Tagged articles
38 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
Apr 22, 2026 · Information Security

Why Your API Keys Are Your Digital Wallet—and How to Stop Leaking Them

Developers often scatter API keys across .env files, hard‑code them into source code, or push them to public GitHub repositories, leading to massive credential leaks that can instantly drain cloud‑service balances, as shown by real‑world GitHub scans and industry reports.

AI servicesAPI SecurityGitHub leaks
0 likes · 5 min read
Why Your API Keys Are Your Digital Wallet—and How to Stop Leaking Them
Ray's Galactic Tech
Ray's Galactic Tech
Nov 2, 2025 · Information Security

How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption

To protect sensitive data in third‑party API integrations, this guide outlines a three‑layer security architecture—mutual TLS for channel protection, HMAC‑based request signing for integrity, and RSA encryption for data confidentiality—plus key management, monitoring, performance considerations, and implementation roadmaps.

API SecurityHMACRSA
0 likes · 10 min read
How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption
Chen Tian Universe
Chen Tian Universe
Aug 25, 2025 · Information Security

Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud

Payment security encompasses protecting sensitive data, preventing transaction tampering, fraud, and service attacks; this comprehensive guide details the main threats, core safeguards such as encrypted storage and transmission, digital signatures, PCI compliance, key management, and practical encryption algorithms like AES and RSA for robust, real‑world implementations.

PCI compliancedigital signaturesencryption
0 likes · 50 min read
Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud
Huolala Tech
Huolala Tech
Apr 15, 2025 · Information Security

How a Key Management Gateway Secures Third‑Party API Integrations

This article examines the security challenges of integrating third‑party services via OpenAPI, analyzes code and personnel risks of key exposure, and presents a key‑gateway solution that uses KMS, multi‑tenant architecture, customizable signing modules, and robust exception handling to protect sensitive credentials.

API SecurityKMSkey management
0 likes · 15 min read
How a Key Management Gateway Secures Third‑Party API Integrations
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Apr 14, 2025 · Information Security

How a Key Gateway Secures Third‑Party API Calls and Prevents Key Leaks

This article analyzes the security risks of exposing third‑party service keys in modern applications, examines traditional and ideal key‑management approaches, and presents a detailed design of a Key Gateway that centralizes signing, encryption, token handling, multi‑tenant support, and robust exception management to protect sensitive credentials.

API Securityaccess controlencryption
0 likes · 17 min read
How a Key Gateway Secures Third‑Party API Calls and Prevents Key Leaks
IT Services Circle
IT Services Circle
May 20, 2024 · Backend Development

Why Redis Can Become a Performance Bottleneck and How to Avoid It

The article explains several common reasons why Redis may degrade performance—such as network latency, misuse of high‑complexity commands, the KEYS command, clustered key expirations, and big‑key operations—and provides practical mitigation techniques like batch commands, TTL randomization, and lazy deletion.

Backendkey managementredis
0 likes · 8 min read
Why Redis Can Become a Performance Bottleneck and How to Avoid It
Liangxu Linux
Liangxu Linux
May 6, 2024 · Information Security

Master Secure Remote Access: A Complete Linux SSH Configuration Guide

This step‑by‑step guide explains how to install, configure, and harden SSH on Linux, covering service setup, key generation, client configuration, file transfer, tunneling, ProxyJump, login banners, password‑less authentication, time/IP restrictions, fail2ban monitoring, multi‑factor authentication, ssh‑agent usage, and regular maintenance.

Fail2banRemote accessSSH
0 likes · 9 min read
Master Secure Remote Access: A Complete Linux SSH Configuration Guide
MaGe Linux Operations
MaGe Linux Operations
Dec 26, 2023 · Databases

Master Redis: Essential Commands for Data Management and Persistence

This guide walks through Redis fundamentals, covering how data persists after restarts, core key operations, database selection, serialization, expiration handling, key movement, random retrieval, renaming, and how to check the number of configured databases, all with practical command examples and visual illustrations.

