Tagged articles
358 articles
Page 1 of 4
MaGe Linux Operations
MaGe Linux Operations
May 12, 2026 · Industry Insights

Why Network Security Salaries Range from 9K to 45K and How to Raise Yours

The article examines why network security salaries in China vary from 9 K to 45 K, attributing the gap to regional cost differences, company scale, specific security roles, and individual skill levels, and advises job seekers to target major cities, larger firms, and continuously upgrade their expertise.

Skill Developmentcompany sizenetwork security
0 likes · 4 min read
Why Network Security Salaries Range from 9K to 45K and How to Raise Yours
Black & White Path
Black & White Path
May 4, 2026 · Information Security

Metasploit New Modules: DHCP Exhaustion + DNS MITM for Internal Network Takeover

The article explains how Metasploit’s new auxiliary modules—dhcp_exhaustion/exhaust and dns_mitm/dns_mitm—can be combined to exhaust a DHCP server’s address pool, impersonate it, and redirect DNS queries to a malicious server, enabling attackers to gain network control while outlining defensive measures such as DHCP snooping and ARP inspection.

DHCP exhaustionDNS hijackingMetasploit
0 likes · 4 min read
Metasploit New Modules: DHCP Exhaustion + DNS MITM for Internal Network Takeover
MaGe Linux Operations
MaGe Linux Operations
Apr 24, 2026 · Information Security

A Misplaced iptables Rule Nearly Took Down Our Production – Full Incident Postmortem and Best‑Practice Guide

The article recounts a real‑world iptables misconfiguration that cut off SSH access and caused a 47‑minute outage, then walks through the root‑cause analysis, step‑by‑step remediation, common pitfalls, rule‑ordering nuances, monitoring, automation, and migration to nftables, offering a comprehensive firewall best‑practice handbook.

Linuxfirewalliptables
0 likes · 75 min read
A Misplaced iptables Rule Nearly Took Down Our Production – Full Incident Postmortem and Best‑Practice Guide
Black & White Path
Black & White Path
Apr 18, 2026 · Information Security

25 Essential Network Security Devices and Their Roles

The article outlines over 25 common network security devices—from firewalls and NGFWs to EDR, SIEM, and UTM—detailing their core functions, typical deployment scenarios, and concrete examples, while emphasizing a layered, need‑based approach to building an effective defense.

EDRFirewallsIDS
0 likes · 28 min read
25 Essential Network Security Devices and Their Roles
ITPUB
ITPUB
Mar 30, 2026 · Information Security

Essential Network Security FAQ: 100+ Key Concepts Explained

This comprehensive guide defines network security, outlines its core attributes, enumerates common threats and attack types, and provides practical mitigation strategies, covering everything from encryption basics and access controls to advanced topics like zero‑day vulnerabilities, zero‑trust architecture, and security automation.

Threatsaccess controlcybersecurity
0 likes · 44 min read
Essential Network Security FAQ: 100+ Key Concepts Explained
Black & White Path
Black & White Path
Mar 28, 2026 · Information Security

Network Security Red Book: 700+ Tools from Recon to Internal Penetration

This article compiles over 700 high‑quality open‑source security projects from GitHub, categorised by functional scenarios such as automated reconnaissance, information gathering, vulnerability exploitation, internal network penetration, evasion, and incident response, providing a comprehensive practical toolkit for red‑team, blue‑team and security researchers.

network securityopen sourcepenetration testing
0 likes · 18 min read
Network Security Red Book: 700+ Tools from Recon to Internal Penetration
ITPUB
ITPUB
Mar 23, 2026 · Information Security

Essential Network Security Q&A: From Fundamentals to Advanced Threats

This comprehensive guide answers 100 common network security questions, covering basic concepts, core properties, threat sources, attack types, encryption methods, access controls, incident response, and emerging technologies such as zero‑trust, quantum encryption, and SOAR.

ThreatsVulnerabilityaccess control
0 likes · 44 min read
Essential Network Security Q&A: From Fundamentals to Advanced Threats
Black & White Path
Black & White Path
Mar 6, 2026 · Industry Insights

Beware Invoice Phishing and Israel’s Cyber Attack on Iran: A Deep Dive into Modern Threats

The article warns of sophisticated invoice‑phishing emails that can implant malware and outlines three practical defenses, then shifts to a detailed analysis of Israel’s cyber strike on Iran’s missile command, explaining the attack’s technical layers, hybrid war model, strategic implications, and future risks.

Cyber Warfarehybrid warfareindustrial control systems
0 likes · 11 min read
Beware Invoice Phishing and Israel’s Cyber Attack on Iran: A Deep Dive into Modern Threats
Radish, Keep Going!
Radish, Keep Going!
Mar 3, 2026 · Information Security

Who Controls Your Computer’s Clock? Inside the Hidden NTP Trust Chain

Your device’s time comes from a worldwide hierarchy of atomic clocks and GPS satellites managed by the US Naval Observatory, but the NTP protocol lacks authentication, exposing SSL certificates, financial transactions, Kerberos authentication, and distributed databases to serious clock‑drift attacks.

