Tagged articles
980 articles
Page 9 of 10
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 1, 2019 · Information Security

How MPC‑Based Key Management Eliminates Key Leakage Risks

This article explains the challenges of traditional key management, compares local and server‑side encryption approaches, and introduces a secure multi‑party computation (MPC) key management system that distributes key fragments across multiple servers to prevent key exposure even if some nodes are compromised.

MPCThreshold Cryptographyinformation security
0 likes · 9 min read
How MPC‑Based Key Management Eliminates Key Leakage Risks
21CTO
21CTO
Jul 27, 2019 · Information Security

How US Sanctions Are Silencing GitHub Users Worldwide

The article examines how recent U.S. sanctions have led GitHub to restrict private repositories and access for developers in regions such as Crimea and Iran, detailing specific limitations, personal accounts affected, community workarounds, and the broader implications for open‑source collaboration.

GeopoliticsGitHubaccount restrictions
0 likes · 8 min read
How US Sanctions Are Silencing GitHub Users Worldwide
Ziru Technology
Ziru Technology
Jul 25, 2019 · Information Security

PKI, Digital Signatures & SSH: A Practical Guide to Information Security

This article explains the fundamentals of Public Key Infrastructure, the differences between symmetric and asymmetric encryption, how digital signatures and certificates ensure data integrity and authenticity, and illustrates the SSH protocol’s secure authentication mechanisms, providing a comprehensive overview of modern information security techniques.

PKISSHdigital signature
0 likes · 16 min read
PKI, Digital Signatures & SSH: A Practical Guide to Information Security
Architects Research Society
Architects Research Society
Jul 17, 2019 · Information Security

Understanding Open‑Source Dependency Security Risks and Available Scanning Tools

This article explains why open‑source components constitute a major attack surface, outlines the fragmented nature of vulnerability information, debunks the myth that open‑source code is inherently safer, and reviews a range of tools—both open‑source and commercial—that help organizations detect and manage security risks in software dependencies.

Software Securitydependency managementinformation security
0 likes · 11 min read
Understanding Open‑Source Dependency Security Risks and Available Scanning Tools
360 Tech Engineering
360 Tech Engineering
Jul 3, 2019 · Information Security

File Upload Vulnerabilities and Mitigation Strategies

The article explains how attackers can exploit file upload functionality by uploading malicious files, crafted filenames, SVG payloads, or symlinks to achieve remote code execution, data theft, or server denial‑of‑service, and provides practical defense measures such as whitelist validation, content‑type checks, and upload rate limiting.

Node.jsSVGSecurity
0 likes · 8 min read
File Upload Vulnerabilities and Mitigation Strategies
Architects' Tech Alliance
Architects' Tech Alliance
Jul 2, 2019 · Information Security

Data Backup and Replication Technologies: Methods, Architectures, and Best Practices

This article provides a comprehensive overview of data backup and replication technologies, covering file‑level and block‑level backup, remote copy methods, snapshot mechanisms, CoFW vs RoFW approaches, backup destinations, data paths, and strategies such as full, incremental, and differential backups.

Backup Strategiesdata backupinformation security
0 likes · 25 min read
Data Backup and Replication Technologies: Methods, Architectures, and Best Practices
21CTO
21CTO
Jun 28, 2019 · Fundamentals

Beijing’s Software Industry Surpasses Trillion-Yuan Mark: 2019 Report Highlights

The 2019 Beijing Software and Information Service Industry Development Report reveals that the sector’s scale exceeded one trillion yuan, with double‑digit growth in cloud computing, big data, AI and cybersecurity, while talent, investment, and regional collaboration propelled the city to a leading national position.

BeijingBig DataSoftware Industry
0 likes · 9 min read
Beijing’s Software Industry Surpasses Trillion-Yuan Mark: 2019 Report Highlights
Tencent Cloud Developer
Tencent Cloud Developer
Jun 10, 2019 · Information Security

Third Tencent Information Security Competition (TCTF 2019) Finals Summary and Highlights

After a grueling 30‑hour showdown in Shanghai, the 2019 Tencent Information Security Competition crowned r3kapig as international champion with Balsn and Tea Deliverers trailing, while Fudan’s Whitzard seized the New Star title and a DEF CON berth, highlighting Chinese dominance, cutting‑edge cloud/IoT challenges, live commentary, and Tencent’s role in cultivating cybersecurity talent across universities.

CTFTCTF 2019Tencent
0 likes · 8 min read
Third Tencent Information Security Competition (TCTF 2019) Finals Summary and Highlights
ITPUB
ITPUB
May 19, 2019 · Information Security

Uncovering a SQL Server Job That Hid a Persistent Malware Loader

This article details a multi‑stage, file‑less attack that leveraged weak SQL Server credentials, Transact‑SQL stored procedures, and WMI to download and execute a downloader (cabs.exe) which fetched multiple botnet components, and explains the forensic steps and remediation measures taken to eradicate the threat.

SQL ServerStored ProcedureWMI
0 likes · 7 min read
Uncovering a SQL Server Job That Hid a Persistent Malware Loader
21CTO
21CTO
May 17, 2019 · Information Security

Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End

A recent $100k research effort demonstrated a prefix collision attack on SHA-1, proving that attackers can forge signed documents and TLS certificates, and highlighting why the cryptographic community must retire SHA-1 in favor of stronger hash algorithms.

Hash CollisionSHA-1cryptography
0 likes · 6 min read
Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End
58 Tech
58 Tech
May 16, 2019 · Information Security

Key Takeaways from the 58 Group Technical Salon on Account System Practices and Security

The 58 Group Technical Salon on April 23, 2019 presented a comprehensive overview of account system design, risk control, gateway authentication, multi‑active data synchronization, overseas account handling, cloud account platform capabilities, and security strategies, offering practical insights for building robust and secure user authentication infrastructures.

