal graph‑neural‑network approach—leveraging device, behavior, and content similarity—to accurately identify fraudulent users on large‑scale internet platforms.

Multimodal Dataanti‑fraudfraud detection
0 likes · 18 min read
Graph Neural Network Based Anti‑Fraud Solution for Online Information Services
vivo Internet Technology
vivo Internet Technology
Apr 14, 2021 · Information Security

Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA

This article explains the fundamentals of encryption by walking through a relatable story, defining keys, comparing symmetric and asymmetric methods, illustrating key‑exchange techniques such as paint‑mixing, multiplication tricks, Diffie‑Hellman, AES block processing, and the RSA algorithm with step‑by‑step calculations.

Diffie-HellmanRSAasymmetric encryption
0 likes · 15 min read
Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA
Architects' Tech Alliance
Architects' Tech Alliance
Apr 13, 2021 · Artificial Intelligence

Top Ten Technology Trends in the Information Industry for 2021

The 2021 report from the China Electronic Information Industry Development Research Institute outlines ten major technology trends—including diversified chip design, MEMS‑based sensors, cloud‑edge collaboration, intelligent networking, evolving display technologies, AI algorithm and compute advances, open‑source software, ARM‑centric ecosystems, heightened information security, and autonomous‑controllable hardware—shaping the future of the information sector.

AIinformation industryinformation security
0 likes · 9 min read
Top Ten Technology Trends in the Information Industry for 2021
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2021 · Information Security

Step‑by‑Step Analysis and Exploitation of a QQ Phishing Site

An in‑depth walkthrough demonstrates how to identify, analyze, and attack a QQ phishing website—revealing its URL, POST parameters, using Python to flood it with fake credentials, performing WHOIS, ping, nmap, and w3af scans, uncovering backend details, and discussing mitigation strategies.

Network ScanningPythonWeb Security
0 likes · 7 min read
Step‑by‑Step Analysis and Exploitation of a QQ Phishing Site
Tencent Cloud Developer
Tencent Cloud Developer
Mar 29, 2021 · Information Security

What Is Zero Trust? Benefits, Technologies, and Deployment Guide

This article explains the Zero Trust security model, its advantages over traditional perimeter defenses, core technologies such as SDP, IAM, and micro‑segmentation, implementation principles, essential components, real‑world deployment scenarios, future trends, and Tencent's practical contributions to the industry.

IAMSDPZero Trust
0 likes · 16 min read
What Is Zero Trust? Benefits, Technologies, and Deployment Guide
Java Backend Technology
Java Backend Technology
Mar 16, 2021 · Information Security

Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled

Security researchers dissect the counterfeit “Le Bao” app that mimics WeChat, revealing its covert QR‑code group‑joining, custom decoding, member‑paid porn livestreams, embedded payment methods, server infrastructure, and illicit profit models, highlighting its high concealment and the need for aggressive mitigation.

cybercrimeinformation securitymalware analysis
0 likes · 15 min read
Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled
ITPUB
ITPUB
Mar 12, 2021 · Information Security

How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Data Breach

A former Facebook engineer, newly hired as CTO of the social platform Gab, introduced a simple SQL injection vulnerability by removing critical reject and filter calls, allowing hackers to steal 70 GB of user data, demand a $500,000 Bitcoin ransom, and expose the company's lax security practices.

CTOGabGit commit
0 likes · 8 min read
How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Data Breach
Top Architect
Top Architect
Mar 9, 2021 · Information Security

Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion

This report provides a comprehensive technical analysis of the malicious "Le Bao" app that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group joining mechanism, payment flow, server‑side tracing, and profit model, highlighting its covert distribution of pornographic content and associated illicit activities.

information securitymalware analysispayment tracing
0 likes · 12 min read
Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion
58UXD
58UXD
Mar 8, 2021 · Product Management

How Luffy Turns Excel Chaos into a Seamless Data Visualization Platform

This case study describes how the Luffy platform was built from scratch to replace cumbersome Excel workflows with a minimalist, component‑driven design that visualizes data securely, improves team collaboration, and accelerates product iteration for operations and product teams.

