Tagged articles
358 articles
Page 2 of 4
Liangxu Linux
Liangxu Linux
Feb 27, 2024 · Information Security

Understanding SSH: How Secure Shell Works and Why It Matters

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP by encrypting data, authenticating users, and supporting key exchange, with default port 22, various authentication methods, and tools such as PuTTY and OpenSSH for secure remote access.

OpenSSHPuttySSH
0 likes · 9 min read
Understanding SSH: How Secure Shell Works and Why It Matters
Tencent Cloud Developer
Tencent Cloud Developer
Jan 23, 2024 · Information Security

Metis: Understanding and Enhancing In-Network Regular Expressions

Metis combines deterministic finite automata conversion, byte‑level RNN training, and knowledge‑distilled random‑forest models to replace traditional regex matching on resource‑constrained network devices, delivering comparable accuracy while achieving up to 74× higher throughput and significant resource savings in DDoS protection and P4 forwarding.

In‑network computingNeurIPS 2023P4 Programmable Switches
0 likes · 9 min read
Metis: Understanding and Enhancing In-Network Regular Expressions
Java Tech Enthusiast
Java Tech Enthusiast
Jan 21, 2024 · Information Security

Security Risks of Exposing Your Public IP Address

Exposing your public IP address can invite DDoS floods, vulnerability scanning, privacy breaches, and targeted phishing or malware attacks, so you should protect it with firewalls, regular updates, secure VPN connections, and by avoiding public disclosure on social platforms.

DDoSPublic IPfirewall
0 likes · 3 min read
Security Risks of Exposing Your Public IP Address
Tencent Architect
Tencent Architect
Jan 16, 2024 · Artificial Intelligence

Metis: AI‑Driven In‑Network Regular Expression Enhancement for High‑Performance Traffic Inspection

The article introduces Metis, an AI‑based solution that replaces traditional regular‑expression matching for network traffic inspection, offering faster, more accurate detection, a compact model deployable on resource‑constrained P4 switches, and significant performance and cost benefits for cloud gateway security.

AIP4knowledge distillation
0 likes · 9 min read
Metis: AI‑Driven In‑Network Regular Expression Enhancement for High‑Performance Traffic Inspection
Liangxu Linux
Liangxu Linux
Dec 26, 2023 · Fundamentals

Unlocking the Secrets of Computer Networks: From Physical Links to Application Layers

This comprehensive guide walks through computer networking fundamentals, covering basic concepts, the OSI/TCP‑IP layers, addressing, routing protocols, transport mechanisms, application services, security techniques, wireless LAN technologies, and essential command‑line tools, all illustrated with clear diagrams and examples.

Computer NetworksTCP/IPWireless LAN
0 likes · 66 min read
Unlocking the Secrets of Computer Networks: From Physical Links to Application Layers
360 Quality & Efficiency
360 Quality & Efficiency
Dec 22, 2023 · Information Security

Testing Methods for Windows Filtering Platform (WFP) Network Drivers

This article explains the principles of the Windows Filtering Platform, outlines functional, compatibility, performance, and security testing techniques for WFP‑based network drivers, and presents a case study on diagnosing throughput issues using filter isolation tools.

WFPWindows Filtering Platformdriver performance
0 likes · 8 min read
Testing Methods for Windows Filtering Platform (WFP) Network Drivers
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Dec 13, 2023 · Information Security

XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation

XiaoHongShu’s award‑winning Zero‑Trust SASE Office Security Solution integrates all‑in‑one DLP, anti‑virus, identity‑bound access and distributed POPs to replace fragmented agents, delivering real‑time risk control, data‑non‑landing protection, multi‑level disaster recovery, and achieving 100% device coverage, an 80% reduction in data leakage and a 70% internal NPS after one year.