Securityaccount systemcloud account
0 likes · 10 min read
Key Takeaways from the 58 Group Technical Salon on Account System Practices and Security
58 Tech
58 Tech
May 8, 2019 · Information Security

Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System

This article introduces the fundamentals of web crawlers, typical crawling methods, and a comprehensive set of anti‑crawling strategies—including IP control, browser and device simulation, CAPTCHA cracking, and traffic analysis—while detailing the architecture and capabilities of the 58 anti‑crawling platform.

Traffic analysisWeb Crawlinganti‑crawling
0 likes · 17 min read
Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System
21CTO
21CTO
Apr 27, 2019 · Information Security

What Happens When a Drone Company’s Source Code Leaks? Legal and Security Lessons

A former DJI software engineer uploaded proprietary agricultural drone code to a public GitHub repository, leading to a criminal conviction for commercial‑secret theft, a six‑month prison term, a fine, and a detailed look at the legal penalties and security implications of such leaks.

DJIGitHubcommercial secret
0 likes · 5 min read
What Happens When a Drone Company’s Source Code Leaks? Legal and Security Lessons
Architects' Tech Alliance
Architects' Tech Alliance
Apr 9, 2019 · Information Security

GandCrab V5.2 Ransomware: Global Impact, Attack Methods, and Defense Strategies

GandCrab V5.2, a Bitcoin‑based ransomware first seen in 2018, has recently surged across Brazil, the US, India, Indonesia, Pakistan and especially China, using spam‑email delivery, web‑inject attacks and known vulnerabilities, while remaining largely uncrackable and prompting security teams to recommend strict email hygiene, patching, and anti‑malware measures.

GANDCRABcryptocurrencyinformation security
0 likes · 7 min read
GandCrab V5.2 Ransomware: Global Impact, Attack Methods, and Defense Strategies
Java Architecture Diary
Java Architecture Diary
Apr 9, 2019 · Information Security

How to Build an OAuth2.0 Authorization Server with Spring Cloud

This article explains how to create an open platform using OAuth2.0 authorization code flow, configure Spring Cloud dependencies, set up the authorization and security servers, test the endpoints, and customize the login and confirmation pages, providing complete code examples and diagrams.

Authorization ServerOAuth2.0Spring Cloud
0 likes · 7 min read
How to Build an OAuth2.0 Authorization Server with Spring Cloud
21CTO
21CTO
Mar 21, 2019 · Information Security

Why Tencent Demanded Duoshan Remove Your WeChat Avatar: A Data Privacy Showdown

The article examines Tencent's legal push to force ByteDance's Duoshan app to stop using users' WeChat/QQ avatars and nicknames, detailing the data‑sharing dispute, the PR tactics that spiked Duoshan's DAU, and the provisional court injunction that halted the practice.

ByteDanceTencentdata privacy
0 likes · 6 min read
Why Tencent Demanded Duoshan Remove Your WeChat Avatar: A Data Privacy Showdown
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 19, 2019 · Information Security

Alibaba Cloud DNS Engineer Guo Chuan Presents at ICANN64: Practices, Security Challenges, and Future Directions

Alibaba Cloud DNS senior engineer Guo Chuan, the sole Chinese participant selected for the ICANN64 Talent Program, delivered a keynote on DNS practice, highlighted stability and security challenges, discussed DoH/DoT, DNSSEC, IoT impacts, and emphasized collaborative governance for a resilient global internet infrastructure.

DNSDNSSECDoH
0 likes · 5 min read
Alibaba Cloud DNS Engineer Guo Chuan Presents at ICANN64: Practices, Security Challenges, and Future Directions
Alibaba Cloud Developer
Alibaba Cloud Developer
Mar 12, 2019 · Information Security

Why Publicly Verifiable Covert MPC Is a Game‑Changer for Secure Computation

This article explains the fundamentals of secure multi‑party computation, walks through oblivious transfer and garbled circuits, and introduces a novel publicly verifiable covert (PVC) model that offers near‑half‑honest performance with strong cheating deterrence, highlighting its practical impact on data privacy.

Garbled CircuitsOblivious TransferPublic Verifiable Covert
0 likes · 12 min read
Why Publicly Verifiable Covert MPC Is a Game‑Changer for Secure Computation
dbaplus Community
dbaplus Community
Mar 2, 2019 · Information Security

Home Ransomware Attack: GANDCRAB, Dark Web Payments, and Backup Strategies

After his father's PC was infected by the GANDCRAB ransomware, the author recounts the alarming symptoms, explains how ransomware works, explores the role of the dark web and DASH cryptocurrency in ransom demands, and shares practical backup methods—from simple USB copies to the 3‑2‑1 principle—to protect personal data.

BackupDASHGANDCRAB
0 likes · 15 min read
Home Ransomware Attack: GANDCRAB, Dark Web Payments, and Backup Strategies
MaGe Linux Operations
MaGe Linux Operations
Feb 27, 2019 · Information Security

Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges

This guide walks through creating a simple PHP backdoor, using Python pty for interactive shells, compiling and exploiting local binaries, sniffing network traffic with arpsniffer and linsniffer, and applying various Linux privilege‑escalation techniques to obtain root access.

information securitynetwork sniffingprivilege escalation
0 likes · 10 min read
Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges
JD Tech
JD Tech
Feb 19, 2019 · Information Security

Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security

The article explains what threat intelligence is, classifies it into strategic, tactical, and operational categories, illustrates its critical role in modern cyber‑warfare and e‑commerce defense, and discusses the challenges of timeliness, accuracy, and sharing within the security ecosystem.

e-commerce securityinformation securityoperational intelligence
0 likes · 8 min read
Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security
Efficient Ops
Efficient Ops
Jan 29, 2019 · Information Security

How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough

This article details a multi‑stage server compromise that injected gambling pages, planted hidden accounts, deployed crypto‑mining software, and opened unnecessary ports, providing step‑by‑step forensic analysis, code inspection, emergency response actions, and indicators of compromise.

crypto miningincident responseinformation security
0 likes · 12 min read
How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough
Efficient Ops
Efficient Ops
Jan 24, 2019 · Information Security

How Alibaba Scales Host Security Across Its Global Economic Ecosystem

This talk outlines Alibaba’s massive global host infrastructure, the evolving security governance from manual controls to data‑driven, automated systems, the challenges of compliance and operational efficiency, and future directions such as zero‑trust and invisible security.

