Tagged articles
4 articles
Page 1 of 1
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

CaptchaHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
php Courses
php Courses
Feb 7, 2021 · Backend Development

Configuring IP Access Restrictions for Modules in ThinkPHP

This guide explains how to configure module IP access restrictions in ThinkPHP by adding 'allow_module_ip' and 'deny_module_list' entries to config.php, shows the recommended placement, and demonstrates the necessary modifications to the framework's App.php file to enforce the rules.

BackendIP restrictionPHP
0 likes · 3 min read
Configuring IP Access Restrictions for Modules in ThinkPHP
ITPUB
ITPUB
Nov 11, 2020 · Backend Development

How to Refactor Java Login Security: Clean IP and Time Restrictions

This article walks through a real‑world Java e‑commerce login module refactor, adding IP‑based and time‑based access controls, analyzing the original code’s shortcomings, detailing step‑by‑step improvements, and presenting the final clean implementation with best‑practice takeaways.

BackendIP restrictionJava
0 likes · 8 min read
How to Refactor Java Login Security: Clean IP and Time Restrictions