Tag

Network Security

1 views collected around this technical thread.

Tencent Cloud Developer
Tencent Cloud Developer
May 20, 2025 · Cloud Computing

Efficient and Resilient Cloud Gateway at Scale: Architecture, Key Technologies, and Operational Practices of Tencent TGW

The article presents a comprehensive analysis of Tencent's TGW cloud gateway, detailing its modular architecture, high‑performance forwarding plane, lossless state migration, rapid fault recovery, multi‑level redundancy, operational best practices, and security mechanisms that enable ultra‑low latency and high availability for large‑scale internet services.

Network Securitycloud gatewayfault tolerance
0 likes · 13 min read
Efficient and Resilient Cloud Gateway at Scale: Architecture, Key Technologies, and Operational Practices of Tencent TGW
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Apr 16, 2025 · Information Security

Designing an Internet‑Facing Cloud Firewall: Architecture, Rules, and Future Plans

This article outlines the background, architectural design, implementation details, and future roadmap of an internet‑boundary cloud firewall built on DPDK, covering physical and software structures, traffic steering, rule matching logic, and planned enhancements such as logging and traffic analysis.

Access ControlDPDKNetwork Security
0 likes · 6 min read
Designing an Internet‑Facing Cloud Firewall: Architecture, Rules, and Future Plans
Python Programming Learning Circle
Python Programming Learning Circle
Mar 22, 2025 · Information Security

Python Script for WiFi Password Cracking with CLI and GUI Implementations

This article demonstrates how to use Python and the pywifi library to perform Wi‑Fi password brute‑forcing through both command‑line and graphical interfaces, explains script optimization, shows Tkinter‑based GUI versions, and discusses limitations such as the lack of multithreading.

CLIGUINetwork Security
0 likes · 15 min read
Python Script for WiFi Password Cracking with CLI and GUI Implementations
Python Programming Learning Circle
Python Programming Learning Circle
Mar 15, 2025 · Information Security

Python Script for Wi‑Fi Password Cracking with GUI Enhancements

This article demonstrates how to use Python and the pywifi library to perform Wi‑Fi password brute‑forcing, presents both command‑line and Tkinter‑based graphical implementations, explains script optimizations, and discusses limitations such as the lack of multithreading.

Brute ForceGUINetwork Security
0 likes · 13 min read
Python Script for Wi‑Fi Password Cracking with GUI Enhancements
Efficient Ops
Efficient Ops
Mar 12, 2025 · Information Security

30 High-Risk Ports You Must Secure and How to Close Them

This guide lists 30 commonly exposed high‑risk ports such as LDAP, MySQL, and Docker, explains the security threats they pose, and provides practical firewall, service‑management, and port‑closing steps—including command‑line examples—to help you harden your systems against attacks.

FirewallNetwork Securityhigh-risk ports
0 likes · 7 min read
30 High-Risk Ports You Must Secure and How to Close Them
DevOps Operations Practice
DevOps Operations Practice
Feb 23, 2025 · Information Security

Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies

This article explains what network attacks are, outlines the most common attack types such as malware, DoS/DDoS, phishing, SQL injection and DNS tunneling, and provides practical prevention measures including regular updates, firewall configuration, VPN use, and security awareness training.

DDoSNetwork SecurityPrevention
0 likes · 6 min read
Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies
Efficient Ops
Efficient Ops
Feb 9, 2025 · Fundamentals

Essential Networking Q&A: 100+ Key Concepts Every IT Professional Should Know

This comprehensive guide answers over one hundred fundamental networking questions, covering links, OSI layers, backbone networks, LAN, routers, protocols, security measures, cable standards, IP addressing, and many other core concepts essential for anyone working with computer networks.

Network SecurityOSI modelProtocols
0 likes · 32 min read
Essential Networking Q&A: 100+ Key Concepts Every IT Professional Should Know
Python Programming Learning Circle
Python Programming Learning Circle
Jan 17, 2025 · Information Security

Python WiFi Password Cracking Tool Using pywifi

This article demonstrates how to build a Python GUI application that scans nearby Wi‑Fi networks, reads a password dictionary, and attempts to brute‑force Wi‑Fi credentials using the pywifi library, providing step‑by‑step code, environment setup, and execution results.

GUINetwork SecurityPython
0 likes · 9 min read
Python WiFi Password Cracking Tool Using pywifi
AntTech
AntTech
Jan 6, 2025 · Artificial Intelligence

2024 Security and Trusted AI Research Highlights from Alibaba, Tsinghua, Zhejiang, and Partner Institutions

This article presents sixteen peer‑reviewed research papers published in top conferences and journals in 2024, covering trusted AI, large‑model applications, network security, adversarial training, deep‑fake detection, secure inference, and related topics from collaborations among Alibaba, Tsinghua, Zhejiang, and other leading institutions.

Deepfake DetectionLarge ModelsNetwork Security
0 likes · 27 min read
2024 Security and Trusted AI Research Highlights from Alibaba, Tsinghua, Zhejiang, and Partner Institutions
Deepin Linux
Deepin Linux
Nov 13, 2024 · Information Security

Understanding Netfilter and iptables: Architecture, Hook Mechanism, and Configuration in Linux

This article provides a comprehensive overview of Linux's Netfilter framework and its iptables user‑space tool, explaining their hook‑based architecture, core data structures, rule tables and chains, common configuration commands, practical use cases, and both strengths and limitations for network security.

