Tagged articles
58 articles
Page 1 of 1
ITPUB
ITPUB
Apr 6, 2026 · Backend Development

Why the String "null" Breaks Your Java Backend and How to Fix It

The article explains how treating the literal string "null" as an empty value can cause serious bugs in Java backend registration, database storage, and security checks, and provides concrete code examples and a sanitisation utility to prevent these issues.

Backendinput validationnull handling
0 likes · 7 min read
Why the String "null" Breaks Your Java Backend and How to Fix It
37 Interactive Technology Team
37 Interactive Technology Team
Jan 14, 2026 · Frontend Development

Hidden Zero‑Width Characters: How They Sabotage Front‑End Apps and How to Detect Them

Zero‑width characters are invisible Unicode symbols that can silently break form validation, URL parsing, and data storage in web applications, but with proper detection, visualization, and input‑filtering techniques developers can mitigate these hidden risks and even use them for legitimate purposes.

DebuggingUnicodedata integrity
0 likes · 6 min read
Hidden Zero‑Width Characters: How They Sabotage Front‑End Apps and How to Detect Them
Architect's Guide
Architect's Guide
Nov 22, 2025 · Backend Development

Why Treating "null" as Empty Causes Silent Registration Bugs

The article explains how confusing the literal string "null" with a true null value in user registration requests can let invalid accounts slip through validation, leading to downstream errors and highlighting the need for proper input checks.

JSONinput validationnull bug
0 likes · 3 min read
Why Treating "null" as Empty Causes Silent Registration Bugs
Java Web Project
Java Web Project
Nov 5, 2025 · Backend Development

When "null" Is Just a String: Hidden Bugs and How to Prevent Them

The article explains how treating the literal string "null" as a valid username can cause user‑experience glitches, log‑analysis confusion, database contamination, security risks, and script failures, and provides step‑by‑step validation, front‑end checks, database constraints, and logging strategies to avoid these hidden bugs.

Backend DevelopmentSecuritydatabase integrity
0 likes · 5 min read
When "null" Is Just a String: Hidden Bugs and How to Prevent Them
Open Source Tech Hub
Open Source Tech Hub
Oct 9, 2025 · Information Security

How Dynamic Method Calls Can Cripple Your PHP App—and Simple Fixes

This article explains the security hazards of invoking PHP methods directly from user input, illustrates real‑world exploits such as accidental deletions and exposure of debug functions, and provides a concrete allow‑list mapping solution with code examples and best‑practice tips.

Securityallowlistdynamic-method-call
0 likes · 6 min read
How Dynamic Method Calls Can Cripple Your PHP App—and Simple Fixes
Ops Development & AI Practice
Ops Development & AI Practice
Jul 26, 2025 · Information Security

Mastering XSS: How Attackers Exploit Trust and How to Build Unbreakable Defenses

This article explains the fundamentals of Cross‑Site Scripting attacks, illustrates reflected, stored, and DOM‑based variants with concrete code examples, and presents a four‑step defense strategy—including input validation, output encoding, Content Security Policy, and WAF—to protect web applications.

Content Security PolicyWAFWeb Security
0 likes · 9 min read
Mastering XSS: How Attackers Exploit Trust and How to Build Unbreakable Defenses
macrozheng
macrozheng
Jun 6, 2025 · Backend Development

Why “null” Strings Break Your Java Backend – and How to Fix It

The article explains how treating the literal string "null" as an empty value can cause serious bugs in Java backend registration, demonstrates the issue with code examples, and provides practical input‑sanitizing and validation techniques to prevent such errors and related security risks.

input validationnull handling
0 likes · 7 min read
Why “null” Strings Break Your Java Backend – and How to Fix It
php Courses
php Courses
May 28, 2025 · Information Security

Understanding XSS Attacks and Prevention Methods in PHP

Cross‑Site Scripting (XSS) is a common web security vulnerability where malicious scripts are injected into pages, and this article explains typical PHP XSS scenarios, demonstrates code examples, and outlines effective mitigation techniques such as htmlspecialchars(), HTML Purifier, proper headers, secure cookies, CSP, and best practices.

Content Security PolicyPHPWeb Security
0 likes · 5 min read
Understanding XSS Attacks and Prevention Methods in PHP
php Courses
php Courses
Feb 13, 2025 · Information Security

Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing

This article presents a thorough guide to securing PHP applications by managing Composer dependencies, hardening session handling, implementing CSRF defenses, sanitizing all inputs, enforcing strict type declarations, using prepared statements for database access, concealing sensitive error details, encapsulating critical operations, and incorporating security‑focused testing.

