Tagged articles
4 articles
Page 1 of 1
Top Architect
Top Architect
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks

This article explains common security risks of login interfaces such as brute‑force attacks, CAPTCHA bypass, IP‑based rate limiting, mobile verification, and man‑in‑the‑middle threats, and provides practical mitigation techniques including code examples, HTTPS adoption, and additional hardening measures.

Brute-force protectionCaptchaHTTPS
0 likes · 13 min read
How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks
Java Captain
Java Captain
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse

This article explains common security risks in login interfaces—such as brute‑force attacks, captcha bypass, account and IP lockouts, man‑in‑the‑middle threats—and provides practical mitigation techniques like password attempt limits, captcha, phone verification, HTTPS, and comprehensive logging.

Brute-force protectionCaptchaHTTPS
0 likes · 9 min read
How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse
Java High-Performance Architecture
Java High-Performance Architecture
Jan 24, 2016 · Information Security

What Is a CC Attack and How to Defend Against It?

CC attacks, a variant of DDoS that exploits legitimate web requests via proxies, overwhelm servers by forcing intensive URL processing; this article explains their mechanics, differences from traditional DDoS, and outlines practical defenses such as cloud WAFs, IP analysis, static content, and connection‑rate limiting.

CC AttackCloud WAFDDoS
0 likes · 6 min read
What Is a CC Attack and How to Defend Against It?