NTPUSNOclock drift
0 likes · 10 min read
Who Controls Your Computer’s Clock? Inside the Hidden NTP Trust Chain
MaGe Linux Operations
MaGe Linux Operations
Feb 28, 2026 · Information Security

Mastering Enterprise Firewalls: iptables vs nftables Rule Management

This guide walks you through the fundamentals of Linux Netfilter, compares iptables and nftables architectures, shows how to build, migrate, and optimize enterprise‑grade firewall rule sets, and provides best‑practice tips, automation scripts, monitoring metrics, and troubleshooting procedures for secure, high‑performance network protection.

DockerKubernetesLinux
0 likes · 44 min read
Mastering Enterprise Firewalls: iptables vs nftables Rule Management
Black & White Path
Black & White Path
Feb 14, 2026 · Information Security

When Hackers Operate Like a Corporation: How Attackers Outpace Defenders

The article traces the rapid evolution of cybercrime from scattered early malware to a highly organized, global underground industry, highlighting the rise of Ransomware‑as‑a‑Service, state‑backed actors, AI‑driven attacks, and why enterprises must shift from slow, reactive defenses to proactive resilience.

AI in securityattack-as-a-servicecyber resilience
0 likes · 13 min read
When Hackers Operate Like a Corporation: How Attackers Outpace Defenders
Tech Freedom Circle
Tech Freedom Circle
Jan 24, 2026 · Operations

How to Tackle Excess Connections, DDoS/DoS, CORS and XSS Attacks – A Complete Practical Guide

This article walks through a systematic, production‑grade approach to diagnosing and mitigating connection‑overload, DoS/DDoS, XSS and cross‑origin attacks, covering log analysis, Linux kernel tuning, Nginx rate‑limiting, CDN/DDoS‑protection layers, WAF rules, safe rendering practices, and a hardened CORS configuration template.

BackendCORSDDoS mitigation
0 likes · 48 min read
How to Tackle Excess Connections, DDoS/DoS, CORS and XSS Attacks – A Complete Practical Guide
DevOps Coach
DevOps Coach
Jan 8, 2026 · Information Security

Why VPNs Are Obsolete: 12 Top Zero‑Trust Tools to Secure Your Network

This article explains why traditional VPNs are increasingly insecure, outlines the core principles of zero‑trust security, reviews twelve leading zero‑trust solutions with features, real‑world red‑team examples and quick‑setup commands, and provides a step‑by‑step migration guide from VPN to zero‑trust.

Red TeamVPN replacementZero Trust
0 likes · 21 min read
Why VPNs Are Obsolete: 12 Top Zero‑Trust Tools to Secure Your Network
Java Architect Handbook
Java Architect Handbook
Dec 4, 2025 · Information Security

Using nmap4j in Java to Scan Ports and Identify Services

This guide explains how to integrate the nmap4j library into Java projects to perform Nmap‑based port scanning, service detection, and OS identification, covering prerequisite setup, key command‑line flags, Windows and Linux implementations, and parsing XML results with Dom4j.

Javanetwork securitynmap4j
0 likes · 14 min read
Using nmap4j in Java to Scan Ports and Identify Services
Xiao Liu Lab
Xiao Liu Lab
Nov 27, 2025 · Information Security

Master NPS: Deploy Secure Intranet Penetration with Docker and TLS

This guide explains what NPS (Network Penetration Service) is, why it’s needed, its core advantages, and provides step‑by‑step instructions for deploying the server and client on Linux, Windows, or Docker, configuring TLS, managing tunnels, and troubleshooting common issues.

Docker deploymentNPSTLS encryption
0 likes · 9 min read
Master NPS: Deploy Secure Intranet Penetration with Docker and TLS
Liangxu Linux
Liangxu Linux
Nov 16, 2025 · Information Security

Mastering Linux Netfilter: Core Tools and Their Functions

Netfilter, created by Rusty Russell in 1998 and merged into the Linux kernel in 2000, offers a modular packet‑filtering framework with hooks for filtering, NAT, dropping and logging, and is managed through utilities such as ebtables, arptables, iptables/ip6tables, nftables, conntrack, ulogd, nf_log and nf_queue.

Linuxfirewalliptables
0 likes · 4 min read
Mastering Linux Netfilter: Core Tools and Their Functions
Raymond Ops
Raymond Ops
Nov 15, 2025 · Operations

Master Linux Firewall: From iptables Basics to Advanced Configurations

This comprehensive guide walks you through Linux's iptables firewall, explaining Netfilter fundamentals, the four-table five-chain architecture, rule syntax, common parameters, NAT and SNAT techniques, logging setup, and practical command examples for building secure and efficient firewall policies.

