Tagged articles
20 articles
Page 1 of 1
Huolala Tech
Huolala Tech
Mar 18, 2025 · Information Security

Mastering MSSQL Attack Chains: Exploit Techniques and Defense Strategies

This article provides a comprehensive analysis of MSSQL attack vectors—including stored procedures, COM components, CLR, sandbox bypass, triggers, proxy jobs, Kerberoasting, and linked servers—detailing prerequisites, exploitation steps with code examples, and practical mitigation recommendations to harden database security.

Attack TechniquesCLRCOM
0 likes · 21 min read
Mastering MSSQL Attack Chains: Exploit Techniques and Defense Strategies
Laravel Tech Community
Laravel Tech Community
Jun 25, 2021 · Big Data

Apache Kudu 1.15.0 – New Features and Improvements

Apache Kudu 1.15.0 adds experimental multi‑row transaction support (currently INSERT and INSERT_IGNORE), Raft‑based master configuration tools, table comment synchronization with Hive Metastore, per‑table size and row‑count limits configurable via flags or the kudu table set_limit tool, a customizable Kerberos principal flag, and TLS v1.3 with optional cipher‑suite selection, collectively enhancing low‑latency random access and analytical capabilities in the Hadoop ecosystem.

Apache KuduBig DataHadoop
0 likes · 3 min read
Apache Kudu 1.15.0 – New Features and Improvements
Big Data Technology & Architecture
Big Data Technology & Architecture
May 26, 2020 · Information Security

Step-by-Step Guide to Integrating Kerberos Authentication with the Cloudera Platform

This article provides a comprehensive tutorial on Kerberos fundamentals, its authentication workflow, and detailed procedures for installing, configuring, and enabling Kerberos security on a Cloudera (Hadoop) cluster running on CentOS, including code snippets, configuration files, and post‑deployment testing steps.

AuthenticationBig DataCloudera
0 likes · 17 min read
Step-by-Step Guide to Integrating Kerberos Authentication with the Cloudera Platform
Meitu Technology
Meitu Technology
Jul 24, 2018 · Big Data

Exploring Big Data Cluster Security: Evaluation of Kerberos, Apache Sentry, and Apache Ranger

The article evaluates Kerberos, Apache Sentry, and Apache Ranger for securing Meitu’s large‑scale Hadoop ecosystem, highlighting Ranger’s comprehensive, fine‑grained, policy‑based authorization across HDFS, HBase, Hive, YARN, Storm, and Kafka, and describing its configuration, LDAP integration, and custom SDK implementation.

Apache RangerApache SentryHadoop
0 likes · 12 min read
Exploring Big Data Cluster Security: Evaluation of Kerberos, Apache Sentry, and Apache Ranger
Ctrip Technology
Ctrip Technology
Jul 3, 2018 · Big Data

Ctrip's Presto Engine: Challenges, Improvements, and Upgrade Roadmap

This article details Ctrip's experience with the Presto distributed SQL engine, outlining the initial performance and stability issues, the comprehensive enhancements made in security, resource control, compatibility, and monitoring, and the multi‑stage upgrade plan that guides its future evolution.

Big DataKerberosPerformance Optimization
0 likes · 11 min read
Ctrip's Presto Engine: Challenges, Improvements, and Upgrade Roadmap
Meituan Technology Team
Meituan Technology Team
May 17, 2018 · Information Security

Performance Optimization and Monitoring of Kerberos KDC Service

The article examines Kerberos KDC performance issues on Meituan‑Dianping’s data platform, showing that PREAUTH halves throughput while RAID10 has little effect, and that a single‑CPU core limits QPS; deploying 40 processes and disabling PREAUTH raises throughput over tenfold, and a lock‑free shared‑memory monitoring module with the kstat tool provides real‑time metrics for troubleshooting.

AuthenticationKDCKerberos
0 likes · 17 min read
Performance Optimization and Monitoring of Kerberos KDC Service
Meituan Technology Team
Meituan Technology Team
Aug 25, 2017 · Big Data

Data Platform Integration and Multi‑Data‑Center Architecture at Meituan‑Dianping

After Meituan merged with Dianping, engineers unified two massive Hadoop ecosystems across Beijing and Shanghai by breaking the project into four phases—unify, copy, switch, fuse—standardizing versions, implementing zone‑aware transfers, cross‑realm Kerberos, and federated metadata to achieve a single, reliable multi‑data‑center platform.

Big DataCluster FusionData Platform
0 likes · 32 min read
Data Platform Integration and Multi‑Data‑Center Architecture at Meituan‑Dianping
Tongcheng Travel Technology Center
Tongcheng Travel Technology Center
Apr 14, 2017 · Information Security

Implementing a Lightweight User Authentication Mechanism for Hadoop at Tongcheng Travel

This article describes the design, implementation, and deployment of a custom Hadoop security solution that introduces username‑password authentication via RPC, integrates a new protobuf protocol, modifies NameNode behavior, and provides rollout tools to secure a large‑scale shared Hadoop cluster without service interruption.

AuthenticationHadoopKerberos
0 likes · 9 min read
Implementing a Lightweight User Authentication Mechanism for Hadoop at Tongcheng Travel
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Feb 10, 2017 · Information Security

Securing Kafka with Kerberos and ACLs: A Practical Guide

This article explains Kafka's architecture, identifies its security vulnerabilities, and presents Transwarp's Kerberos authentication and ACL-based authorization solutions, including configuration steps, code examples, and best practices for building a secure Kafka service.

ACLKafkaKerberos
0 likes · 12 min read
Securing Kafka with Kerberos and ACLs: A Practical Guide
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Jan 26, 2017 · Information Security

Why Hadoop Clusters Need Strong Security and How Kerberos Protects Them

This article explains the security risks facing Hadoop clusters, outlines common attack methods, introduces Kerberos authentication, and describes Transwarp Data Hub's multi‑layer security architecture—including Guardian, KRB5LDAP, and authorization controls—to help administrators secure their big‑data environments.

HadoopKerberosTDH
0 likes · 11 min read
Why Hadoop Clusters Need Strong Security and How Kerberos Protects Them