Host SecurityOperationsSecurity Governance
0 likes · 16 min read
How Alibaba Scales Host Security Across Its Global Economic Ecosystem
MaGe Linux Operations
MaGe Linux Operations
Jan 14, 2019 · Information Security

Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses

This article presents a comprehensive collection of network security mind maps covering introductory concepts, scanning and defense techniques, monitoring, password cracking, deception attacks, denial-of-service, buffer overflow, web, trojan, virus threats, and future trends, guiding learners through a structured technical roadmap.

cybersecuritydefense techniquesinformation security
0 likes · 3 min read
Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses
Zhongtong Tech
Zhongtong Tech
Jan 11, 2019 · Information Security

How Hunter Automates Web Security Scanning in CI/CD Pipelines

This article explains how the Hunter system integrates automated web vulnerability scanning—including black‑box testing, browser‑extension traffic capture, and distributed analysis engines—into CI/CD workflows to detect security risks early, improve efficiency, and reduce manual effort.

Web Securitybrowser extensionci/cd
0 likes · 13 min read
How Hunter Automates Web Security Scanning in CI/CD Pipelines
Xianyu Technology
Xianyu Technology
Dec 27, 2018 · Big Data

Device Fingerprinting and User Growth Architecture in Alibaba's Xianyu Platform

Alibaba’s Xianyu platform uses a multi‑signal device fingerprinting system, UMID, to uniquely identify users across Android and iOS devices, storing the data in sharded MySQL, HiStore OLAP, and Tair caches, enabling precise ad bidding, conversion tracking, and scalable user‑growth strategies.

Big DataSystem Architectureadvertising optimization
0 likes · 9 min read
Device Fingerprinting and User Growth Architecture in Alibaba's Xianyu Platform
AntTech
AntTech
Dec 19, 2018 · Information Security

Red‑Blue Technical Attack‑Defense Exercises and SRE Practices at Ant Financial

Ant Financial’s internal red‑blue technical attack‑defense program, driven by a dedicated blue team and SRE‑based red team, continuously probes system weaknesses, refines fault‑injection tools like Awatch, and evolves high‑availability and self‑healing mechanisms to strengthen risk control and operational reliability.

Fault InjectionOperationsSRE
0 likes · 10 min read
Red‑Blue Technical Attack‑Defense Exercises and SRE Practices at Ant Financial
Efficient Ops
Efficient Ops
Dec 18, 2018 · Information Security

How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread

On December 14, Tencent's security intelligence team uncovered a “DriverLife” Trojan that exploited the high‑severity EternalBlue vulnerability to propagate like a worm, infecting up to 100,000 users within two hours, and detailed its infection chain, malicious payloads, and mitigation recommendations.

EternalBlueinformation securitymalware analysis
0 likes · 7 min read
How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread
Tencent Cloud Developer
Tencent Cloud Developer
Dec 18, 2018 · Information Security

Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing

Designing a relatively secure account system requires integrating strong multi-factor authentication, fine-grained authorization models like RBAC or ABAC, and continuous real-time and offline auditing to mitigate breaches, while recognizing that absolute security is impossible and ongoing vigilance is essential.

AuthenticationAuthorizationaccess control
0 likes · 17 min read
Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing
NetEase Game Operations Platform
NetEase Game Operations Platform
Dec 14, 2018 · Information Security

Database Injection Attacks: Principles, Exploits, and Defense Strategies

This article explains why database injection remains a critical security threat, illustrates how attackers exploit vulnerable web applications using manual techniques and automated tools such as sqlmap, and provides comprehensive defensive measures spanning secure coding, database hardening, web‑server configuration, WAF deployment, and log‑analysis to protect sensitive data.

Database SecuritySQL injectionSQLMap
0 likes · 17 min read
Database Injection Attacks: Principles, Exploits, and Defense Strategies
JD Tech
JD Tech
Dec 10, 2018 · Information Security

Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe

JD Security’s Silicon Valley AI security scientist unveiled a novel container‑based sandbox at BlackHat Europe, detailing how contextual behavior analysis can detect and trace malicious code by leveraging lightweight containers, improving threat detection speed and accuracy for enterprise defenses.

AI securityContainer SecurityThreat Detection
0 likes · 6 min read
Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe
MaGe Linux Operations
MaGe Linux Operations
Dec 9, 2018 · Information Security

How to Identify a Django-Powered Site During Penetration Testing

This guide outlines practical techniques—ranging from analyzing debug‑mode error pages and hidden CSRF tokens to inspecting admin static files and third‑party module footprints—to reliably fingerprint Django‑based web applications during black‑box security assessments.

Backend detectionDjangoFramework fingerprinting
0 likes · 6 min read
How to Identify a Django-Powered Site During Penetration Testing
Efficient Ops
Efficient Ops
Dec 6, 2018 · Information Security

What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?

The draft "Internet Personal Information Security Protection Guideline" issued by China's Ministry of Public Security outlines comprehensive management mechanisms, technical safeguards, and business processes to help internet enterprises protect personal data throughout its lifecycle, and invites public feedback via the national security platform.