Linux firewallNATSystem Administration
0 likes · 23 min read
Master Linux Firewall: From iptables Basics to Advanced Configurations
Xiao Liu Lab
Xiao Liu Lab
Nov 6, 2025 · Information Security

How AnyLink Provides a Lightweight, Secure SSL VPN for Remote Work

AnyLink is an open‑source, lightweight SSL‑VPN server written in Go that offers standard TLS tunnels, multi‑user management, seamless internal resource access, cross‑platform clients, and zero‑cost private deployment, making it an ideal solution for secure remote office connectivity without commercial hardware.

DockerGoRemote access
0 likes · 7 min read
How AnyLink Provides a Lightweight, Secure SSL VPN for Remote Work
Ray's Galactic Tech
Ray's Galactic Tech
Oct 26, 2025 · Information Security

How to Build a Full‑Featured Network Security Shell Script Library

This guide presents a comprehensive network security shell script library, outlining modular design principles, a categorized inventory of over 180 scripts for reconnaissance, vulnerability scanning, monitoring, incident response, credential management, automation, and utility tools, along with practical build strategies and usage tips for secure, portable deployments.

Shell Scriptsinformation securitynetwork security
0 likes · 12 min read
How to Build a Full‑Featured Network Security Shell Script Library
Raymond Ops
Raymond Ops
Oct 26, 2025 · Information Security

Top 10 SSL/TLS Questions Every Security Pro Must Master

This comprehensive guide covers the ten most frequently asked SSL/TLS questions, explaining protocol differences, handshake processes, certificate structures, PKI components, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the key improvements introduced in TLS 1.3.

CertificateSSL/TLSTLS 1.3
0 likes · 23 min read
Top 10 SSL/TLS Questions Every Security Pro Must Master
Instant Consumer Technology Team
Instant Consumer Technology Team
Oct 13, 2025 · Backend Development

How We Built a Scalable API Automation Platform for Multi‑Environment DevOps Integration

This article details the motivations, architecture, core capabilities, technical challenges, and future roadmap of an in‑house API automation testing platform that supports multi‑environment testing, CI/CD integration, low‑code scripting, and strict network security for enterprise development workflows.

API testingAutomationBackend
0 likes · 16 min read
How We Built a Scalable API Automation Platform for Multi‑Environment DevOps Integration
Raymond Ops
Raymond Ops
Oct 11, 2025 · Information Security

Master Linux Firewall & SSH: Step‑by‑Step Guide to Secure Web Server Access

This tutorial walks through configuring a Linux firewall and web server, setting up network interfaces across four virtual machines, enabling NAT, defining DMZ zones, securing SSH on a non‑standard port, and verifying connectivity, providing a comprehensive hands‑on guide for robust network security.

CentOSLinuxSSH
0 likes · 7 min read
Master Linux Firewall & SSH: Step‑by‑Step Guide to Secure Web Server Access
Raymond Ops
Raymond Ops
Sep 19, 2025 · Information Security

How to Mitigate MySQL CVEs with iptables: Practical Firewall Rules

As network security threats rise, unpatchable MySQL vulnerabilities can be mitigated by configuring iptables rules that whitelist trusted IPs for port 3306 and drop all other traffic, with clear guidance on rule ordering and the differences between DROP and REJECT actions.

CVELinuxfirewall
0 likes · 7 min read
How to Mitigate MySQL CVEs with iptables: Practical Firewall Rules
Linux Tech Enthusiast
Linux Tech Enthusiast
Sep 7, 2025 · Information Security

Essential Truths You Must Know About Using VPNs

The article explains what a VPN is, clarifies its legal status in various countries, debunks common myths about privacy, describes how VPNs act as encrypted proxies requiring trust in providers, and offers guidance on selecting a reliable service or building your own.

ProxyVPNencryption
0 likes · 6 min read
Essential Truths You Must Know About Using VPNs
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2025 · Information Security

Master Enterprise iptables Firewalls: From Basics to Pro-Level Optimization

This comprehensive guide walks you through designing, optimizing, and automating enterprise‑grade iptables firewalls, covering core Netfilter architecture, rule‑design principles, performance tuning, real‑world case studies, monitoring scripts, and emerging technologies like eBPF to help you protect critical infrastructure effectively.

Automationiptablesnetwork security
0 likes · 25 min read
Master Enterprise iptables Firewalls: From Basics to Pro-Level Optimization
ITPUB
ITPUB
Aug 29, 2025 · Operations

Why Operations Engineers Are Anything But Low‑Skill: A Deep Dive into Their Real Technical Challenges

The article debunks the myth that operations work is low‑skill by detailing the extensive monitoring, Linux, networking, security, and firefighting expertise required, illustrating real‑world scenarios, tools, and best‑practice recommendations that highlight the critical, high‑level technical role of ops engineers.