Persistencedatabasekey management
0 likes · 7 min read
Master Redis: Essential Commands for Data Management and Persistence
Open Source Linux
Open Source Linux
Nov 10, 2023 · Information Security

Understanding SSH: Ports, Workflow, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step process of establishing a secure connection, the role of symmetric and asymmetric encryption, and how password and public‑key authentication work with tools like PuTTY and OpenSSH.

AuthenticationOpenSSHPutty
0 likes · 8 min read
Understanding SSH: Ports, Workflow, and Key Authentication Explained
JD Cloud Developers
JD Cloud Developers
Nov 1, 2023 · Databases

How Do Big Keys Slow Down Redis and How to Fix Them?

This article explains why oversized Redis keys (BigKeys) cause data skew, network blockage, slow queries, and high CPU load, shows how to detect them with redis-cli and other tools, and provides practical strategies—including lazy deletion, key splitting, and preventive design—to mitigate their impact on production systems.

BigKeyLazy Freekey management
0 likes · 22 min read
How Do Big Keys Slow Down Redis and How to Fix Them?
Laravel Tech Community
Laravel Tech Community
Jun 18, 2023 · Operations

tssh v0.1.3 Release: Installation and Usage Guide

The article introduces tssh v0.1.3, a SSH client that supports multiple private keys and password‑protected keys, explains how to install it on client machines, configure SSH keys and passwords, and use it to manage and connect to multiple servers efficiently.

SSHkey managementpassword storage
0 likes · 6 min read
tssh v0.1.3 Release: Installation and Usage Guide
Huolala Tech
Huolala Tech
Jun 9, 2023 · Information Security

How to Implement Enterprise-Scale Data Encryption: Lessons from Huolala

This article outlines a comprehensive approach to large‑scale data encryption, covering background regulations, data discovery, solution selection, key management, algorithm choices, implementation techniques, incremental controls, and metrics to ensure secure and efficient encryption across thousands of services and billions of records.

Security Architectureapplication-layer encryptiondata encryption
0 likes · 12 min read
How to Implement Enterprise-Scale Data Encryption: Lessons from Huolala
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 2, 2023 · Mobile Development

Android File‑Based Encryption (FBE) Key Management and Architecture Overview

The article explains Android’s multi‑layered file‑based encryption system, describing how FDE, FBE and metadata encryption work together, and detailing the end‑to‑end key‑management flow that spans the HAL, VOLD, Linux kernel, fscrypt, the Trusted Execution Environment and hardware crypto engines to generate, derive, and program per‑file encryption keys.

AndroidFile-Based EncryptionTEE
0 likes · 21 min read
Android File‑Based Encryption (FBE) Key Management and Architecture Overview
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
May 24, 2023 · Information Security

How to Scale Data Encryption Across Millions of Services: A Practical Roadmap

This article details a comprehensive, multi‑stage approach to implementing data encryption at scale—covering data discovery, solution selection, application‑layer and proxy‑layer encryption, key management, algorithm choices, incremental migration, and measurable metrics—to help enterprises protect sensitive data while balancing performance and cost.

Security Architectureapplication-layer encryptiondata encryption
0 likes · 13 min read
How to Scale Data Encryption Across Millions of Services: A Practical Roadmap
Weimob Technology Center
Weimob Technology Center
May 12, 2022 · Information Security

Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture

This article explains how WKMS addresses rising data‑protection regulations by offering a hierarchical key‑management service, masking SDK, AES‑based encryption, robust disaster‑recovery, and high‑throughput performance testing, illustrating a secure yet scalable solution for modern enterprises.

Cloud NativePerformance TestingSecurity Architecture
0 likes · 10 min read
Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture
Alibaba Cloud Native
Alibaba Cloud Native
Apr 15, 2022 · Cloud Native

Quick Start with Serverless Devs: Install, Key Management, and Yaml Best Practices

This guide walks you through installing the Serverless Devs CLI, configuring Alibaba Cloud access keys via interactive prompts, command‑line flags, or environment variables, explains key‑usage safety and alias design, and details Yaml syntax, variable handling, service ordering, and custom actions for seamless serverless application deployment.