Office SecuritySASESecurity Architecture
0 likes · 14 min read
XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation
AntTech
AntTech
Dec 1, 2023 · Information Security

Highlights of the 20th China Information and Communication Security Conference (CCICS 2023)

The 20th China Information and Communication Security Conference (CCICS 2023) held on December 1 in Beijing gathered leading academicians and industry experts to discuss emerging security challenges in 5G, AI, privacy computing, large‑model systems, and presented Ant Group’s innovative security parallel‑slice framework for modern digital enterprises.

5Gconferencenetwork security
0 likes · 6 min read
Highlights of the 20th China Information and Communication Security Conference (CCICS 2023)
Open Source Linux
Open Source Linux
Nov 10, 2023 · Information Security

Understanding SSH: Ports, Workflow, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step process of establishing a secure connection, the role of symmetric and asymmetric encryption, and how password and public‑key authentication work with tools like PuTTY and OpenSSH.

AuthenticationOpenSSHPutty
0 likes · 8 min read
Understanding SSH: Ports, Workflow, and Key Authentication Explained
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Nov 6, 2023 · Information Security

What Is China’s Cybersecurity Grading System and How Did It Evolve to 2.0?

This article provides a comprehensive overview of China’s cybersecurity grading (等级保护) system, covering its legal foundations, the transition to the 2.0 framework, the core standards, organizational responsibilities, classification procedures, filing requirements, and ongoing supervision.

2.0 frameworkChinaGrade Protection
0 likes · 12 min read
What Is China’s Cybersecurity Grading System and How Did It Evolve to 2.0?
Java Architect Essentials
Java Architect Essentials
Nov 5, 2023 · Information Security

Quark and NetEase CC Platforms Fined for Violating Network Ecology and Content Safety Regulations

The Chinese authorities fined the Quark platform 500,000 yuan and ordered NetEase CC to suspend updates to its dance section for seven days after finding massive pornographic content, illegal keywords, and severe breaches of network security laws, prompting both platforms to pledge comprehensive remediation and stricter content controls.

ChinaPlatform Enforcementcontent moderation
0 likes · 5 min read
Quark and NetEase CC Platforms Fined for Violating Network Ecology and Content Safety Regulations
vivo Internet Technology
vivo Internet Technology
Oct 31, 2023 · Information Security

Network Port Security: Risks, Attack Methods, and Governance Practices

Network port security demands continuous discovery, automated vulnerability scanning, traffic‑baseline anomaly detection, and disciplined governance—including source authentication, first‑packet drop, and lifecycle management—to mitigate DDoS, application‑layer, and exploitation attacks while ensuring minimal‑privilege openings and timely closure.

CC AttackDDoSVulnerability Management
0 likes · 25 min read
Network Port Security: Risks, Attack Methods, and Governance Practices
Liangxu Linux
Liangxu Linux
Oct 25, 2023 · Information Security

How to Bypass CDN and Discover a Website’s Real IP Address

This guide explains why penetration testers need a target’s true IP, how to detect CDN usage, and provides step‑by‑step techniques—including same‑country queries, sub‑domain probing, DNS history checks, FOFA searches, email reverse lookup, and full‑network scanning—to uncover the real server address.

CDNIP discoveryInformation Gathering
0 likes · 7 min read
How to Bypass CDN and Discover a Website’s Real IP Address
Laravel Tech Community
Laravel Tech Community
Oct 24, 2023 · Information Security

Configuring Firewalld on CentOS to Restrict Access to Specific Ports and IP Addresses

This article explains what Firewalld is, outlines its key features such as zones, runtime versus permanent settings, services, and dynamic updates, and provides step‑by‑step commands to create firewall rules that limit access to an Nginx server on port 8088 to a single IP address while leaving other ports unrestricted.

CentOSLinuxfirewall
0 likes · 8 min read
Configuring Firewalld on CentOS to Restrict Access to Specific Ports and IP Addresses
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

How XDP Is Redefining Network Performance Beyond Traditional Stacks

This article examines XDP (eXpress Data Path), a Linux kernel eBPF‑based technology that pushes packet processing to the earliest point in the network interface, delivering ultra‑low latency, enhanced security, and flexible custom processing for high‑performance routing, DDoS mitigation, and cloud environments.