ChinaData ProtectionGuidelines
0 likes · 27 min read
What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?
21CTO
21CTO
Dec 3, 2018 · Information Security

Can Your Keyboard Secrets Be Heard? Inside the Keytap Acoustic Attack

This article explains how the open‑source Keytap project captures short audio snippets from a microphone to reconstruct typed characters, outlines its four‑step process of data collection, model building, keystroke detection, and character identification, and compares it with related acoustic eavesdropping research.

acoustic side-channelaudio keylogginginformation security
0 likes · 8 min read
Can Your Keyboard Secrets Be Heard? Inside the Keytap Acoustic Attack
Architects' Tech Alliance
Architects' Tech Alliance
Dec 2, 2018 · Information Security

Understanding Data Protection: File‑Level vs Block‑Level Backup, Remote Replication, Snapshots, and Clone Technologies

This article explains data protection concepts—including file‑level and block‑level backup, remote file copy and remote volume imaging, snapshot mechanisms such as CoFW and RoFW, and clone technologies—while discussing their advantages, drawbacks, and practical backup architectures.

BackupData Protectioninformation security
0 likes · 20 min read
Understanding Data Protection: File‑Level vs Block‑Level Backup, Remote Replication, Snapshots, and Clone Technologies
ITPUB
ITPUB
Nov 26, 2018 · Information Security

Inside Linux.BtcMine.174: How Dr.Web’s New Malware Hijacks Linux Systems

Dr.Web’s recent report reveals Linux.BtcMine.174, a sophisticated 1000‑line shell‑script trojan that exploits Dirty COW or CVE‑2013‑2094 for root access, disables dozens of antivirus processes, mines cryptocurrency, and spreads via SSH‑collected hosts, with its components’ SHA‑1 hashes published on GitHub.

Cryptocurrency MiningLinuxinformation security
0 likes · 3 min read
Inside Linux.BtcMine.174: How Dr.Web’s New Malware Hijacks Linux Systems
Efficient Ops
Efficient Ops
Oct 30, 2018 · Information Security

How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan

In a 2018 Beijing police operation, a former operations supervisor illegally raised his system permissions, downloaded three proprietary project source codes from a tech company, and sold them for nearly eight million yuan, leading to the arrest of two suspects after extensive digital forensic investigation.

Case StudyChinacybercrime
0 likes · 4 min read
How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan
JD Tech
JD Tech
Oct 25, 2018 · Information Security

Common Encryption Methods for Frontend Development

This article introduces the most frequently used encryption techniques in frontend development—including Base64 encoding, hash functions, salting, slow hash algorithms, key‑hashing, XOR, symmetric and asymmetric encryption, digital signatures, and practical CryptoJS usage—explaining their principles, appropriate scenarios, and providing ready‑to‑use code examples.

HashJavaScriptcrypto
0 likes · 14 min read
Common Encryption Methods for Frontend Development
转转QA
转转QA
Oct 10, 2018 · Information Security

Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis

This article introduces Wireshark as a cross‑platform packet capture tool, explains its installation and basic UI, details capture and display filter syntax with examples, and demonstrates how to decrypt and analyze HTTPS traffic by importing SSL key logs.

FiltersHTTPSPacket Capture
0 likes · 8 min read
Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis
21CTO
21CTO
Sep 29, 2018 · Information Security

How Weak Default Passwords Exposed Ukraine’s Military Network

A Ukrainian journalist revealed that the armed forces' Dnipro system used default passwords like "admin" and "123456", allowing anyone to access critical network devices and potentially map and infiltrate the entire military network, highlighting severe information‑security risks.

Network VulnerabilityUkraineinformation security
0 likes · 4 min read
How Weak Default Passwords Exposed Ukraine’s Military Network
转转QA
转转QA
Sep 12, 2018 · Information Security

Understanding Spam Prevention: Cheating Types and Anti‑Cheat Strategies in Zhuanzhuan's Risk Control System

The article explains Zhuanzhuan's risk‑control architecture, detailing content and behavior cheating types, three anti‑cheat approaches—strategy, product, and model—and practical interception, rule‑penalty mechanisms, and integration tips for developers and security engineers.

anti-cheatinformation securitymachine learning
0 likes · 9 min read
Understanding Spam Prevention: Cheating Types and Anti‑Cheat Strategies in Zhuanzhuan's Risk Control System
JD Tech
JD Tech
Sep 7, 2018 · Information Security

Big Data and AI Security Insights from ISC 2018 Conference

The ISC 2018 conference highlighted the growing importance of big data and artificial intelligence security, presenting JD's research on anti‑scraping techniques, AI‑driven defenses against black‑market attacks, and a service‑oriented approach to protecting user data across enterprises.

AI securityBig Dataanti-scraping
0 likes · 5 min read
Big Data and AI Security Insights from ISC 2018 Conference
dbaplus Community
dbaplus Community
Aug 29, 2018 · Information Security

Operations Security: Why It Matters, Common Pitfalls & Real‑World Cases

Operations security, the intersection of IT operations and security, has become critical as high‑profile vulnerabilities like Struts2, OpenSSL Heartbleed, and massive DDoS attacks expose the costly ROI of ops‑related flaws; this article defines the field, explains its importance, lists common bad practices, typical vulnerabilities, and real‑world case studies.