CSRFPHPSecurity
0 likes · 16 min read
Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing
Pan Zhi's Tech Notes
Pan Zhi's Tech Notes
Feb 10, 2025 · Information Security

Is Your Site Vulnerable? Understanding the Common SQL Injection Attack

This article explains the fundamentals of SQL injection attacks, demonstrates step‑by‑step exploitation using the DVWA platform—including data extraction, login bypass, and injection point detection—and outlines practical prevention techniques such as input validation, regex filtering, and prepared statements.

DVWASQL injectionWeb Security
0 likes · 11 min read
Is Your Site Vulnerable? Understanding the Common SQL Injection Attack
Code Mala Tang
Code Mala Tang
Dec 16, 2024 · Information Security

Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps

This guide reveals nine frequent security mistakes in Node.js applications—from misconfigured CORS and vulnerable dependencies to weak authentication and missing HTTPS—offering concrete code‑level solutions and best‑practice recommendations to protect your backend.

AuthenticationCORSNode.js
0 likes · 8 min read
Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps
JD Tech
JD Tech
Oct 9, 2024 · Fundamentals

Defensive Programming: Concepts, Core Principles, and Practical Java Examples

This article explains defensive programming as a proactive coding paradigm that anticipates and mitigates errors through input validation, error handling, assertions, and continuous testing, and demonstrates its application with detailed Java examples covering pagination, loop safety, exception management, and boundary checks.

Error HandlingJavaSoftware Robustness
0 likes · 15 min read
Defensive Programming: Concepts, Core Principles, and Practical Java Examples
Python Crawling & Data Mining
Python Crawling & Data Mining
Oct 9, 2024 · Fundamentals

Master Python’s Number Guessing Game: Step-by-Step Code Walkthrough

This article walks through building a classic number‑guessing game in Python, presenting two community‑sourced solutions, detailed code snippets, explanations of the while‑loop and random modules, and enhancements for input validation and interactive range feedback, helping readers deepen their programming fundamentals.

Number Guessing GamePythoninput validation
0 likes · 6 min read
Master Python’s Number Guessing Game: Step-by-Step Code Walkthrough
php Courses
php Courses
Aug 1, 2024 · Information Security

Common PHP Pitfalls and Effective Prevention Strategies

This article examines frequent security and quality pitfalls in PHP development—such as deprecated functions, SQL injection, XSS, insecure file inclusion, poor error handling, session hijacking, hard‑coded credentials, insufficient input validation, outdated versions, and low code quality—and provides concrete best‑practice recommendations to avoid them.

PHPSecuritycode quality
0 likes · 8 min read
Common PHP Pitfalls and Effective Prevention Strategies
JD Cloud Developers
JD Cloud Developers
Jul 25, 2024 · Fundamentals

Master Defensive Programming: Strategies to Build Robust Software

Defensive programming is a proactive coding paradigm that anticipates errors and exceptions, emphasizing input validation, error isolation, assertions, thorough testing, and clear error handling, with practical examples ranging from pagination parameter checks to loop safeguards, illustrating how to enhance software robustness and stability.

Error HandlingJavaSoftware Robustness
0 likes · 16 min read
Master Defensive Programming: Strategies to Build Robust Software
php Courses
php Courses
Jul 1, 2024 · Information Security

PHP Security Best Practices: Protecting Applications from Common Vulnerabilities

This article explains why PHP security is critical and outlines five common PHP vulnerabilities—SQL injection, XSS, CSRF, remote code execution, and file inclusion—along with comprehensive best‑practice recommendations such as input validation, secure password storage, session management, error handling, and continuous learning.

best practicesinput validationvulnerabilities
0 likes · 18 min read
PHP Security Best Practices: Protecting Applications from Common Vulnerabilities
21CTO
21CTO
Apr 16, 2024 · Backend Development

Essential Backend Development Practices to Boost Efficiency and Scalability

Backend development underpins every software application, and mastering practices such as input validation, robust error handling, separation of concerns, and thorough testing and documentation ensures applications are secure, maintainable, and scalable, empowering developers to build resilient server‑side systems.

Backend DevelopmentError HandlingSeparation of Concerns
0 likes · 6 min read
Essential Backend Development Practices to Boost Efficiency and Scalability
php Courses
php Courses
Jan 29, 2024 · Information Security

Guide to Preventing LDAP and SQL Injection Attacks in PHP

This article explains the principles, provides code examples, and outlines preventive measures for LDAP and SQL injection attacks in PHP, helping developers understand how these vulnerabilities work and how to secure their web applications through input validation, parameter binding, and access control.