DevOpsLinuxSystem Administration
0 likes · 17 min read
Why Operations Engineers Are Anything But Low‑Skill: A Deep Dive into Their Real Technical Challenges
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Aug 28, 2025 · Cloud Computing

How VPC Private DNS Powers Secure, Scalable Cloud Networks

VPC private DNS provides an isolated, internal name resolution service for cloud resources, enabling secure, efficient communication, private domain management, recursive queries, and seamless integration with public DNS, while offering advantages such as enhanced security, flexible architecture, simplified operations, high availability, and support for hybrid cloud scenarios.

Private DNSVPCcloud networking
0 likes · 12 min read
How VPC Private DNS Powers Secure, Scalable Cloud Networks
AntTech
AntTech
Aug 27, 2025 · Artificial Intelligence

How AI Is Revolutionizing Content Safety – The Tech Behind Shanghai’s Top Award

Shanghai’s 2024 Science and Technology Award honored a joint effort by Shanghai Jiao Tong University and Ant Group for pioneering AI-driven technologies—multimodal hallucination mitigation, controllable data generation, integrated content security monitoring, and adversarial model protection—that set international standards in detecting harmful online media and AIGC content.

AI content safetyAIGC detectionMultimodal AI
0 likes · 6 min read
How AI Is Revolutionizing Content Safety – The Tech Behind Shanghai’s Top Award
360 Tech Engineering
360 Tech Engineering
Jul 29, 2025 · Information Security

How AI and Big Data Are Redefining Global Cybersecurity – Insights from Zhou Hongyi

In his 2025 World Internet Conference Digital Silk Road Forum keynote, Zhou Hongyi warned that the programmable, AI‑driven, data‑centric world amplifies cyber vulnerabilities, described the rise of state‑level cyber warfare and AI‑powered attacks, and outlined 360’s security‑as‑service strategy and global cooperation plans to protect nations and enterprises.

AIBig DataSecurity Operations
0 likes · 5 min read
How AI and Big Data Are Redefining Global Cybersecurity – Insights from Zhou Hongyi
MaGe Linux Operations
MaGe Linux Operations
Jul 14, 2025 · Cloud Native

Master Container Networking: From Basics to Advanced CNI Strategies for 30K Ops Jobs

This comprehensive guide explores container networking fundamentals, Docker and Kubernetes network models, popular CNI plugins, security policies, monitoring, troubleshooting, and performance optimization, providing practical commands and best‑practice recommendations to help operations engineers master the technology and excel in high‑paying network‑focused roles.

CNIKubernetescontainer networking
0 likes · 25 min read
Master Container Networking: From Basics to Advanced CNI Strategies for 30K Ops Jobs
MaGe Linux Operations
MaGe Linux Operations
Jul 13, 2025 · Information Security

Master Linux Firewalls: Complete iptables & firewalld Configuration Guide

Learn the fundamentals of Linux firewalls, compare iptables and firewalld, explore tables, chains, targets, and advanced features, and follow practical scripts for web and database server protection, rule persistence, troubleshooting, performance tuning, and security best practices in a comprehensive step‑by‑step guide.

Linux firewallfirewall rulesfirewalld
0 likes · 21 min read
Master Linux Firewalls: Complete iptables & firewalld Configuration Guide
Deepin Linux
Deepin Linux
Jul 11, 2025 · Information Security

Unlocking Linux Netfilter: How the Kernel’s Packet Filter Works and How to Configure iptables

This article provides a comprehensive guide to Linux Netfilter, explaining its hook‑based architecture, the relationship with iptables, core data structures, rule‑adding syntax, practical configuration examples, enterprise‑level firewall considerations, and its strengths and limitations in network security.

KernelLinux firewalliptables
0 likes · 34 min read
Unlocking Linux Netfilter: How the Kernel’s Packet Filter Works and How to Configure iptables
Liangxu Linux
Liangxu Linux
Jun 28, 2025 · Information Security

Step-by-Step Guide to Configuring Linux Firewall, Web Server, and SSH Access

This tutorial walks through setting up a Linux firewall with multiple network interfaces, configuring a DMZ web server, enabling HTTP/HTTPS services, blocking ICMP ping, and securely exposing SSH on a custom port for both internal and external access, complete with command examples and verification steps.

SSHWeb serverfirewall
0 likes · 7 min read
Step-by-Step Guide to Configuring Linux Firewall, Web Server, and SSH Access
Architects' Tech Alliance
Architects' Tech Alliance
Jun 22, 2025 · Fundamentals

Mastering Data Center Networks: 100 Essential Concepts Explained

This comprehensive guide covers 100 fundamental concepts of data center networking, including architecture, protocols, security, virtualization, performance, interconnects, hardware standards, emerging technologies, and industry ecosystems, providing readers with a complete technical foundation for modern digital infrastructure.