SysadminVulnerability Managementbest practices
0 likes · 17 min read
Operations Security: Why It Matters, Common Pitfalls & Real‑World Cases
21CTO
21CTO
Aug 28, 2018 · Information Security

500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy

A recent dark‑web sale revealed that over 500 million records from dozens of Huazhu hotel brands—including personal IDs, booking details, and login credentials—were compromised, prompting urgent security advice and highlighting the growing risks of large‑scale data breaches.

cybercrimedata breachhotel security
0 likes · 6 min read
500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy
MaGe Linux Operations
MaGe Linux Operations
Aug 26, 2018 · Information Security

Step‑by‑Step Linux Privilege Escalation and Exploit Techniques

This guide walks through creating a PHP backdoor, leveraging Python pty for interactive shells, compiling and using arpsniffer and linsniffer, performing network sniffing with tcpdump, applying various Linux privilege‑escalation exploits, and establishing persistent root access on vulnerable systems.

Exploitinformation securityphp backdoor
0 likes · 11 min read
Step‑by‑Step Linux Privilege Escalation and Exploit Techniques
Qunar Tech Salon
Qunar Tech Salon
Jul 25, 2018 · Information Security

Understanding Web Crawlers: Definitions, Types, Traffic, and Harm

This article introduces web crawlers, classifies them by technology and intent, presents statistics on crawler traffic across industries and regions, and analyzes the various harms they cause, laying the groundwork for future discussions on anti‑crawling strategies.

Traffic analysisWeb Crawlinganti‑crawling
0 likes · 10 min read
Understanding Web Crawlers: Definitions, Types, Traffic, and Harm
High Availability Architecture
High Availability Architecture
Jul 12, 2018 · Information Security

Evolution of Zhihu’s Anti‑Cheat System “Wukong”: Architecture, Strategies, and Lessons Learned

This article chronicles the three‑generation evolution of Zhihu’s anti‑cheat platform Wukong, detailing its business context, spam taxonomy, multi‑layered control methods, architectural redesigns, strategy language improvements, graph‑based risk analysis, and the continuous integration of big‑data and machine‑learning techniques to combat content and behavior spam.

Big Dataanti-cheatgraph-analysis
0 likes · 23 min read
Evolution of Zhihu’s Anti‑Cheat System “Wukong”: Architecture, Strategies, and Lessons Learned
Architects' Tech Alliance
Architects' Tech Alliance
Jun 13, 2018 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms such as HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, the differences between symmetric and asymmetric cryptography, and the core security requirements of confidentiality, integrity, authenticity, and performance.

HTTPHTTPSTLS
0 likes · 14 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
Efficient Ops
Efficient Ops
Jun 13, 2018 · Information Security

AcFun Data Breach Exposes Millions – How to Safeguard Your Account

In early June, AcFun announced a massive hack that leaked nearly ten million user records, including IDs, nicknames and encrypted passwords, urging users—especially those who haven’t logged in since July 2017 or use weak passwords—to change them immediately, while noting that the data is already being sold on the dark web.

AcFundark webdata breach
0 likes · 4 min read
AcFun Data Breach Exposes Millions – How to Safeguard Your Account
UCloud Tech
UCloud Tech
May 25, 2018 · Information Security

How Blockchain and Advanced Cryptography Secure Data Flow: A Deep Dive

An in‑depth overview explains how blockchain, homomorphic encryption, zero‑knowledge proofs, group and ring signatures, and differential privacy collectively secure data flow, enabling trusted sharing while preserving ownership and privacy across providers, consumers, and algorithm services.

BlockchainData FlowHomomorphic Encryption
0 likes · 11 min read
How Blockchain and Advanced Cryptography Secure Data Flow: A Deep Dive
Meituan Technology Team
Meituan Technology Team
May 24, 2018 · Information Security

Data Security: Full Lifecycle Construction and Best Practices

The article outlines a comprehensive, layered data‑security lifecycle—from secure traffic and authentication through encrypted storage, role‑based access, audit logging, and safe production‑to‑test data handling—emphasizing privacy‑compliant practices, anti‑scraping measures, secure deletion, and incremental ROI‑driven adoption for enterprises.

access controlcloud infrastructureinformation security
0 likes · 24 min read
Data Security: Full Lifecycle Construction and Best Practices
DataFunTalk
DataFunTalk
May 22, 2018 · Information Security

Designing a Credit-Based Content Management System: Strategies, Risk Assessment, and AI Techniques

The article outlines how to build a credit‑based content management platform by describing the evolution of security practices, defining user‑generated, professional‑generated, and occupational content models, proposing a credit‑audit workflow with risk assessment, and presenting AI‑driven text classification and anti‑cheat methods to balance traffic, quality, and trust.

Big Dataartificial intelligencecontent moderation
0 likes · 12 min read
Designing a Credit-Based Content Management System: Strategies, Risk Assessment, and AI Techniques
Beike Product & Technology
Beike Product & Technology
May 18, 2018 · Information Security

DEFCON China 2018: Event Report and Highlights

The article reports on DEFCON China 2018 held in Beijing, describing the conference’s significance, keynotes by Jeff Moss, diverse security topics ranging from mobile and system security to deep‑learning workshops, detailed accounts of specific talks on account hijacking and decentralized networks, and the cultural aspects such as badge colors and puzzles.

DEFCONEvent ReportWorkshops
0 likes · 6 min read
DEFCON China 2018: Event Report and Highlights
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

asymmetric encryptioncryptographydigital signature
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Apr 19, 2018 · Information Security

How Suning Built a Comprehensive Information Security Architecture

This article outlines Suning's evolution from a basic network operations unit to a sophisticated, multi‑layered security architecture that integrates organizational structure, protection platforms, risk management, big‑data threat perception, and continuous improvement to safeguard e‑commerce operations.

Big DataSecurity Architectureinformation security
0 likes · 10 min read
How Suning Built a Comprehensive Information Security Architecture
21CTO
21CTO
Apr 2, 2018 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained

This article walks through a step‑by‑step reconstruction of HTTPS design, showing why secure communication requires per‑client symmetric keys negotiated via asymmetric encryption, digital certificates from trusted CAs, and how signatures and random numbers protect against man‑in‑the‑middle attacks.