LDAP injectionSQL injectionWeb Security
0 likes · 6 min read
Guide to Preventing LDAP and SQL Injection Attacks in PHP
MaGe Linux Operations
MaGe Linux Operations
Jan 6, 2024 · Information Security

Understanding XSS: Types, Risks, and Effective Defense Strategies

This article explains what Cross‑Site Scripting (XSS) is, describes its various types and the severe threats it poses, and provides comprehensive defense techniques—including input/output validation, HTML/JavaScript encoding, HttpOnly cookies, and secure handling of URLs, CSS, and rich‑text content—to protect web applications from XSS attacks.

CSRFHTML EncodingWeb Security
0 likes · 31 min read
Understanding XSS: Types, Risks, and Effective Defense Strategies
php Courses
php Courses
Aug 11, 2023 · Information Security

PHP Code Security Testing: Review, Tools, and Practices

This article explains how to secure PHP web applications by performing code reviews, validating user input, preventing SQL injection and XSS, and using security testing tools such as PHP Security Scanner, OWASP ZAP, and Kali Linux, along with practical testing methods like boundary, authorization, and exception handling.

Code reviewPHPXSS
0 likes · 5 min read
PHP Code Security Testing: Review, Tools, and Practices
Senior Tony
Senior Tony
Jul 29, 2023 · Fundamentals

Essential Coding Habits Every Engineer Should Master

The article outlines practical coding habits—thorough input validation, comprehensive logging, careful RPC handling, batch processing, cautious SQL execution, safe extensions, disciplined refactoring, minimal dependencies, data consistency, and avoiding over‑engineering—to help engineers write reliable, maintainable code.

Batch ProcessingData ConsistencyRPC
0 likes · 9 min read
Essential Coding Habits Every Engineer Should Master
php Courses
php Courses
Jul 5, 2023 · Information Security

Using PHP Security Library Functions to Prevent Code Injection Attacks

This article introduces PHP security library functions such as htmlspecialchars(), htmlentities(), and mysqli_real_escape_string(), demonstrating with code examples how they filter and validate user input to prevent XSS and SQL injection attacks, while noting that additional security measures are still required.

PHPSQL injectionSecurity
0 likes · 4 min read
Using PHP Security Library Functions to Prevent Code Injection Attacks
Sohu Tech Products
Sohu Tech Products
Nov 2, 2022 · Information Security

Handling XSS Vulnerabilities in Spring Boot: Request Wrapper, Filters, and Jackson Custom Serialization

This article documents a step‑by‑step solution for preventing XSS attacks in a Spring Boot application, covering input validation, a custom HttpServletRequestWrapper, filter registration, and Jackson serializers/deserializers to escape malicious HTML both on request parameters and JSON payloads.

JacksonRequestWrapperSecurity
0 likes · 16 min read
Handling XSS Vulnerabilities in Spring Boot: Request Wrapper, Filters, and Jackson Custom Serialization
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 20, 2022 · Frontend Development

Improving Form User Experience in Flutter: Error Tips, Labels, Keyboard Types, and Validation

This article explains how to enhance form usability in Flutter by using appropriate error prompts, label styles, keyboard configurations, and validation rules, providing practical code examples and best‑practice recommendations for building consistent, user‑friendly form components in mobile applications.

FlutterForm UXinput validation
0 likes · 10 min read
Improving Form User Experience in Flutter: Error Tips, Labels, Keyboard Types, and Validation
Zhaori User Experience
Zhaori User Experience
Sep 2, 2022 · Frontend Development

Designing Effective Form Editors: Best Practices for UI/UX and Validation

This guide explains how to design user‑friendly form editors by covering form fundamentals, layout options, input control properties, validation methods, interaction feedback, and advanced components such as date pickers, file uploads, and grouping, helping developers create efficient, adaptable forms for various scenarios.

User experienceform designfrontend UI
0 likes · 12 min read
Designing Effective Form Editors: Best Practices for UI/UX and Validation
Xianyu Technology
Xianyu Technology
Aug 24, 2022 · Frontend Development

Implementing Length-Limited Input with Unicode and Emoji Support in JavaScript

The article explains how to enforce a custom length limit in JavaScript input fields that counts English letters and numbers as half a unit, Chinese characters as one unit, and each emoji as one unit, using Unicode code‑point detection, regex extraction, and automatic truncation to prevent overflow.