Cloud NativeLinux kernelXDP
0 likes · 5 min read
How XDP Is Redefining Network Performance Beyond Traditional Stacks
ZhongAn Tech Team
ZhongAn Tech Team
Oct 9, 2023 · Information Security

Network Security Communication: Principles, Protocols, and Implementation in the ZA App

This article explains the fundamentals of symmetric and asymmetric encryption, one‑way and trapdoor functions, forward secrecy, TLS handshake, and how the ZA financial app applies a multi‑layered secure communication protocol—including certificate verification, replay protection, payload encryption, and request signing—to achieve robust, high‑performance network security across iOS, Android, and web platforms.

TLSasymmetric cryptographydigital certificates
0 likes · 21 min read
Network Security Communication: Principles, Protocols, and Implementation in the ZA App
Liangxu Linux
Liangxu Linux
Sep 26, 2023 · Information Security

Top 5 Wireshark Alternatives for Network Analysis and Security

This guide reviews five popular packet‑capture tools—Savvius Omnipeek, Ettercap, Kismet, SmartSniff, and EtherApe—detailing their features, platform support, licensing, and unique capabilities to help network engineers choose the right solution for traffic monitoring and security analysis.

Packet CaptureTool comparisonWireshark alternatives
0 likes · 7 min read
Top 5 Wireshark Alternatives for Network Analysis and Security
Liangxu Linux
Liangxu Linux
Sep 21, 2023 · Operations

How to Build a Simple Website Firewall with iptables on Linux

This step‑by‑step guide shows how to install iptables, clear existing rules, set default DROP policies, allow established connections and loopback traffic, block a specific IP from accessing port 80, save the configuration, and verify that the firewall works as intended.

LinuxSysadminfirewall
0 likes · 5 min read
How to Build a Simple Website Firewall with iptables on Linux
dbaplus Community
dbaplus Community
Sep 18, 2023 · Information Security

Why Chrome Is Moving to HTTPS‑First: What It Means for Web Security

Chrome’s latest experiment aims to automatically upgrade all HTTP requests to HTTPS, detailing current HTTPS adoption rates, the new HTTPS‑First mode’s automatic upgrades, unsafe download warnings, phased rollout plans, and how users can enable the feature now for a more secure browsing experience.

BrowserChromeHTTPS
0 likes · 5 min read
Why Chrome Is Moving to HTTPS‑First: What It Means for Web Security
Wukong Talks Architecture
Wukong Talks Architecture
Sep 18, 2023 · Information Security

Understanding Forward Proxy: Principles, Use Cases, and Nginx Configuration

This article explains the concept and practical applications of forward proxy, outlines its benefits for enterprise network security and access control, compares it with reverse proxy, and provides detailed Nginx configuration examples—including how to expose the client’s real IP—along with common tools and real‑world scenarios.

VPNforward proxynetwork security
0 likes · 12 min read
Understanding Forward Proxy: Principles, Use Cases, and Nginx Configuration
Software Development Quality
Software Development Quality
Jun 13, 2023 · Information Security

How to Perform Anonymous Online Port Scans with Scanless

This guide introduces Scanless, a Python‑based tool that leverages third‑party online scanners to conduct anonymous port scans, explains how to install it via Git and pip, demonstrates command‑line usage and Docker support, and lists the supported scanning services.

DockerPythonanonymous scanning
0 likes · 3 min read
How to Perform Anonymous Online Port Scans with Scanless
DaTaobao Tech
DaTaobao Tech
Jun 7, 2023 · Backend Development

Taobao Open Platform Gateway Architecture Evolution

Taobao’s open platform gateway has evolved into a modular, decentralized system that uses full asynchronous processing, multi‑cluster deployment, token‑based authentication, and advanced metadata caching to boost scalability, security, and performance while protecting privacy and enabling efficient large‑scale reporting.