Data centercloud networkingnetwork architecture
0 likes · 19 min read
Mastering Data Center Networks: 100 Essential Concepts Explained
MaGe Linux Operations
MaGe Linux Operations
Jun 16, 2025 · Information Security

Master Linux Firewall with iptables: From Basics to Real-World Deployment

This article provides a comprehensive guide to Linux iptables, covering its Netfilter foundation, table‑chain‑rule architecture, core syntax, common options, and practical examples for firewall policies, NAT, and logging, enabling readers to configure and manage Linux firewalls from basics to real‑world deployment.

Linux firewallfirewall rulesiptables
0 likes · 22 min read
Master Linux Firewall with iptables: From Basics to Real-World Deployment
MaGe Linux Operations
MaGe Linux Operations
Jun 1, 2025 · Information Security

Patch MySQL Vulnerabilities with iptables Firewall Rules

This guide explains how to mitigate several MySQL-related security flaws—such as CVE-2022-32221, CVE-2023-21912, and CVE-2022-37434—by configuring iptables rules to restrict traffic, illustrating command usage, rule ordering, and the differences between DROP and REJECT actions.

CVEfirewalliptables
0 likes · 6 min read
Patch MySQL Vulnerabilities with iptables Firewall Rules
Tencent Cloud Developer
Tencent Cloud Developer
May 20, 2025 · Cloud Computing

Efficient and Resilient Cloud Gateway at Scale: Architecture, Key Technologies, and Operational Practices of Tencent TGW

The article presents a comprehensive analysis of Tencent's TGW cloud gateway, detailing its modular architecture, high‑performance forwarding plane, lossless state migration, rapid fault recovery, multi‑level redundancy, operational best practices, and security mechanisms that enable ultra‑low latency and high availability for large‑scale internet services.

Cloud GatewayState Migrationfault tolerance
0 likes · 13 min read
Efficient and Resilient Cloud Gateway at Scale: Architecture, Key Technologies, and Operational Practices of Tencent TGW
Raymond Ops
Raymond Ops
May 18, 2025 · Information Security

Mastering Linux Netfilter: How to Build Custom iptables Rules and NAT

This guide explains Linux's built‑in netfilter firewall framework, its five hook points, the relationship between tables and chains, and how to use iptables (and firewalld) to define, view, modify, and persist traffic‑filtering rules, implement NAT, and create custom chains for advanced network security.

Linux firewallNATiptables
0 likes · 22 min read
Mastering Linux Netfilter: How to Build Custom iptables Rules and NAT
MaGe Linux Operations
MaGe Linux Operations
May 1, 2025 · Operations

Master Linux Firewalld: Beginner’s Guide to Configuring Firewall Rules

This article introduces Linux firewalld fundamentals, compares it with iptables, explains zones and configuration methods, and walks through practical examples—including blocking ping, restricting SSH access, and opening Apache traffic—using clear commands and code snippets for easy implementation.

firewalldiptablesnetwork security
0 likes · 9 min read
Master Linux Firewalld: Beginner’s Guide to Configuring Firewall Rules
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

Explore Tscanplus: A Powerful All-in-One Network Security & Asset Management Tool

Tscanplus is a comprehensive network security and operations platform that quickly discovers and identifies assets, builds an asset database, and offers features such as port scanning, service detection, URL fingerprinting, POC validation, weak‑password guessing, encoding tools, privilege‑escalation aids, and more, with usage screenshots and a GitHub download link.

Tscanplusasset discoveryinformation security
0 likes · 2 min read
Explore Tscanplus: A Powerful All-in-One Network Security & Asset Management Tool
Liangxu Linux
Liangxu Linux
Apr 5, 2025 · Fundamentals

Essential Networking Q&A: From OSI Layers to VPN and Security Basics

This comprehensive Q&A covers fundamental networking concepts, including link types, OSI model layers, backbone networks, LANs, routers, protocols, topologies, security measures, IP addressing, and common troubleshooting techniques, providing clear explanations for each topic.

IP addressingNetworkingOSI model
0 likes · 22 min read
Essential Networking Q&A: From OSI Layers to VPN and Security Basics
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Mar 28, 2025 · Backend Development

200+ Essential Interview Questions for Linux, Nginx, MySQL, Kafka & Security

This article compiles a comprehensive collection of over two hundred interview questions covering Linux system administration, Nginx web server, MySQL databases, Redis caching, Kafka messaging, and core network security topics, providing a one‑stop resource for candidates preparing for major tech company interviews.

KafkaNGINXinterview-questions
0 likes · 11 min read
200+ Essential Interview Questions for Linux, Nginx, MySQL, Kafka & Security
Open Source Linux
Open Source Linux
Mar 20, 2025 · Information Security

30 High‑Risk Ports to Secure and How to Safely Close Them

This guide lists thirty commonly exposed high‑risk ports, explains the security threats each poses, and provides practical firewall, service‑management, and closure steps to help you harden your systems against attacks.