Component LibraryData visualizationProduct Design
0 likes · 10 min read
How Luffy Turns Excel Chaos into a Seamless Data Visualization Platform
21CTO
21CTO
Mar 3, 2021 · Information Security

9 Real-World Data Breaches Every Developer Should Learn From

This article reviews nine major data breach incidents—from Clearview AI to Yahoo—detailing their scope, compromised data types, and impact, and emphasizes the importance of robust security practices for developers to prevent such losses.

Case Studydata breachinformation security
0 likes · 10 min read
9 Real-World Data Breaches Every Developer Should Learn From
System Architect Go
System Architect Go
Mar 1, 2021 · Information Security

Server-side Request Forgery (SSRF)

This article explains what server‑side request forgery (SSRF) is, describes its impact, common attack vectors such as targeting the server itself or internal services, outlines bypass techniques for blacklist and whitelist filters, and discusses blind SSRF detection using out‑of‑band methods.

SSRFinformation securityout‑of‑band
0 likes · 12 min read
Server-side Request Forgery (SSRF)
21CTO
21CTO
Mar 1, 2021 · Information Security

How Chinese Hackers Targeted India's Power Grid Amid Border Tensions

Amid escalating China‑India border tensions, coordinated Chinese hacking groups launched cyber attacks on Indian critical infrastructure, compromising power generation and transmission systems, while retaliatory Indian state‑sponsored actors also deployed spear‑phishing campaigns against Chinese military and government entities.

APTChinaIndia
0 likes · 5 min read
How Chinese Hackers Targeted India's Power Grid Amid Border Tensions
DataFunSummit
DataFunSummit
Feb 25, 2021 · Information Security

Intelligent Risk Control at 58.com: Architecture, Challenges, and Unknown‑Risk Detection

This article introduces the business background and security challenges of 58.com, explains the three‑layer intelligent risk‑control architecture built on big‑data and AI, and details practical methods for perceiving and detecting unknown risks using techniques such as PU learning, Prophet, and HotSpot.

AIalgorithminformation security
0 likes · 14 min read
Intelligent Risk Control at 58.com: Architecture, Challenges, and Unknown‑Risk Detection
Architects Research Society
Architects Research Society
Feb 24, 2021 · Information Security

Security Architecture Team: Roles, Skills, and Responsibilities

The security architecture team consists of security architects, information security architects, chief information security officers, and security analysts, each with distinct business and technical responsibilities, risk‑management and threat‑modeling skills, and a collaborative relationship with enterprise architecture to ensure secure, compliant solutions.

CISOSecurity ArchitectureThreat Modeling
0 likes · 11 min read
Security Architecture Team: Roles, Skills, and Responsibilities
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Feb 22, 2021 · Information Security

How Meituan-Dianping Secures User Data in the Big Data Era

In the era of big data, Meituan-Dianping implements a comprehensive security management system—including organizational safeguards, deep defense architecture, encryption, and data desensitization—to meet regulatory demands and protect billions of users' privacy and information security.

Meituandata securityinformation security
0 likes · 3 min read
How Meituan-Dianping Secures User Data in the Big Data Era
21CTO
21CTO
Feb 17, 2021 · Information Security

Why "123456" Still Tops the Worst Password List and How to Protect Yourself

The 2020 NordPass survey reveals that simple numeric passwords like "123456" remain the most common weak passwords, highlighting new risky entries and offering practical advice for creating stronger, more secure credentials.

NordPass surveybest practicesinformation security
0 likes · 4 min read
Why "123456" Still Tops the Worst Password List and How to Protect Yourself
Liangxu Linux
Liangxu Linux
Feb 15, 2021 · Information Security

Why the Chinese Phonetic Password ‘ji32k7au4a83’ Shows Up 141 Times

The article examines how a seemingly random string ‘ji32k7au4a83’ appears 141 times in the Have I Been Pwned password database, explains its origin in the Chinese Zhuyin phonetic system, and offers practical guidelines for creating stronger passwords to avoid common security pitfalls.

Have I Been PwnedZhuyincommon passwords
0 likes · 5 min read
Why the Chinese Phonetic Password ‘ji32k7au4a83’ Shows Up 141 Times
php Courses
php Courses
Feb 7, 2021 · Information Security

Scanning Files for Viruses with ClamAV and PHP on Linux

This guide explains how to configure ClamAV on Linux, run the clamdscan command to detect malicious files, and invoke the scanner from PHP using the exec function, including sample configuration and output details.