HTTPSTLSdigital certificate
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained
Tencent Cloud Developer
Tencent Cloud Developer
Apr 2, 2018 · Information Security

Game Security Technology Salon: DDoS Defense and Anti-Cheat Solutions

The Tencent Cloud GAME-TECH Salon in Beijing on April 13 will examine DDoS attack trends, showcase the new Aegis high‑defense solution, and provide game developers with multi‑scenario risk analysis, optimal defense strategies, and real‑world case studies to strengthen operational security and cost‑effective protection.

Cloud ProtectionDDoS DefenseGame Security
0 likes · 3 min read
Game Security Technology Salon: DDoS Defense and Anti-Cheat Solutions
MaGe Linux Operations
MaGe Linux Operations
Mar 26, 2018 · Information Security

Understanding HTTPS: Why Encryption Matters and How It Works

This article explains what HTTPS is, why encrypting HTTP traffic is essential, how symmetric and asymmetric encryption protect data, the role of certificates and public‑key infrastructure, and the performance impact of the HTTPS handshake, providing a concise Q&A guide for beginners.

HTTPSTLSencryption
0 likes · 11 min read
Understanding HTTPS: Why Encryption Matters and How It Works
21CTO
21CTO
Mar 24, 2018 · Information Security

Inside the Facebook‑Cambridge Analytica Scandal: What Went Wrong and Why It Matters

The Facebook‑Cambridge Analytica scandal exposed the illicit harvesting of 50 million users' data, political manipulation allegations, multiple investigations, a sharp stock plunge, executive resignations, and heightened global scrutiny of data‑privacy practices.

Cambridge AnalyticaFacebookdata breach
0 likes · 17 min read
Inside the Facebook‑Cambridge Analytica Scandal: What Went Wrong and Why It Matters
Meituan Technology Team
Meituan Technology Team
Feb 2, 2018 · Information Security

Detection Techniques for Xposed Installer and Cydia Substrate on Android

The article explains how Android hooking frameworks Xposed Installer and Cydia Substrate operate and provides practical Java‑ and native‑level detection methods—such as package‑name checks, stack‑trace inspection, memory‑map scanning, and signature matching—to identify their presence and strengthen app security.

AndroidCydia SubstrateHook Detection
0 likes · 15 min read
Detection Techniques for Xposed Installer and Cydia Substrate on Android
360 Quality & Efficiency
360 Quality & Efficiency
Jan 22, 2018 · Information Security

High‑Risk Android WebView Cross‑Origin Access Vulnerability – Description, Impact, Detection, and Mitigation

A security bulletin released on January 9 2018 details a critical Android WebView cross‑origin vulnerability that can expose user privacy data and credentials, outlines its widespread impact on many apps, and provides detection tools and concrete remediation steps for developers.

AndroidCross-OriginMitigation
0 likes · 4 min read
High‑Risk Android WebView Cross‑Origin Access Vulnerability – Description, Impact, Detection, and Mitigation
Architects' Tech Alliance
Architects' Tech Alliance
Jan 20, 2018 · Information Security

Understanding Meltdown, Spectre, Skyfall, and Solace CPU Vulnerabilities – FAQ and Mitigation

This article explains the Meltdown and Spectre speculative‑execution CPU flaws, introduces the alleged Skyfall and Solace vulnerabilities, lists affected hardware and operating systems, and provides a detailed FAQ on detection, patches, performance impact, and safe mitigation steps.

CPU vulnerabilitiesMeltdownPerformance impact
0 likes · 8 min read
Understanding Meltdown, Spectre, Skyfall, and Solace CPU Vulnerabilities – FAQ and Mitigation
Suning Technology
Suning Technology
Jan 17, 2018 · Information Security

How Suning Built a Robust Security Architecture for E‑Commerce

This article examines Suning's evolution from a basic network‑operations unit to a comprehensive security ecosystem, detailing its organizational structure, protection platforms, integrated risk‑control mechanisms, big‑data threat perception system, and management processes that together safeguard its e‑commerce operations.

Security ArchitectureThreat Detectione‑commerce
0 likes · 12 min read
How Suning Built a Robust Security Architecture for E‑Commerce
MaGe Linux Operations
MaGe Linux Operations
Jan 4, 2018 · Information Security

Unveiling Meltdown: How Speculative Execution Leaks Data and How to Fix It

The article explains the Meltdown CPU vulnerability discovered by Google Project Zero, detailing its speculative‑execution root cause, how attackers can read protected memory across virtual machines, the performance‑impacting OS‑level mitigations like KPTI, and the broader implications for cloud providers and users.

CPU vulnerabilityKPTIMeltdown
0 likes · 7 min read
Unveiling Meltdown: How Speculative Execution Leaks Data and How to Fix It
Ctrip Technology
Ctrip Technology
Nov 30, 2017 · Information Security

Machine Learning Practices for Web Attack Detection in Ctrip's Nile System

This article describes how Ctrip's security team replaced rule‑based web attack detection with a Spark‑powered machine‑learning pipeline, detailing the system architecture, feature engineering using TF‑IDF, model training, evaluation, online deployment, and future enhancements to improve detection accuracy and performance.

PythonWeb Securityanomaly detection
0 likes · 17 min read
Machine Learning Practices for Web Attack Detection in Ctrip's Nile System
21CTO
21CTO
Nov 24, 2017 · Information Security

Why Linus Torvalds Slammed Kernel Security Hardening – A Deep Dive

Linus Torvalds publicly rebuked recent kernel security hardening attempts, arguing that such changes often introduce bugs, should be deferred until final review, and that many security developers act irrationally, sparking a heated debate on the Linux mailing list.

