Tagged articles
10 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Mar 14, 2025 · Backend Development

Mastering Nginx IP Whitelists and Blacklists: Step‑by‑Step Guide

This tutorial explains how to configure Nginx to control access by IP using allow/deny directives, include files, the ngx_http_geo_module for subnet and country restrictions, and the ngx_http_geoip_module for geographic blocking, with complete configuration examples and installation commands.

GeoIPIP whitelistgeo module
0 likes · 8 min read
Mastering Nginx IP Whitelists and Blacklists: Step‑by‑Step Guide
Java Tech Enthusiast
Java Tech Enthusiast
May 5, 2024 · Information Security

Preventing Malicious API Abuse: Security Measures and Best Practices

To prevent malicious API abuse, implement layered defenses such as firewalls to block unwanted traffic, robust captchas and SMS verification, mandatory authentication with permission controls, IP whitelisting for critical endpoints, HTTPS encryption, strict rate‑limiting via Redis, continuous monitoring with alerts, and an API gateway that centralizes filtering, authentication and throttling.

API SecurityCaptchaIP whitelist
0 likes · 9 min read
Preventing Malicious API Abuse: Security Measures and Best Practices
Architect
Architect
Apr 27, 2024 · Information Security

How to Stop Malicious API Calls: 8 Practical Defense Strategies

This article walks through eight concrete techniques—firewall rules, captchas, authentication checks, IP whitelists, HTTPS encryption, rate limiting, monitoring, and an API gateway—to prevent abusive requests from draining resources or compromising critical services.

API SecurityAuthenticationCaptcha
0 likes · 11 min read
How to Stop Malicious API Calls: 8 Practical Defense Strategies
Top Architect
Top Architect
Oct 2, 2020 · Information Security

Designing Simple API Authentication for Internal Services

The article explores practical approaches for authenticating internal service APIs, comparing plain token usage, IP whitelisting, and salted signature schemes with timestamps, and explains their implementation details, security trade‑offs, and suitability for a B2B cloud‑operated platform.

API authenticationBackend SecurityIP whitelist
0 likes · 7 min read
Designing Simple API Authentication for Internal Services
dbaplus Community
dbaplus Community
Nov 20, 2017 · Databases

Enabling IP Whitelisting in MongoDB 3.6: A Step‑by‑Step Guide

MongoDB 3.6 introduces authentication restrictions that let you enforce IP whitelists for both client and server connections, and this guide walks through creating a user, configuring bind_ip, restarting the server, and verifying the setup with concrete commands and screenshots.

Database SecurityIP whitelistMongoDB
0 likes · 5 min read
Enabling IP Whitelisting in MongoDB 3.6: A Step‑by‑Step Guide