System Hardeninghigh-risk portsnetwork security
0 likes · 7 min read
30 High‑Risk Ports to Secure and How to Safely Close Them
Lin is Dream
Lin is Dream
Mar 13, 2025 · Information Security

From rlogin to SSH: The Evolution of Secure Remote Login

This article traces the evolution of remote login from early terminal‑based systems to modern secure protocols, explains the development and key features of SSH, compares it with HTTP, and outlines its main functions such as remote access, file transfer, and port forwarding.

LinuxOpenSSHProtocol History
0 likes · 6 min read
From rlogin to SSH: The Evolution of Secure Remote Login
Efficient Ops
Efficient Ops
Mar 12, 2025 · Information Security

30 High-Risk Ports You Must Secure and How to Close Them

This guide lists 30 commonly exposed high‑risk ports such as LDAP, MySQL, and Docker, explains the security threats they pose, and provides practical firewall, service‑management, and port‑closing steps—including command‑line examples—to help you harden your systems against attacks.

System Hardeningfirewallhigh-risk ports
0 likes · 7 min read
30 High-Risk Ports You Must Secure and How to Close Them
Architects' Tech Alliance
Architects' Tech Alliance
Mar 3, 2025 · Industry Insights

Why Global Cyber Attacks Jumped 44% in 2025: Key Findings from Check Point’s Security Report

Check Point’s 2025 cybersecurity report, based on data from 170 countries, reveals a 44% surge in global attacks, rapid ransomware evolution, massive exploitation of edge devices, a 96% reuse of known vulnerabilities, and highlights urgent recommendations for CISOs to strengthen BYOD, patch management, and incident response.

BYODCISOIndustry Report
0 likes · 5 min read
Why Global Cyber Attacks Jumped 44% in 2025: Key Findings from Check Point’s Security Report
MaGe Linux Operations
MaGe Linux Operations
Feb 21, 2025 · Information Security

Master Linux iptables: From Basics to Advanced Firewall Rules

This comprehensive guide explains Linux's software firewall architecture, the relationship between iptables and netfilter, common use cases, hook functions, packet flow, rule composition, command syntax, matching options, extensions, best‑practice optimizations, and how to persist rules across reboots.

firewalliptablesnetfilter
0 likes · 26 min read
Master Linux iptables: From Basics to Advanced Firewall Rules
Open Source Linux
Open Source Linux
Feb 14, 2025 · Operations

Master firewalld: Essential Commands to Manage Linux Firewall Zones

This guide walks you through firewalld on CentOS 7, covering how to check status, start, restart, enable at boot, manage zones, configure ports, sources, and rich rules, and explains the impact of each command with practical examples for secure network administration.

firewalldnetwork securitysystemd
0 likes · 15 min read
Master firewalld: Essential Commands to Manage Linux Firewall Zones
BirdNest Tech Talk
BirdNest Tech Talk
Jan 31, 2025 · Information Security

Building a Go TCP Scanner to Discover Unauthenticated ClickHouse Services

This article walks through creating a Go‑based TCP SYN scanner to locate public IPs with port 9000 open, verifies whether they run ClickHouse without authentication, and shares the full code, command‑line steps, and scan results that reveal only a handful of vulnerable instances.

ClickHouseGoTCP scanning
0 likes · 16 min read
Building a Go TCP Scanner to Discover Unauthenticated ClickHouse Services
Python Programming Learning Circle
Python Programming Learning Circle
Jan 17, 2025 · Information Security

Python WiFi Password Cracking Tool Using pywifi

This article demonstrates how to build a Python GUI application that scans nearby Wi‑Fi networks, reads a password dictionary, and attempts to brute‑force Wi‑Fi credentials using the pywifi library, providing step‑by‑step code, environment setup, and execution results.

GUIPythonnetwork security
0 likes · 9 min read
Python WiFi Password Cracking Tool Using pywifi
AntTech
AntTech
Jan 6, 2025 · Artificial Intelligence

2024 Security and Trusted AI Research Highlights from Alibaba, Tsinghua, Zhejiang, and Partner Institutions

This article presents sixteen peer‑reviewed research papers published in top conferences and journals in 2024, covering trusted AI, large‑model applications, network security, adversarial training, deep‑fake detection, secure inference, and related topics from collaborations among Alibaba, Tsinghua, Zhejiang, and other leading institutions.

AI securitySecure InferenceTrusted AI
0 likes · 27 min read
2024 Security and Trusted AI Research Highlights from Alibaba, Tsinghua, Zhejiang, and Partner Institutions
Raymond Ops
Raymond Ops
Dec 17, 2024 · Information Security

Mastering firewalld vs iptables on CentOS 7: Zones, Rules, and Configuration

This guide explains the differences between firewalld and iptables on CentOS 7, introduces zone management, details iptables packet flow, tables, chains, and provides practical commands for installing, configuring, and managing firewall rules, including examples for SSH and ping traffic.