ClamAVPHPVirus scanning
0 likes · 2 min read
Scanning Files for Viruses with ClamAV and PHP on Linux
Architecture Digest
Architecture Digest
Feb 5, 2021 · Information Security

Token-Based Authentication Architecture Using OAuth2 and JWT

The article explains the design and implementation of a token‑based authentication system for micro‑services, covering terminology, business background, OAuth2 password‑grant flow, JWT usage, security advantages, functional modules, technical choices, detailed authentication workflow, and API design.

JWTMicroservicesOAuth2
0 likes · 10 min read
Token-Based Authentication Architecture Using OAuth2 and JWT
macrozheng
macrozheng
Feb 2, 2021 · Information Security

How Malware Hides Its Mining Process on Linux and How to Uncover It

An infected Linux server shows high CPU usage but standard tools miss the culprit; this guide explains how mining malware hides its process via /proc tricks, demonstrates detection using network scans, unhide tools, and offers removal steps to eradicate the hidden miner.

Cryptocurrency Mininginformation securitylinux
0 likes · 8 min read
How Malware Hides Its Mining Process on Linux and How to Uncover It
Programmer DD
Programmer DD
Jan 24, 2021 · Information Security

Why the Weird Password “ji32k7au4a83” Reveals Hidden Risks in Common Passwords

The article explains how a seemingly random password "ji32k7au4a83" appeared in millions of data breaches because it encodes the Chinese phrase "my password" in Zhuyin, highlights the prevalence of weak passwords like "123456", and offers practical advice for creating stronger, more secure passwords.

Have I Been PwnedZhuyincommon passwords
0 likes · 4 min read
Why the Weird Password “ji32k7au4a83” Reveals Hidden Risks in Common Passwords
Liangxu Linux
Liangxu Linux
Jan 12, 2021 · Information Security

What Is a Bastion Host and How Does It Secure Operations?

This article explains the concept, purpose, design principles, functional modules, authentication methods, deployment options, and open‑source implementations of bastion hosts, highlighting how they centralize control, audit, and protect privileged access to servers and network devices.

AuthenticationBastion HostDeployment
0 likes · 9 min read
What Is a Bastion Host and How Does It Secure Operations?
Programmer DD
Programmer DD
Jan 8, 2021 · Information Security

When Deleting Data Becomes a Crime: DBA Sentenced to 7 Years

A former database administrator at Lianjia was convicted of deliberately deleting 9 TB of financial data, leading to a seven‑year prison sentence after forensic evidence linked his root‑access actions to the breach, highlighting the severe legal consequences of insider data sabotage.

computer crimedata deletiondatabase admin
0 likes · 7 min read
When Deleting Data Becomes a Crime: DBA Sentenced to 7 Years
dbaplus Community
dbaplus Community
Jan 7, 2021 · Information Security

Understanding CC Attacks and Slow DDoS: Mechanisms, Tools, and Defenses

This article explains how CC (Challenge Collapsar) attacks and their slow‑request variants overwhelm web services, describes the underlying botnet concepts, shows practical attack commands with tools like slowhttptest, and outlines multiple mitigation strategies such as rate limiting, IP hiding, high‑protection IP services, and static page optimization.

BotnetCC AttackDDoS
0 likes · 18 min read
Understanding CC Attacks and Slow DDoS: Mechanisms, Tools, and Defenses
21CTO
21CTO
Jan 4, 2021 · Information Security

How to Secure Passwords with Salt in Java: MD5 Salting Explained

This article explains the concept of password salting, its security benefits, and provides a complete Java implementation using MD5, including salt generation, hashing with and without salt, storing salt within the hash, and verification procedures for registration and login.

HashingJavaMD5
0 likes · 12 min read
How to Secure Passwords with Salt in Java: MD5 Salting Explained
21CTO
21CTO
Jan 1, 2021 · Information Security

Did Hackers Peek into Microsoft’s Source Code? Insights from the SolarWinds Attack

A recent SolarWinds breach gave hackers read‑only access to Microsoft’s internal source‑code repositories, prompting the company to stress that no production systems or user data were compromised while highlighting broader security implications for the software industry.