CLICloud NativeServerless
0 likes · 20 min read
Quick Start with Serverless Devs: Install, Key Management, and Yaml Best Practices
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 10, 2021 · Information Security

Introduction and Business Practice of Cloud KMS for Data Security at iQIYI

iQIYI’s security team created a Cloud KMS platform that, in line with China’s Data Security Law, provides HSM‑backed key lifecycle management, API‑driven encryption, high‑availability deployment and fine‑grained access control, enabling its membership services to meet compliance, cut development effort by ~80 %, halve operational workload and lower costs, while laying groundwork for future features such as traffic splitting and zero‑intrusion integration.

Business PracticeCloud KMScloud computing
0 likes · 7 min read
Introduction and Business Practice of Cloud KMS for Data Security at iQIYI
Practical DevOps Architecture
Practical DevOps Architecture
May 14, 2021 · Databases

Redis Basic Commands and Key Operations Tutorial

This article provides a concise tutorial on essential Redis commands, covering basic operations, database selection, key management, expiration settings, and practical examples demonstrated through the Redis CLI, including how to list keys with patterns, check existence, and clear databases.

TTLcommandsdatabase
0 likes · 7 min read
Redis Basic Commands and Key Operations Tutorial
Beike Product & Technology
Beike Product & Technology
Mar 19, 2021 · Information Security

Key Management System (KMS) Overview and Common Cryptographic Security Risks

The article outlines typical cryptographic security risks such as weak algorithms, insufficient key lengths, poor key management, and then introduces a comprehensive Key Management System (KMS) architecture, its core functions, key hierarchy, and practical application scenarios like API signing and data encryption.

API signingKMSSecurity Risks
0 likes · 9 min read
Key Management System (KMS) Overview and Common Cryptographic Security Risks
vivo Internet Technology
vivo Internet Technology
Jan 13, 2021 · Information Security

Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios

The article explains RSA key files by detailing the underlying mathematics of prime factorization and modular exponents, introduces a six‑layer abstraction from raw values to application use, demonstrates OpenSSL and keytool commands for generation, conversion, and inspection, and illustrates common deployment scenarios such as HTTPS and MySQL SSL.

ASN.1OpenSSLPKCS
0 likes · 19 min read
Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios
Architect's Tech Stack
Architect's Tech Stack
Nov 13, 2020 · Databases

How to Safely Scan Large Redis Keyspaces with the SCAN Command

This article explains why using the KEYS command on massive Redis datasets can cause service blockage, analyzes the underlying O(n) traversal cost, and demonstrates how the incremental SCAN command with cursor, MATCH, and COUNT options provides a non‑blocking alternative for efficiently iterating keys.

SCANkey managementperformance
0 likes · 5 min read
How to Safely Scan Large Redis Keyspaces with the SCAN Command
Architecture Digest
Architecture Digest
Aug 29, 2020 · Databases

Cleaning Up Shared Redis Keys After a Business Line Decommission: Challenges and Solutions

This article describes how a team released resources after shutting down a business line, focusing on the difficulties of deleting Redis keys from a shared cluster, the step‑by‑step approach using code search, Python scripts, SCAN and DEBUG OBJECT commands, and the implementation of a custom key‑prefix serializer to prevent future issues.

PythonSpring Bootdatabase cleanup
0 likes · 7 min read
Cleaning Up Shared Redis Keys After a Business Line Decommission: Challenges and Solutions
Tencent Cloud Developer
Tencent Cloud Developer
Aug 3, 2020 · Information Security

Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions

The article outlines enterprise data‑security risks and regulatory demands, reviews symmetric, asymmetric and hash techniques, highlights cloud‑encryption and key‑management challenges, and presents Tencent Cloud’s comprehensive solutions—including KMS, BYOK, white‑box keys, virtual HSMs, and integrated database encryption—to protect data throughout its lifecycle.

Tencent Cloudcloud computingcompliance
0 likes · 20 min read
Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions
Programmer DD
Programmer DD
Jul 15, 2020 · Databases

Master Redis Expiration: Key Commands That Preserve or Reset TTL

This article explains how Redis handles key expiration, detailing which commands clear or keep TTL, how PERSIST and RENAME affect expiration, the impact of negative or past timestamps, and the lazy and periodic deletion strategies Redis uses to manage expired keys efficiently.