FirewallIptablesKernel
0 likes · 35 min read
Understanding Netfilter and iptables: Architecture, Hook Mechanism, and Configuration in Linux
Top Architect
Top Architect
Oct 26, 2024 · Information Security

WiFi Password Cracking Tool Using Python and PyWiFi

This article demonstrates how to build a Python GUI tool with Tkinter and the PyWiFi library to scan nearby Wi‑Fi networks, load a password dictionary, and perform brute‑force attempts to discover the correct Wi‑Fi password, including environment setup, code snippets, and execution results.

Network SecurityPassword CrackingPython
0 likes · 13 min read
WiFi Password Cracking Tool Using Python and PyWiFi
Top Architect
Top Architect
Sep 14, 2024 · Information Security

Python WiFi Password Cracking GUI Tool Using pywifi and Tkinter

This article presents a step‑by‑step guide to creating a Python‑based Wi‑Fi password cracking GUI using the pywifi library and Tkinter, explains environment setup, code implementation, and usage, while also containing promotional material for related AI services and community groups.

Network SecurityPassword CrackingPython
0 likes · 14 min read
Python WiFi Password Cracking GUI Tool Using pywifi and Tkinter
Java Tech Enthusiast
Java Tech Enthusiast
Aug 11, 2024 · Information Security

Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod

Tencent Cloud DNSPod uncovered a massive May‑2024 campaign that hijacked home routers by altering their DNS settings to malicious IPs—using default credentials and firmware flaws—to redirect users to phishing or illegal sites, urging owners to check router DNS, reset devices, and change passwords.

DNS hijackingNetwork Securitydig command
0 likes · 5 min read
Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod
DevOps Operations Practice
DevOps Operations Practice
Jul 14, 2024 · Information Security

Introduction to iptables: Concepts, Commands, and Practical Use Cases

This article introduces iptables, explains its core concepts such as chains, rules, and tables, demonstrates common command‑line operations for displaying, adding, deleting and modifying rules, and presents a real‑world firewall configuration example for securing jump‑servers on CentOS.

Command LineFirewallIptables
0 likes · 9 min read
Introduction to iptables: Concepts, Commands, and Practical Use Cases
Java Tech Enthusiast
Java Tech Enthusiast
Jul 14, 2024 · Information Security

Wireshark Filtering Guide: Display and Capture Filters

Wireshark, the open‑source network protocol analyzer, lets users capture traffic and then refine what they see using two distinct filter types—display filters applied after capture and capture filters applied during capture—each with its own syntax, common examples (IP, port, protocol) and advanced expressions to isolate relevant packets.

Capture FiltersDisplay FiltersNetwork Security
0 likes · 14 min read
Wireshark Filtering Guide: Display and Capture Filters
DevOps Operations Practice
DevOps Operations Practice
Jun 18, 2024 · Information Security

Common Types of VPN and Their Characteristics

This article explains VPN technology and outlines four common VPN types—IPSec, SSL/TLS, PPTP, and L2TP/IPSec—detailing their modes, advantages, and security considerations for remote access and site‑to‑site networking, and also compares ease of deployment versus security risks, helping readers choose the appropriate solution for their network environment.

IPSecL2TPNetwork Security
0 likes · 4 min read
Common Types of VPN and Their Characteristics
Efficient Ops
Efficient Ops
May 13, 2024 · Information Security

Mastering iptables: How Tables, Chains, and NAT Shape Linux Firewall Rules

This article explains the fundamentals of iptables, detailing how rules, tables, and chains work together to filter packets, the role of NAT, and provides practical command examples for configuring Linux firewalls effectively.

IptablesLinux firewallNAT
0 likes · 10 min read
Mastering iptables: How Tables, Chains, and NAT Shape Linux Firewall Rules
Java Tech Enthusiast
Java Tech Enthusiast
Apr 28, 2024 · Information Security

Unexpected Lateral Movement via Windows Delivery Optimization Service

A coworker noticed my computer generating large volumes of traffic on port 7680, prompting an investigation that revealed the svchost.exe process running the default Windows Delivery Optimization Service—intended for LAN‑based Windows Update—mimicking lateral‑movement behavior, which I stopped by disabling the feature.

Lateral MovementNetwork SecurityPort 7680
0 likes · 4 min read
Unexpected Lateral Movement via Windows Delivery Optimization Service
Practical DevOps Architecture
Practical DevOps Architecture
Mar 14, 2024 · Information Security

Comprehensive Penetration Testing Course Outline

This article provides a detailed curriculum for a penetration testing training program, covering operating system basics, web services, database setup, Kali Linux installation, various hacking tools, common web vulnerabilities, SQL injection techniques, command execution, file upload and inclusion flaws, XSS, CSRF, SSRF, privilege escalation, and internal network exploitation.

Information SecurityNetwork SecurityVulnerability Analysis
0 likes · 10 min read
Comprehensive Penetration Testing Course Outline
Tencent Cloud Developer
Tencent Cloud Developer
Jan 23, 2024 · Information Security

Metis: Understanding and Enhancing In-Network Regular Expressions

Metis combines deterministic finite automata conversion, byte‑level RNN training, and knowledge‑distilled random‑forest models to replace traditional regex matching on resource‑constrained network devices, delivering comparable accuracy while achieving up to 74× higher throughput and significant resource savings in DDoS protection and P4 forwarding.

Anomaly DetectionIn-Network ComputingNetwork Security
0 likes · 9 min read
Metis: Understanding and Enhancing In-Network Regular Expressions