Linuxcentos7firewall
0 likes · 12 min read
Mastering firewalld vs iptables on CentOS 7: Zones, Rules, and Configuration
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2024 · Information Security

Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms

This guide explains how to use nmap scripts to discover SNMP weak passwords, demonstrates various exploitation commands, and provides step‑by‑step hardening procedures for Windows, Linux, AIX, Solaris, and Cisco devices, including community string changes, whitelist configuration, and service management.

SNMPnetwork securitynmap
0 likes · 6 min read
Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms
Liangxu Linux
Liangxu Linux
Oct 27, 2024 · Information Security

Unlocking the Secrets of Network Ports: Risks, Attacks, and Defense Strategies

This comprehensive guide explains what network ports are, categorizes well‑known, registered, and dynamic ports, demonstrates common scanning tools and commands, details typical hacker techniques such as SYN scans, buffer overflows, DoS attacks, and provides practical firewall, IDS, and authentication hardening measures for each vulnerable service.

network portsnetwork securityport scanning
0 likes · 31 min read
Unlocking the Secrets of Network Ports: Risks, Attacks, and Defense Strategies
Top Architect
Top Architect
Oct 26, 2024 · Information Security

WiFi Password Cracking Tool Using Python and PyWiFi

This article demonstrates how to build a Python GUI tool with Tkinter and the PyWiFi library to scan nearby Wi‑Fi networks, load a password dictionary, and perform brute‑force attempts to discover the correct Wi‑Fi password, including environment setup, code snippets, and execution results.

PythonTkinterWiFi
0 likes · 13 min read
WiFi Password Cracking Tool Using Python and PyWiFi
Liangxu Linux
Liangxu Linux
Oct 7, 2024 · Fundamentals

What’s the Real Difference Between Wi‑Fi and WLAN?

This article explains the distinct definitions, technical standards, security methods, coverage ranges, transmission speeds, and typical use cases of WLAN and Wi‑Fi, clarifying how Wi‑Fi is a specific standard within the broader WLAN ecosystem.

IEEE 802.11WLANWiFi
0 likes · 7 min read
What’s the Real Difference Between Wi‑Fi and WLAN?
Open Source Linux
Open Source Linux
Sep 26, 2024 · Information Security

Why Does a TCP Connection Send RST Packets? Deep Dive into Causes and Analysis

TCP RST packets, used to abruptly terminate or reject connections, appear at various stages—handshake, data transfer, and teardown—and can stem from server port closures, connection limits, malformed SYNs, firewall policies, timeouts, or middlebox interventions, with each scenario identifiable through detailed packet‑level analysis.

RSTTCPfirewall
0 likes · 9 min read
Why Does a TCP Connection Send RST Packets? Deep Dive into Causes and Analysis
Top Architect
Top Architect
Sep 14, 2024 · Information Security

Python WiFi Password Cracking GUI Tool Using pywifi and Tkinter

This article presents a step‑by‑step guide to creating a Python‑based Wi‑Fi password cracking GUI using the pywifi library and Tkinter, explains environment setup, code implementation, and usage, while also containing promotional material for related AI services and community groups.

PythonTkinterWiFi
0 likes · 14 min read
Python WiFi Password Cracking GUI Tool Using pywifi and Tkinter
Open Source Linux
Open Source Linux
Aug 14, 2024 · Information Security

Master Nmap: Step-by-Step Guide to Scanning Linux Ports

This guide explains how to use Nmap on Linux to perform simple, single‑port, full‑range, and custom port scans, interpret common port states, and understand typical service ports for effective network security testing.

Linuxnetwork securitynmap
0 likes · 7 min read
Master Nmap: Step-by-Step Guide to Scanning Linux Ports
Java Tech Enthusiast
Java Tech Enthusiast
Aug 11, 2024 · Information Security

Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod

Tencent Cloud DNSPod uncovered a massive May‑2024 campaign that hijacked home routers by altering their DNS settings to malicious IPs—using default credentials and firmware flaws—to redirect users to phishing or illegal sites, urging owners to check router DNS, reset devices, and change passwords.

DNS hijackingdig commandmalicious DNS
0 likes · 5 min read
Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod
Alibaba Cloud Observability
Alibaba Cloud Observability
Jul 31, 2024 · Information Security

Unlock DNS Log Insights: Detect Threats, Optimize Performance, and Master Cloud‑Native Auditing

This article explains how DNS logs serve as a foundation for network monitoring, security auditing, and performance troubleshooting, covering DNS parsing, record types, log‑audit integration with Alibaba Cloud SLS, practical query examples, and advanced analysis techniques for detecting anomalies and attacks.

