Tagged articles
20 articles
Page 1 of 1
Top Architect
Top Architect
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks

This article explains common security risks of login interfaces such as brute‑force attacks, CAPTCHA bypass, IP‑based rate limiting, mobile verification, and man‑in‑the‑middle threats, and provides practical mitigation techniques including code examples, HTTPS adoption, and additional hardening measures.

Brute-force protectionCaptchaHTTPS
0 likes · 13 min read
How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks
Java Captain
Java Captain
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse

This article explains common security risks in login interfaces—such as brute‑force attacks, captcha bypass, account and IP lockouts, man‑in‑the‑middle threats—and provides practical mitigation techniques like password attempt limits, captcha, phone verification, HTTPS, and comprehensive logging.

Brute-force protectionCaptchaHTTPS
0 likes · 9 min read
How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse
Architecture Digest
Architecture Digest
Sep 18, 2025 · Information Security

How to Harden Login APIs: From Brute‑Force to MITM Protection

This article examines common login security risks such as brute‑force attacks, captcha bypass, IP blocking, and man‑in‑the‑middle threats, and proposes layered defenses including password‑retry limits, captcha, phone verification, HTTPS, and encrypted payloads to significantly raise the attack cost.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Harden Login APIs: From Brute‑Force to MITM Protection
Lobster Programming
Lobster Programming
Sep 13, 2025 · Information Security

Mobile SMS Verification Login: How It Works and How to Secure It

This article explains the workflow of mobile SMS verification login, outlines its main security risks such as code leakage, SMS bombing, and replay attacks, and provides practical mitigation strategies for developers and platform operators to protect user accounts.

AuthenticationSMS Verificationinformation security
0 likes · 6 min read
Mobile SMS Verification Login: How It Works and How to Secure It
Open Source Tech Hub
Open Source Tech Hub
Aug 21, 2025 · Backend Development

Build a Scalable Distributed Captcha Login with PHP Webman and Redis

This guide explains how to replace traditional session‑based captcha authentication with a Redis‑backed, token‑driven solution using the high‑performance PHP Webman framework and the tinywan/captcha plugin, covering architecture, generation and verification flows, installation steps, and code examples.

CaptchaDistributed SystemsPHP
0 likes · 8 min read
Build a Scalable Distributed Captcha Login with PHP Webman and Redis
Liangxu Linux
Liangxu Linux
Mar 10, 2024 · Information Security

How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks

This article explains common login security risks such as brute‑force cracking, CAPTCHA bypass, IP‑based blocking, man‑in‑the‑middle attacks, and shows practical countermeasures like captcha enforcement, login throttling, phone verification, HTTPS adoption, and data encryption.

CaptchaHTTPSMITM
0 likes · 10 min read
How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
php Courses
php Courses
May 30, 2023 · Information Security

PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms

This article explains three PHP‑based techniques—captcha verification, encrypted parameter transmission, and dynamic token validation—to protect web login pages from automated crawling and credential‑stealing attacks, while also noting their limitations and implementation details.

Captchaanti‑crawlerdynamic token
0 likes · 6 min read
PHP Anti‑Crawler Login Security: Captcha, Encryption, and Dynamic Token Mechanisms
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

CaptchaHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Programmer DD
Programmer DD
Aug 2, 2021 · Information Security

Why Simple HTML Login Forms Leak Passwords and How to Secure Them

This article examines common security flaws in basic HTML login forms, demonstrates how plaintext passwords can be intercepted over HTTP, evaluates symmetric and asymmetric encryption, discusses the limitations of HTTPS, and proposes practical safeguards such as MD5 hashing, token-based authentication, captchas, and digital signatures to protect user credentials.

HTTPSMD5Token
0 likes · 14 min read
Why Simple HTML Login Forms Leak Passwords and How to Secure Them
Programmer DD
Programmer DD
May 9, 2021 · Information Security

How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More

This article explains practical security measures for login interfaces, covering brute‑force attacks, captcha integration, IP throttling, mobile verification, man‑in‑the‑middle protection with HTTPS, and additional best‑practice recommendations to harden web back‑end authentication.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Top Architect
Top Architect
Dec 19, 2020 · Information Security

Designing Secure Login Interfaces: Risks and Countermeasures

This article examines common security threats to login APIs such as brute‑force attacks, man‑in‑the‑middle interception, and credential enumeration, and presents practical countermeasures including captchas, IP and account lockout, mobile verification, HTTPS enforcement, and comprehensive logging to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
Designing Secure Login Interfaces: Risks and Countermeasures
ITPUB
ITPUB
Nov 15, 2020 · Backend Development

Refactoring Java Login Security: A Real-World E-Commerce Case Study

An in-depth case study shows how to refactor a Java e-commerce login module by adding IP-based and time-based security checks, identifying original code flaws, applying systematic extraction of utilities, simplifying nested loops, improving logging, and consolidating logic into a clean backend utility class.

Backend DevelopmentCode RefactoringJava
0 likes · 7 min read
Refactoring Java Login Security: A Real-World E-Commerce Case Study
ITPUB
ITPUB
Nov 12, 2020 · Backend Development

How to Refactor a Java E‑commerce Login Module for IP and Time Restrictions

This article walks through a real‑world Java code refactor that adds login IP and allowed‑time security checks to an e‑commerce platform, highlighting problems in the original implementation and detailing step‑by‑step improvements such as utility extraction, loop simplification, constant usage, and enhanced logging.

Code RefactoringJavalogging
0 likes · 7 min read
How to Refactor a Java E‑commerce Login Module for IP and Time Restrictions