EmojiFront-endJavaScript
0 likes · 10 min read
Implementing Length-Limited Input with Unicode and Emoji Support in JavaScript
Cognitive Technology Team
Cognitive Technology Team
Jul 2, 2022 · Fundamentals

Defensive Programming Principles and Practices

The article outlines defensive programming concepts, emphasizing input validation, error handling, resource management, isolation techniques, and design considerations such as thread safety, cache strategies, and interface versioning to build robust and resilient software systems.

Error HandlingResource ManagementSoftware Robustness
0 likes · 4 min read
Defensive Programming Principles and Practices
Efficient Ops
Efficient Ops
May 25, 2022 · Fundamentals

Mastering Common Regex Patterns for Data Validation

This article provides a comprehensive collection of regular expression patterns for validating numbers, characters, emails, URLs, IP addresses, dates, and other common input formats, offering developers ready-to-use solutions for robust data validation in applications.

data validationinput validationregex
0 likes · 15 min read
Mastering Common Regex Patterns for Data Validation
Tencent Cloud Developer
Tencent Cloud Developer
Dec 30, 2021 · Frontend Development

How to Write Robust Front-End Code: Practices and Techniques

Writing robust front‑end code involves systematic exception handling, thorough input validation, disciplined code‑style practices such as default cases and optional chaining, careful selection of mature third‑party libraries, and proactive robustness testing like monkey testing to ensure the UI remains functional under unexpected conditions.

JavaScriptRobustnessbest practices
0 likes · 8 min read
How to Write Robust Front-End Code: Practices and Techniques
Open Source Linux
Open Source Linux
May 13, 2021 · Fundamentals

Mastering Regex: Essential Patterns for Numbers, Text, and Special Formats

This article compiles a comprehensive collection of regular expression patterns for validating numeric values, character strings, and various special formats such as emails, URLs, phone numbers, dates, IP addresses, and more, providing ready‑to‑use code snippets for developers.

input validationpattern libraryregex
0 likes · 16 min read
Mastering Regex: Essential Patterns for Numbers, Text, and Special Formats
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

HTTPSSQL injectionSecure Coding
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
21CTO
21CTO
Mar 10, 2021 · Information Security

When a Name Like “true” Locks Your iCloud: Lessons in Input Validation

An Apple iCloud account was denied and the user’s ID locked for six months because her surname “true” was mistakenly treated as a Boolean value, highlighting how unescaped input can trigger security mechanisms and the importance of proper string handling in software systems.

SQL injectionbooleaniCloud
0 likes · 5 min read
When a Name Like “true” Locks Your iCloud: Lessons in Input Validation
Java Architecture Diary
Java Architecture Diary
Dec 2, 2020 · Information Security

How to Prevent XSS Attacks with mica-xss: A Step-by-Step Guide

This article explains what XSS attacks are, demonstrates simple exploitation scenarios, and provides a comprehensive solution using the mica-xss library with Spring MVC, including dependency setup, request filtering, testing methods, and the underlying Jsoup‑based implementation.

Web SecurityXSSinput validation
0 likes · 7 min read
How to Prevent XSS Attacks with mica-xss: A Step-by-Step Guide
Laravel Tech Community
Laravel Tech Community
Sep 4, 2020 · Fundamentals

Comprehensive Collection of Regular Expressions for Data Validation

An extensive compilation of regular expressions covering numeric, character, email, URL, phone, ID, password, date, IP, and other validation patterns, complete with examples and explanations, providing developers a ready reference for implementing robust input validation across various programming contexts.

@DataBackendinput validation
0 likes · 5 min read
Comprehensive Collection of Regular Expressions for Data Validation
ITPUB
ITPUB
Jan 16, 2020 · Information Security

How SQL Injection Works and How to Prevent It with Safe SQLite Code

This article explains what SQL injection is, demonstrates a vulnerable SQLite example that drops a table using malicious input, shows why the attack works, and provides practical prevention techniques such as using parameterized queries, input validation, unpredictable table names, and regular backups to secure databases.

SQL injectionSQLiteinput validation
0 likes · 8 min read
How SQL Injection Works and How to Prevent It with Safe SQLite Code
Qunar Tech Salon
Qunar Tech Salon
Oct 18, 2018 · Information Security

XSS Attacks: Introduction, Classification, Prevention, and Detection

This article explains the fundamentals of Cross‑Site Scripting (XSS) attacks, presents real‑world examples, classifies stored, reflected, and DOM‑based XSS, and provides comprehensive prevention, detection, and mitigation techniques for frontend developers, including proper escaping, whitelist schemes, CSP, and secure coding practices.

