Tag

login security

0 views collected around this technical thread.

Selected Java Interview Questions
Selected Java Interview Questions
Feb 13, 2025 · Backend Development

Introduction to Lua and Using Redis + Lua Scripts to Limit IP Login Attempts

This article introduces the lightweight Lua scripting language, outlines its key features and typical use cases, and provides a complete example of using Redis together with Lua scripts (and a Java client) to enforce IP‑based login‑attempt limits for improved security.

IP Rate LimitingJavaJedis
0 likes · 13 min read
Introduction to Lua and Using Redis + Lua Scripts to Limit IP Login Attempts
Lobster Programming
Lobster Programming
Jan 13, 2025 · Information Security

How to Detect and Block 3+ Failed Logins Within 10 Seconds Using MySQL and Redis

Learn practical methods to identify users who exceed three failed login attempts within ten seconds, covering both a MySQL log‑table approach with window functions and a Redis‑based solution with key expiration, plus discussion of performance trade‑offs and atomicity considerations.

MySQLRate LimitingRedis
0 likes · 5 min read
How to Detect and Block 3+ Failed Logins Within 10 Seconds Using MySQL and Redis
php中文网 Courses
php中文网 Courses
May 30, 2023 · Information Security

PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms

This article explains three PHP‑based techniques—captcha verification, encrypted parameter transmission, and dynamic token validation—to protect web login pages from automated crawling and credential‑stealing attacks, while also noting their limitations and implementation details.

Encryptionanti-crawlercaptcha
0 likes · 6 min read
PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

Brute ForceHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

Brute ForceHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

Brute ForceHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Laravel Tech Community
Laravel Tech Community
Jan 29, 2021 · Backend Development

Implementing IP Blocking and Login Attempt Limiting in Backend Applications

This article explains how to record login failures, lock accounts after multiple errors, block client IPs based on IP ranges, and limit login attempts using server variables, database checks, and PHP session handling, providing complete code examples for each technique.

BackendCode ExampleIP blocking
0 likes · 5 min read
Implementing IP Blocking and Login Attempt Limiting in Backend Applications
Top Architect
Top Architect
Dec 19, 2020 · Information Security

Designing Secure Login Interfaces: Risks and Countermeasures

This article examines common security threats to login APIs such as brute‑force attacks, man‑in‑the‑middle interception, and credential enumeration, and presents practical countermeasures including captchas, IP and account lockout, mobile verification, HTTPS enforcement, and comprehensive logging to harden authentication systems.

Brute ForceHTTPSIP blocking
0 likes · 11 min read
Designing Secure Login Interfaces: Risks and Countermeasures