HardeningKernelLinus Torvalds
0 likes · 3 min read
Why Linus Torvalds Slammed Kernel Security Hardening – A Deep Dive
ITPUB
ITPUB
Nov 21, 2017 · Information Security

Why Linus Torvalds Slammed Security‑Hardening Patches in Linux 4.15

During the debate over new features for Linux kernel 4.15, Linus Torvalds harshly rejected security‑hardening changes proposed by Kees Cook, calling them unnecessary bugs and criticizing the approach of killing processes to enforce new rules.

KernelLinus TorvaldsLinux
0 likes · 6 min read
Why Linus Torvalds Slammed Security‑Hardening Patches in Linux 4.15
21CTO
21CTO
Nov 8, 2017 · Information Security

How an Alibaba iOS Engineer Built a Mobile Anti‑Phishing Shield

An interview with Alibaba Security's iOS lead reveals his personal journey, the development of a global anti‑phishing feature for the 钱盾 app, and insights on KPI, product‑operation collaboration, and the broader challenges of delivering security innovations on mobile platforms.

AlibabaiOS developmentinformation security
0 likes · 9 min read
How an Alibaba iOS Engineer Built a Mobile Anti‑Phishing Shield
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2017 · Information Security

How Zabbix Guest Access Enables Unauthenticated SQL Injection – Full Exploit Walkthrough

This article details a high‑severity SQL injection vulnerability in Zabbix’s jsrpc.php profileIdx2 parameter that allows unauthenticated attackers to gain system privileges, outlines its impact, demonstrates testing methods with screenshots, analyzes the vulnerable code paths, and recommends mitigation steps such as upgrading, patching, and disabling the guest account.

Guest accessSQL injectioninformation security
0 likes · 5 min read
How Zabbix Guest Access Enables Unauthenticated SQL Injection – Full Exploit Walkthrough
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 15, 2017 · Information Security

How Alibaba’s Data Security Maturity Model (DSMM) Is Shaping China’s Data Protection Landscape

The article explains Alibaba's Data Security Maturity Model (DSMM), its partnership program, the involvement of 17 leading security firms, and how the model aims to improve data security capabilities across industries by establishing standardized assessment criteria and fostering ecosystem collaboration.

AlibabaBig DataDSMM
0 likes · 10 min read
How Alibaba’s Data Security Maturity Model (DSMM) Is Shaping China’s Data Protection Landscape
21CTO
21CTO
Sep 19, 2017 · Information Security

What Really Caused the Equifax Breach? Unpacking Apache Struts Vulnerabilities (CVE‑2017‑5638 & CVE‑2017‑9805)

The Equifax data breach exposed 143 million Americans' personal information due to unpatched Apache Struts flaws, chiefly CVE‑2017‑5638 and possibly CVE‑2017‑9805, prompting a swift response from the Apache Software Foundation and highlighting the critical need for timely vulnerability management.

Apache StrutsCVE-2017-5638CVE-2017-9805
0 likes · 7 min read
What Really Caused the Equifax Breach? Unpacking Apache Struts Vulnerabilities (CVE‑2017‑5638 & CVE‑2017‑9805)
Didi Tech
Didi Tech
Sep 8, 2017 · Industry Insights

How Didi’s “Orange Pile” Unified Mobile Platform Boosted Employee Productivity

The article details how Didi’s internal app “Orange Pile” consolidated scattered workplace tools into a single mobile platform, describing the technical challenges, security measures, user‑experience improvements, ecosystem integration, adoption metrics, and future development plans.

Case StudyUser experienceinformation security
0 likes · 7 min read
How Didi’s “Orange Pile” Unified Mobile Platform Boosted Employee Productivity
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 29, 2017 · Information Security

Rethinking Web Security: A Front‑End Perspective on Attack and Defense

From a front‑end engineer’s viewpoint, this article dissects web security as a holistic system, examines attack motives, targets, and vectors across browsers, transmission channels, and servers, and proposes coordinated front‑end and back‑end defenses such as encryption, signing, XSS filtering, URL whitelisting, and CSRF mitigation.

Defense Strategiesattack vectorsfrontend
0 likes · 14 min read
Rethinking Web Security: A Front‑End Perspective on Attack and Defense
21CTO
21CTO
Aug 27, 2017 · Information Security

How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt

This article examines common password‑storage techniques, explains why plain‑text, symmetric encryption, and simple hashes are insecure, and demonstrates how modern algorithms like PBKDF2, bcrypt, and scrypt, together with proper salting and iteration, can effectively protect user credentials against large‑scale cracking attacks.

HashingPBKDF2bcrypt
0 likes · 8 min read
How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 20, 2017 · Information Security

How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining

Tencent's security lab uncovered a large‑scale trojan spread via pornographic web ads that exploits the CVE‑2016‑0189 IE vulnerability, installs a backdoor, and runs a Zcash mining program, while also distributing Linux malware and controlling numerous C&C servers across Chinese provinces.

CVE-2016-0189IE vulnerabilitycrypto mining
0 likes · 8 min read
How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2017 · Information Security

How XShell Became a Backdoor: Deep Dive into Its Malicious Shellcode

Tencent Security Lab dissected the compromised XShell remote terminal, revealing a three‑stage malicious process where patched binaries load encrypted shellcode, exfiltrate system information via dynamically generated DGA domains, and ultimately deploy a svchost‑based payload, with detailed IOC listings and remediation advice.

DGAIoCXshell
0 likes · 7 min read
How XShell Became a Backdoor: Deep Dive into Its Malicious Shellcode
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 16, 2017 · Artificial Intelligence

Why Alibaba’s AI and Security Leaders Made MIT’s TR35 List in 2017

In August 2017 MIT Technology Review honored Alibaba AI Lab chief scientist Wang Gang and Alibaba Cloud chief security scientist Wu Hanqing as part of its global TR35 young innovators, marking the first time two researchers from a Chinese company appeared on the prestigious list and highlighting China’s rising influence in AI and security research.