CSPWeb SecurityXSS
0 likes · 27 min read
XSS Attacks: Introduction, Classification, Prevention, and Detection
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
May 14, 2017 · Information Security

Mastering XSS: A Complete Guide to Understanding and Preventing Cross‑Site Scripting

This comprehensive tutorial explains what XSS is, describes the three main attack types, illustrates how malicious scripts are injected and executed, and provides practical strategies—including encoding, validation, and Content Security Policy—to defend web applications against cross‑site scripting vulnerabilities.

Content Security PolicyCross-site scriptingXSS
0 likes · 28 min read
Mastering XSS: A Complete Guide to Understanding and Preventing Cross‑Site Scripting
ITPUB
ITPUB
Mar 3, 2017 · Information Security

How Attackers Exploit SQL Injection and XSS – Techniques and Defenses

This article explains the mechanics of SQL injection and XSS attacks, demonstrates common exploitation methods such as table‑name guessing, error‑based and union queries, shows a vulnerable authentication script, and provides practical defensive coding techniques to mitigate these threats.

Authentication BypassSQL injectionWeb Security
0 likes · 10 min read
How Attackers Exploit SQL Injection and XSS – Techniques and Defenses
360 Quality & Efficiency
360 Quality & Efficiency
Nov 1, 2016 · Information Security

Understanding SQL Injection Attacks and Defensive Techniques

The article reviews the author’s experience with security testing, explains the severe risks of SQL injection, demonstrates vulnerable server‑side code, and provides practical remediation methods such as input sanitization, type casting, and using prepared statements with PDO.

Database SecurityPDOSQL injection
0 likes · 5 min read
Understanding SQL Injection Attacks and Defensive Techniques
ITPUB
ITPUB
Jul 12, 2016 · Information Security

How to Prevent SQL Injection Attacks in PHP: Practical Tips and Code Examples

This article explains what SQL injection is, shows vulnerable PHP code examples, and provides concrete prevention techniques—including input validation, parameterized queries, limited database privileges, error handling, and proper escaping of special characters—to protect web applications from attacks.

PHPPrepared StatementsSQL injection
0 likes · 5 min read
How to Prevent SQL Injection Attacks in PHP: Practical Tips and Code Examples
21CTO
21CTO
Feb 8, 2016 · Fundamentals

Master Defensive Programming in PHP: Prevent Errors Before They Happen

This article explains defensive programming concepts for PHP developers, illustrating why anticipating failures, never trusting user input, avoiding assumptions, maintaining narrow focus, and keeping consistent syntax can dramatically reduce bugs and improve code reliability.

Error HandlingPHPcoding best practices
0 likes · 8 min read
Master Defensive Programming in PHP: Prevent Errors Before They Happen
21CTO
21CTO
Feb 6, 2016 · Information Security

Essential Web Application Security Checklist: From Input Validation to Server Hardening

This guide outlines a comprehensive security checklist covering form input validation, safe system call handling, buffer overflow prevention, strong password policies, session protection, mitigation of XSS, SQL injection, CSRF, Apache and MySQL hardening, PHP configuration, and fuzz testing techniques.

Password policyWeb Securityapache hardening
0 likes · 6 min read
Essential Web Application Security Checklist: From Input Validation to Server Hardening
Java High-Performance Architecture
Java High-Performance Architecture
Oct 8, 2015 · Information Security

Understanding XSS: Types, Exploits, and Effective Defenses

This article explains what Cross‑Site Scripting (XSS) is, distinguishes non‑persistent and persistent attacks with real‑world URL examples, and outlines practical defense strategies such as proper escaping, character‑set handling, and content‑type settings to protect web applications.

Cross-site scriptingXSSdefense
0 likes · 4 min read
Understanding XSS: Types, Exploits, and Effective Defenses
Baidu Tech Salon
Baidu Tech Salon
Aug 5, 2014 · Backend Development

A Tale of Bug Fixing: Thinking Beyond the Immediate Solution

After a rushed fix for a division‑by‑zero bug caused incorrect results, the team learns to validate data at its source, adopt proper validation frameworks, and step back to understand underlying requirements, emphasizing that thoughtful design outweighs quick code patches.

Backend DevelopmentPHPbug fixing
0 likes · 6 min read
A Tale of Bug Fixing: Thinking Beyond the Immediate Solution