ExpirationLazy DeletionPeriodic Deletion
0 likes · 10 min read
Master Redis Expiration: Key Commands That Preserve or Reset TTL
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 9, 2019 · Databases

Guide to MySQL InnoDB Tablespace Encryption: Overview, Configuration, Key Management, Import/Export, Backup and Restore

This article provides a comprehensive guide to MySQL InnoDB tablespace encryption, covering its architecture, supported plugins, configuration steps, key rotation, limitations, encrypted table operations, import/export procedures, and backup/restore methods using mysqlbackup and innobackupex.

BackupInnoDBRestore
0 likes · 17 min read
Guide to MySQL InnoDB Tablespace Encryption: Overview, Configuration, Key Management, Import/Export, Backup and Restore
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 1, 2019 · Information Security

How MPC‑Based Key Management Eliminates Key Leakage Risks

This article explains the challenges of traditional key management, compares local and server‑side encryption approaches, and introduces a secure multi‑party computation (MPC) key management system that distributes key fragments across multiple servers to prevent key exposure even if some nodes are compromised.

MPCThreshold Cryptographyinformation security
0 likes · 9 min read
How MPC‑Based Key Management Eliminates Key Leakage Risks
Architects' Tech Alliance
Architects' Tech Alliance
Dec 12, 2018 · Information Security

Understanding Enterprise Self‑Encrypting Drives (SED), Key Management Controllers (KMC) and NetApp Encryption Technologies

This article explains how enterprise self‑encrypting drives (SED) work with FIPS‑compliant key management controllers (KMC), details the encryption and key lifecycle processes, compares SED variants, and introduces NetApp's NSE and NVE storage encryption solutions for secure data protection.

KMCNetAppencryption
0 likes · 13 min read
Understanding Enterprise Self‑Encrypting Drives (SED), Key Management Controllers (KMC) and NetApp Encryption Technologies
360 Tech Engineering
360 Tech Engineering
Nov 8, 2018 · Blockchain

Key Management Standards for Bitcoin Wallets

This article explains the fundamentals of Bitcoin wallet key management, covering the relationships between private keys, public keys, and addresses, the different wallet types, and the essential BIP standards (BIP‑0032, BIP‑0039, BIP‑0043, BIP‑0044) that define deterministic key derivation and mnemonic generation.

BIPHD-walletWallet
0 likes · 14 min read
Key Management Standards for Bitcoin Wallets
JD Tech
JD Tech
Jul 10, 2018 · Big Data

Deploying Hadoop KMS for Transparent HDFS Encryption: A Step‑by‑Step Guide

This article details a complete, hands‑on deployment of Hadoop KMS on a CentOS‑based Hadoop 2.6.1 cluster, covering environment setup, configuration file changes, key generation, service startup, encryption‑zone creation, user permission tuning, verification procedures, and common troubleshooting tips.

HDFSHadoopKMS
0 likes · 19 min read
Deploying Hadoop KMS for Transparent HDFS Encryption: A Step‑by‑Step Guide
Architects' Tech Alliance
Architects' Tech Alliance
Jan 3, 2018 · Information Security

Data Security and Encryption Technologies: Standards, Solutions, and Best Practices

Data breaches have surged, affecting governments, enterprises, and security vendors, prompting the need for robust encryption across storage, application, and gateway layers, with standards such as FIPS 140‑2 and solutions from Vormetric and SafeNet offering transparent, compatible, and managed encryption for on‑premises and cloud environments.

FIPS140-2cloud encryptiondata security
0 likes · 9 min read
Data Security and Encryption Technologies: Standards, Solutions, and Best Practices
WeChat Client Technology Team
WeChat Client Technology Team
Sep 28, 2017 · Information Security

How Tencent’s SOTER Secures Fingerprint Payments on Android

This article examines the challenges of implementing fingerprint‑based payment on Android, explains why early Android versions lacked a unified API, describes how Google’s FingerprintManager and TEE improve security, and details Tencent’s open‑source SOTER framework—including its key hierarchy, authentication flow, and integration steps—for building robust, low‑overhead biometric payment solutions.

Android SecuritySOTERSecure Payment
0 likes · 17 min read
How Tencent’s SOTER Secures Fingerprint Payments on Android