MicrosoftSolarWindscybersecurity
0 likes · 5 min read
Did Hackers Peek into Microsoft’s Source Code? Insights from the SolarWinds Attack
Programmer DD
Programmer DD
Dec 30, 2020 · Information Security

When a Bonus Dispute Triggers a Massive Cloud Outage: The Real Cost of Deleting Code

A disgruntled programmer, denied a promised bonus, altered Huawei Cloud's OBS service code, causing a platform-wide crash, a court conviction for destroying a computer information system, and prompting a broader discussion on why developers repeatedly risk severe legal and professional consequences despite low penalties and harsh work conditions.

cloud outagecode deletioninformation security
0 likes · 10 min read
When a Bonus Dispute Triggers a Massive Cloud Outage: The Real Cost of Deleting Code
iQIYI Technical Product Team
iQIYI Technical Product Team
Dec 25, 2020 · Information Security

iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)

iQiyi Security Incident Response Center Vulnerability Handling Policy version 3.0 outlines scope, principles, reporting process, severity scoring, reward system, user levels, dispute resolution, and prohibitions, emphasizing dedicated handling, point-based rewards, and strict rules for disclosures and malicious activity.

Bug BountyVulnerability Managementinformation security
0 likes · 13 min read
iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)
DataFunSummit
DataFunSummit
Dec 24, 2020 · Information Security

Evolution and Architecture of Risk Control at 58.com

This article outlines the development stages, architectural evolution, and practical challenges of 58.com’s risk‑control platform, describing how the system progressed from manual review to configurable automation, multi‑scene governance, and intelligent expert‑driven auditing to protect billions of daily transactions.

fraud detectioninformation securityplatform architecture
0 likes · 10 min read
Evolution and Architecture of Risk Control at 58.com
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 23, 2020 · Information Security

Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses

This article provides a comprehensive overview of Cross‑Site Scripting (XSS), covering its definition, impact, underlying mechanisms, classification, common injection vectors, defensive strategies, practical Q&A, and a curated list of reference resources for developers and security professionals.

Cross-site scriptingXSSfrontend security
0 likes · 16 min read
Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses
macrozheng
macrozheng
Dec 17, 2020 · Information Security

How Data Masking Protects Your Users: Techniques & Best Practices

Data masking, also known as data desensitization, transforms sensitive information such as phone numbers and ID numbers using static and dynamic methods—including truncation, randomization, replacement, encryption, and averaging—to prevent privacy breaches while preserving data utility for testing, analysis, and production environments.

Dynamic Maskingdata anonymizationdata masking
0 likes · 9 min read
How Data Masking Protects Your Users: Techniques & Best Practices
DataFunSummit
DataFunSummit
Dec 16, 2020 · Artificial Intelligence

Federated Learning vs Secure Multi‑Party Computation: Concepts, Challenges, and Alibaba’s Solutions

This article explains the fundamentals of federated learning and secure multi‑party computation, compares their security and performance trade‑offs, discusses the differences between Google’s cross‑device FL and China’s cross‑silo FL, and presents Alibaba’s recent advances and practical solutions for privacy‑preserving collaborative modeling.

cross-silodifferential privacyinformation security
0 likes · 18 min read
Federated Learning vs Secure Multi‑Party Computation: Concepts, Challenges, and Alibaba’s Solutions
ITPUB
ITPUB
Dec 15, 2020 · Information Security

How Dark‑Web Ransomware Hijacks MySQL Databases and Sells Them for $550

The article explains how ransomware gangs steal MySQL databases, automate ransom‑payment portals on the dark web, auction unsold data, and accept Bitcoin, revealing the scale of over 85,000 databases for sale at roughly $500‑$550 each.

dark webdata breachinformation security
0 likes · 4 min read
How Dark‑Web Ransomware Hijacks MySQL Databases and Sells Them for $550
FunTester
FunTester
Dec 12, 2020 · Operations

Why Redundancy Is the Key to Effective Disaster Recovery in IT Systems

The article explains that disaster recovery for information systems relies on redundancy across hardware, energy, and data, classifies natural, human, and technical disasters, defines critical metrics such as RTO and RPO, and outlines the technologies, architectures, and maturity levels needed to ensure business continuity.