DecentralizationMetadata CachingPerformance Optimization
0 likes · 8 min read
Taobao Open Platform Gateway Architecture Evolution
AI Cyberspace
AI Cyberspace
May 27, 2023 · Information Security

Mastering SSL/TLS: From CIAA Security Model to OpenSSL CA Setup

This comprehensive guide explains the CIAA security model for network transmission, details confidentiality, integrity, authentication, and availability, and walks through building a private CA with OpenSSL, configuring TLS 1.2/1.3, HTTPS authentication modes, SNI/ESNI extensions, and upgrading curl for HTTP/2 support.

CertificateOpenSSLPKI
0 likes · 51 min read
Mastering SSL/TLS: From CIAA Security Model to OpenSSL CA Setup
Test Development Learning Exchange
Test Development Learning Exchange
May 20, 2023 · Information Security

Build a Simple Python Port Scanner: Step‑by‑Step Guide

This article explains how to create a Python‑based network port scanner that probes a target host, uses sockets and multithreading to detect open TCP ports, and provides clear usage instructions, sample code, and optional enhancements for faster or more comprehensive scanning.

Argument ParsingPort ScannerPython
0 likes · 9 min read
Build a Simple Python Port Scanner: Step‑by‑Step Guide
Open Source Linux
Open Source Linux
May 16, 2023 · Information Security

Mastering Linux Firewalls: From IDS/IPS to iptables and Netfilter

This comprehensive guide explains intrusion detection and prevention systems, firewalls, waterwalls, Netfilter, and essential Linux firewall tools such as iptables, firewalld, and nftables, covering their architectures, command syntax, rule management, NAT, and packet capture with tcpdump.

IDSIPSLinux
0 likes · 24 min read
Mastering Linux Firewalls: From IDS/IPS to iptables and Netfilter
Open Source Linux
Open Source Linux
Apr 28, 2023 · Information Security

Understanding Firewalls: Types, Operation, and Choosing the Right One

This article explains what firewalls are, how they inspect network traffic, the various deployment and operational types—including hardware, software, cloud, packet‑filtering, stateful, proxy, and next‑generation firewalls—and their respective advantages and disadvantages.

cloud firewallfirewallhardware firewall
0 likes · 14 min read
Understanding Firewalls: Types, Operation, and Choosing the Right One
Liangxu Linux
Liangxu Linux
Mar 26, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Professional Should Know

This article reviews the ten most popular vulnerability scanning tools—including OpenVAS, Tripwire IP360, Nessus, and others—detailing their key features, scanning capabilities, deployment options, and typical use cases to help security professionals choose the right solution for network and application vulnerability assessment.

OpenVASnessusnetwork security
0 likes · 10 min read
Top 10 Vulnerability Scanners Every Security Professional Should Know
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Mar 16, 2023 · Industry Insights

How Xiaohongshu Secured a Top Spot in Shanghai’s “Panshi” Cybersecurity Drill

On March 10, Shanghai’s telecom and internet regulators held a summary conference for the 2022 “Panshi Action” cyber‑attack‑defense drill, where Xiaohongshu ranked third among 123 defending teams, earning awards for excellence and progress while showcasing its incident‑response and traceability capabilities.

ShanghaiXiaohongshuattack-defense drill
0 likes · 4 min read
How Xiaohongshu Secured a Top Spot in Shanghai’s “Panshi” Cybersecurity Drill
DeWu Technology
DeWu Technology
Mar 14, 2023 · Industry Insights

What Shanghai’s “Panshi Action” Cyber Drill Reveals About Industry Security

The 2022 Shanghai "Panshi Action" cybersecurity drill, organized by multiple municipal regulators, brought together 30 top security teams to test the defenses of 123 telecom and internet firms, resulting in awards, policy insights, and a call for stronger collaborative security measures across the city’s digital ecosystem.