Alibaba AIMIT TR35Tech Innovation
0 likes · 5 min read
Why Alibaba’s AI and Security Leaders Made MIT’s TR35 List in 2017
MaGe Linux Operations
MaGe Linux Operations
Aug 15, 2017 · Information Security

Xshell Backdoor Discovered in Build 1326 – Critical Security Alert

A critical backdoor was discovered in NetSarang’s Xshell 5 Build 1326, where the nssock2.dll module contains malicious code that contacts a remote domain, affecting multiple NetSarang products; the article details the vulnerability, affected versions, behavior, and provides safe download links.

Remote Code ExecutionVulnerabilitybackdoor
0 likes · 4 min read
Xshell Backdoor Discovered in Build 1326 – Critical Security Alert
Efficient Ops
Efficient Ops
Aug 14, 2017 · Information Security

Critical Xshell Backdoor Alert: How Malicious DLLs Leak Data and What to Do

A recent security advisory reveals that popular remote terminal Xshell versions contain a backdoor in the nssock2.dll component, enabling shellcode to harvest host information, generate monthly DGA domains, and potentially expose sensitive data, prompting immediate version checks and upgrades.

DGAXshellbackdoor
0 likes · 6 min read
Critical Xshell Backdoor Alert: How Malicious DLLs Leak Data and What to Do
21CTO
21CTO
Aug 13, 2017 · Information Security

How Researchers Root Amazon Echo to Turn It Into a Stealthy Audio Spy

Security researchers discovered a physical attack vector on Amazon Echo that exposes its debug panel and allows booting from an external SD card, enabling persistent root access, covert audio streaming, and a full remote control backdoor, with detailed hardware and firmware exploitation steps provided.

Amazon EchoRoot Accessaudio eavesdropping
0 likes · 11 min read
How Researchers Root Amazon Echo to Turn It Into a Stealthy Audio Spy
DevOps
DevOps
Aug 10, 2017 · Information Security

Securing VSTS with Azure Conditional Access: A Step‑by‑Step Guide

This article explains how to protect Visual Studio Team Services (VSTS) by integrating Azure Conditional Access, covering account binding, rule creation, user and group selection, condition settings such as sign‑in risk and location, and testing the resulting access restrictions.

Azure ADAzure Conditional AccessDevOps
0 likes · 6 min read
Securing VSTS with Azure Conditional Access: A Step‑by‑Step Guide
21CTO
21CTO
Jul 18, 2017 · Information Security

Why ECC Is Outpacing RSA: History, Algorithms, and Performance Benchmarks

This article traces the evolution of cryptography from ancient substitution ciphers to modern standards like DES, RSA, and ECC, explains symmetric and asymmetric encryption, compares ECC and RSA in security and efficiency, and presents cloud‑server performance tests showing ECC‑256’s superiority in speed and resource usage.

ECCPerformance TestingRSA
0 likes · 9 min read
Why ECC Is Outpacing RSA: History, Algorithms, and Performance Benchmarks
21CTO
21CTO
Jul 11, 2017 · Fundamentals

From Mainframes to Cloud‑Native OS: How Elastos Envisions the Next Generation of Operating Systems

This extensive essay traces the evolution of computer operating systems from the 1940s to today, analyzes the limitations of current OS architectures, and proposes a cloud‑native, container‑based future exemplified by the open‑source Elastos platform, highlighting security, interoperability, and new business models.

IoTOperating Systemscloud computing
0 likes · 37 min read
From Mainframes to Cloud‑Native OS: How Elastos Envisions the Next Generation of Operating Systems
Ctrip Technology
Ctrip Technology
Jul 6, 2017 · Information Security

Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project

This article describes Ctrip's automated web vulnerability detection system, detailing the shift from active to passive scanning, the distributed architecture using traffic mirroring, message queues, Redis, and MySQL, and the processes for data collection, de‑duplication, scanning, and vulnerability management.

CtripWeb Securitydistributed architecture
0 likes · 8 min read
Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project
MaGe Linux Operations
MaGe Linux Operations
Jun 28, 2017 · Information Security

Build a Python Wi‑Fi Scanner to Test Weak Passwords

This guide walks through setting up Python 2.7 with the pywifi module, preparing a dictionary of common Wi‑Fi passwords, configuring a scanner, scanning nearby hotspots, testing each network, and recording results to identify vulnerable access points.

Network ScanningWiFiinformation security
0 likes · 3 min read
Build a Python Wi‑Fi Scanner to Test Weak Passwords
21CTO
21CTO
Jun 24, 2017 · Information Security

Why 95% of Web Traffic Is Bots: Inside the Crawling Arms Race

The article explores the hidden, high‑traffic world of web crawlers and anti‑crawling measures, revealing why most online requests are bots, how companies decide to crawl or block, the technical and organizational challenges involved, and what the future may hold for this perpetual cat‑and‑mouse game.

BackendWeb Crawlinganti‑crawling
0 likes · 22 min read
Why 95% of Web Traffic Is Bots: Inside the Crawling Arms Race
Architects Research Society
Architects Research Society
Jun 6, 2017 · Information Security

Embedded vs. Bolt‑On Security in the Internet of Things: Risks and Mitigation Strategies

The article examines how built‑in (embedded) security differs from bolt‑on security in IoT devices, outlines real‑world attack scenarios—including physical and network exploits—and recommends foundational security designs to protect connected sensors, actuators, and smart environments.

IoT securitybolt‑on securityembedded security
0 likes · 8 min read
Embedded vs. Bolt‑On Security in the Internet of Things: Risks and Mitigation Strategies