RPORTObusiness continuity
0 likes · 29 min read
Why Redundancy Is the Key to Effective Disaster Recovery in IT Systems
JD Tech Talk
JD Tech Talk
Dec 9, 2020 · Information Security

Understanding “Wool Party” Attacks: Interface and Business Layer Threats in Marketing Scenarios

This article explains how the so‑called “wool party” (羊毛党) operates in marketing environments, detailing common interface‑layer attacks, business‑layer (UI) attacks, the tools they use such as card‑issuing and SMS‑receiving platforms, and the defensive measures employed by intelligent risk‑control systems.

business layer attackinformation securityinterface attack
0 likes · 7 min read
Understanding “Wool Party” Attacks: Interface and Business Layer Threats in Marketing Scenarios
Programmer DD
Programmer DD
Dec 6, 2020 · Information Security

How Fraudsters Exploit Online Promotions: Real Cases and Lessons

This article explains the concept of "薅羊毛" (exploiting online promotions), presents several real police‑investigated cases—including massive membership recharges, coupon abuse, and game‑reward scams—and warns readers about the legal risks of using illegal methods to obtain freebies.

Case Studycybercrimeinformation security
0 likes · 7 min read
How Fraudsters Exploit Online Promotions: Real Cases and Lessons
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
FunTester
FunTester
Dec 4, 2020 · Information Security

Introduction to Cryptography: History, Significance, and Future Directions

This introductory text explores the evolution of cryptography from ancient symbols to modern quantum and DNA‑based codes, highlighting its pivotal role in politics, warfare, and society while emphasizing the need for universal understanding of encryption and decryption across all fields.

Quantum Cryptographycodebreakingcryptography
0 likes · 14 min read
Introduction to Cryptography: History, Significance, and Future Directions
JD Cloud Developers
JD Cloud Developers
Dec 3, 2020 · Information Security

Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data

This article explores the prevalence of weak passwords, introduces fundamental concepts of cryptography, explains symmetric encryption algorithms and their key distribution challenges, and demonstrates the Diffie‑Hellman key‑exchange process with a concrete example and a Python implementation of primitive‑root calculation.

Diffie-Hellmancryptographyinformation security
0 likes · 9 min read
Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data
Programmer DD
Programmer DD
Nov 26, 2020 · Information Security

What the 2020 Most Common Passwords Reveal About Your Online Security

A recent NordPass analysis of the 200 most common passwords in 2020 shows why simple strings like "123456" dominate, how millions of accounts are exposed, and offers practical advice on creating stronger, unique passwords to protect against breaches and phishing attacks.

NordPassPassword Managementcommon passwords
0 likes · 6 min read
What the 2020 Most Common Passwords Reveal About Your Online Security
Efficient Ops
Efficient Ops
Nov 23, 2020 · Information Security

When Revenge Becomes a Crime: A Programmer’s OBS Sabotage Case

A Chinese programmer, angry over an unpaid bonus, altered Huawei Cloud OBS storage code, crippling a consumer platform for hours, leading to a conviction for destroying a computer information system and sparking a broader discussion on developer respect and security safeguards.

cloud storagecode sabotagedeveloper misconduct
0 likes · 7 min read
When Revenge Becomes a Crime: A Programmer’s OBS Sabotage Case
Open Source Linux
Open Source Linux
Nov 23, 2020 · Information Security

2020’s Most Common Passwords Revealed and How to Build Uncrackable Ones

A NordPass analysis of 275 million passwords uncovered the 2020 top‑200 most used passwords, highlighting why simple strings like “123456” are easily cracked and offering practical advice—including length, complexity, and unique generation techniques—to help users create far stronger, unbreakable passwords.

common passwordsinformation securitypassword best practices
0 likes · 5 min read
2020’s Most Common Passwords Revealed and How to Build Uncrackable Ones
Programmer DD
Programmer DD
Nov 17, 2020 · Information Security

Why Every Enterprise Needs a Bastion Host for Secure Access and Auditing

An in‑depth guide explains what a bastion host is, its 4A design (authentication, authorization, account, audit), core functions, common deployment models, authentication methods, and both commercial and open‑source options, highlighting how it centralizes control, enhances security, and streamlines operational compliance.