Alibaba CloudDNSSLS
0 likes · 25 min read
Unlock DNS Log Insights: Detect Threats, Optimize Performance, and Master Cloud‑Native Auditing
MaGe Linux Operations
MaGe Linux Operations
Jul 30, 2024 · Information Security

Master Reverse SSH Tunneling: Access Behind Firewalls Easily

This guide explains what reverse SSH is, why it’s needed to reach machines behind restrictive firewalls, and provides step‑by‑step commands and configuration tips to set up a reliable reverse SSH tunnel for secure remote access.

Remote accessSSH tunnelingfirewall bypass
0 likes · 6 min read
Master Reverse SSH Tunneling: Access Behind Firewalls Easily
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Jun 24, 2024 · Information Security

How to Build a Secure OpenVPN Server on CentOS and Ubuntu

This guide walks you through installing Easy‑RSA, generating CA, server and client certificates, configuring OpenVPN, enabling IP forwarding, adjusting firewalls, and setting up client connections on Linux, macOS and Windows, providing a complete end‑to‑end VPN deployment solution.

CentOSEasy-RSAOpenVPN
0 likes · 21 min read
How to Build a Secure OpenVPN Server on CentOS and Ubuntu
Open Source Linux
Open Source Linux
May 23, 2024 · Information Security

Master Common Web & Network Attacks: SQL Injection, XSS, CSRF, DDoS & More

This article provides a comprehensive overview of prevalent web and network security threats—including SQL injection, XSS, CSRF, file‑upload flaws, DDoS, ARP/RARP spoofing, DNS attacks, routing protocols, TCP/UDP differences, HTTP nuances, cookies vs. sessions, and SSL/TLS—along with practical prevention techniques for each.

ARPCSRFDDoS
0 likes · 24 min read
Master Common Web & Network Attacks: SQL Injection, XSS, CSRF, DDoS & More
Java Tech Enthusiast
Java Tech Enthusiast
Apr 28, 2024 · Information Security

Unexpected Lateral Movement via Windows Delivery Optimization Service

A coworker noticed my computer generating large volumes of traffic on port 7680, prompting an investigation that revealed the svchost.exe process running the default Windows Delivery Optimization Service—intended for LAN‑based Windows Update—mimicking lateral‑movement behavior, which I stopped by disabling the feature.

Lateral MovementPort 7680Windows
0 likes · 4 min read
Unexpected Lateral Movement via Windows Delivery Optimization Service
Architects' Tech Alliance
Architects' Tech Alliance
Apr 4, 2024 · Fundamentals

Master Computer Networking Basics with 38 Comprehensive Mind Maps

This article compiles 38 detailed mind maps covering the entire computer networking curriculum—from the TCP/IP stack and transport protocols to routing, switching, VLANs, IPv6, and security technologies—providing a systematic visual guide for learners to quickly grasp and retain core concepts.

Computer NetworksIPv6Networking Fundamentals
0 likes · 7 min read
Master Computer Networking Basics with 38 Comprehensive Mind Maps
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2024 · Information Security

What Every Hacker Should Know: 27 Common Terms and Attack Techniques

This article provides a comprehensive glossary of 27 common hacking terms—from black‑hat and backdoor to zero‑day exploits and dark‑web concepts—explaining each technique, malware type, and security threat in clear, concise English for anyone interested in cybersecurity fundamentals.

APTExploitcybersecurity
0 likes · 18 min read
What Every Hacker Should Know: 27 Common Terms and Attack Techniques
MaGe Linux Operations
MaGe Linux Operations
Mar 19, 2024 · Information Security

Master Linux Firewalls: iptables, firewalld, and Netfilter Explained

This guide details Linux firewall components—including iptables, firewalld, and netfilter—explaining their coexistence, rule tables, chain structures, command syntax, and configuration files, while providing practical examples for managing zones, services, and packet filtering on RHEL/CentOS systems.

Linuxfirewallfirewalld
0 likes · 30 min read
Master Linux Firewalls: iptables, firewalld, and Netfilter Explained
Practical DevOps Architecture
Practical DevOps Architecture
Mar 14, 2024 · Information Security

Comprehensive Penetration Testing Course Outline

This article provides a detailed curriculum for a penetration testing training program, covering operating system basics, web services, database setup, Kali Linux installation, various hacking tools, common web vulnerabilities, SQL injection techniques, command execution, file upload and inclusion flaws, XSS, CSRF, SSRF, privilege escalation, and internal network exploitation.

ethical hackinginformation securitynetwork security
0 likes · 10 min read
Comprehensive Penetration Testing Course Outline
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2024 · Information Security

Mastering CentOS7 Firewall: firewalld vs iptables and Zone Management

This guide explains the coexistence of firewalld and iptables on CentOS 7, compares their features, details zone concepts, outlines iptables architecture, and provides step‑by‑step commands for installing, configuring, and managing firewall rules, including rule syntax and saving configurations.

centos7firewallfirewalld
0 likes · 16 min read
Mastering CentOS7 Firewall: firewalld vs iptables and Zone Management