Bastion Hostaccess controlaudit
0 likes · 9 min read
Why Every Enterprise Needs a Bastion Host for Secure Access and Auditing
Laravel Tech Community
Laravel Tech Community
Nov 11, 2020 · Information Security

Bitcoin Ransomware Cases and Police Crackdown in China

The article describes how Bitcoin‑based ransomware such as WannaRen encrypts victims' files, the large‑scale attacks on Chinese enterprises and institutions, the police investigations that led to the arrest of the mastermind Ju Mou and his accomplices, and practical advice for preventing such threats.

BitcoinData Recoverycybersecurity
0 likes · 7 min read
Bitcoin Ransomware Cases and Police Crackdown in China
Top Architect
Top Architect
Nov 6, 2020 · Information Security

Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion

The report investigates the malicious “Le Bao” application that mimics WeChat, detailing its hidden QR‑code group‑joining mechanism, server‑side communication, payment and gambling integration, and the broader illicit promotion and profit model, while providing forensic traces, source‑code decoding, and mitigation recommendations.

Mobile Securityapp spoofinginformation security
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion
Efficient Ops
Efficient Ops
Oct 27, 2020 · Information Security

How to Detect Account Security Threats Using Log Analysis and Alerts

This article explains practical methods for detecting account security threats—such as blacklisted, expired, or abnormal login behaviors—by analyzing Linux and Windows login logs, defining detection rules, and leveraging automated tools to generate timely alerts and reduce security risks.

Threat Detectionaccount securityincident response
0 likes · 27 min read
How to Detect Account Security Threats Using Log Analysis and Alerts
Programmer DD
Programmer DD
Oct 27, 2020 · Information Security

How a Fake WeChat App ‘LeBao’ Fuels Hidden Porn Networks – A Deep Dive

This report analyzes the malicious “LeBao” application that masquerades as a WeChat‑like chat tool, detailing its covert QR‑code group entry, custom decoding, member‑paid porn livestreams, payment fraud, server tracing, and recommended mitigation measures to curb its illicit operations.

app investigationcybercrimeinformation security
0 likes · 11 min read
How a Fake WeChat App ‘LeBao’ Fuels Hidden Porn Networks – A Deep Dive
Java Backend Technology
Java Backend Technology
Oct 22, 2020 · Information Security

What Caused the Massive P1 Outage? A Real‑World Security Scanning Bug Uncovered

A sudden P1 incident reset all user passwords, and after a thorough investigation the team discovered that a security‑scanning tool’s weak‑password check repeatedly hit login attempts, triggering a bug that caused the outage, highlighting the critical need for proper incident response and security engineering.

OperationsP1 incidentdatabase
0 likes · 7 min read
What Caused the Massive P1 Outage? A Real‑World Security Scanning Bug Uncovered
Architecture Digest
Architecture Digest
Oct 17, 2020 · Information Security

Understanding HTTPS: Principles, Encryption, and Security

This article explains why HTTPS has become essential for web security, compares it with HTTP, describes the weaknesses of plain HTTP and hashing algorithms, and details how symmetric and asymmetric encryption together with TLS/SSL certificates secure data transmission over the Internet.

HTTPSTLSTLS/SSL
0 likes · 11 min read
Understanding HTTPS: Principles, Encryption, and Security
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 12, 2020 · Information Security

Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses

This article provides a comprehensive overview of Cross‑Site Scripting (XSS), explaining its definition, dangers, underlying mechanisms, classification into stored, reflected, and DOM‑based types, common injection vectors, and practical defense strategies, while also addressing common questions and resources for further learning.

Cross-site scriptingWeb SecurityXSS
0 likes · 11 min read
Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses
Liangxu Linux
Liangxu Linux
Oct 8, 2020 · Information Security

How Offline Payment Codes Enable Alipay & WeChat Payments Without Network

This article explains the technical principles behind offline payment codes used by Alipay and WeChat, covering common payment modes, online and offline code schemes, OTP generation, cryptographic algorithms, their advantages, drawbacks, and practical implementation details.

AlipayOTPWeChat
0 likes · 13 min read
How Offline Payment Codes Enable Alipay & WeChat Payments Without Network