Panshi ActionShanghaicybersecurity
0 likes · 5 min read
What Shanghai’s “Panshi Action” Cyber Drill Reveals About Industry Security
MaGe Linux Operations
MaGe Linux Operations
Mar 12, 2023 · Information Security

164 Real Network Security Interview Questions to Ace Your Tech Interview

This article compiles two extensive collections of network security interview questions—93 and 71 items respectively—covering topics such as SQL injection, XSS, CSRF, DDoS, protocol fundamentals, cloud security, penetration tools, and incident response, providing a comprehensive resource for anyone preparing for a security engineering role.

InfoSeccybersecurityinterview-questions
0 likes · 14 min read
164 Real Network Security Interview Questions to Ace Your Tech Interview
MaGe Linux Operations
MaGe Linux Operations
Mar 5, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Team Needs

This guide reviews the ten leading vulnerability scanning solutions, detailing each tool's key features, deployment options, and how they help organizations detect and remediate security weaknesses across networks, servers, cloud and container environments.

information securitynetwork securityopen source
0 likes · 7 min read
Top 10 Vulnerability Scanners Every Security Team Needs
Liangxu Linux
Liangxu Linux
Feb 27, 2023 · Operations

How to Open and Manage Linux Ports with firewalld and iptables

This guide walks you through enabling firewall services, adding permanent ports, and reloading rules on CentOS 7 using firewalld, as well as editing iptables files and restarting the firewall on CentOS 6, complete with command examples and common pitfalls.

CentOSLinuxfirewalld
0 likes · 4 min read
How to Open and Manage Linux Ports with firewalld and iptables
MaGe Linux Operations
MaGe Linux Operations
Dec 29, 2022 · Fundamentals

Essential Networking Fundamentals: 100 Key Concepts Explained

This article provides concise explanations for over 100 fundamental networking questions, covering topics such as link types, OSI layers, protocols, IP addressing, network devices, topologies, security measures, and configuration tools, offering a quick reference for students and professionals seeking a solid networking foundation.

IP addressingNetworkingOSI model
0 likes · 31 min read
Essential Networking Fundamentals: 100 Key Concepts Explained
MaGe Linux Operations
MaGe Linux Operations
Dec 26, 2022 · Information Security

Master Linux Connection Tracking and iptables: Complete Guide

This article explains Linux connection tracking (conntrack), its implementation in Netfilter, and provides detailed instructions for using iptables—including rule queries, additions, deletions, modifications, saving, loading, match extensions, custom chains, and logging—to manage firewall behavior and network security effectively.

Linuxconntrackfirewall
0 likes · 31 min read
Master Linux Connection Tracking and iptables: Complete Guide
Practical DevOps Architecture
Practical DevOps Architecture
Dec 26, 2022 · Information Security

Understanding iptables: Tables, Chains, and NAT Operations

This article provides a comprehensive overview of iptables, detailing its host‑type filter table, limitations, the four main tables (filter, nat, mangle, raw), their respective chains, common command examples, and explains NAT concepts such as SNAT, DNAT, and MASQUERADE for Linux network security.

LinuxNATfirewall
0 likes · 6 min read
Understanding iptables: Tables, Chains, and NAT Operations
UCloud Tech
UCloud Tech
Dec 8, 2022 · Information Security

How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies

This article examines a recent 1.2 Tbps DDoS assault on a major UCloud client, detailing the attack timeline, mixed flood and connection‑exhaustion techniques, geographic and device source distribution, and UCloud’s comprehensive mitigation strategies and best‑practice recommendations for robust information security.

Cloud ProtectionDDoSIoT security
0 likes · 7 min read
How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Nov 16, 2022 · Fundamentals

Essential Networking Concepts: From OSI Model to VPN and Beyond

This comprehensive guide covers fundamental networking topics such as links, OSI layers, backbone networks, LANs, routers, protocols, IP addressing, security measures, cable types, and various network topologies, providing clear explanations for each concept.

Network ProtocolsTCP/IPnetwork security
0 likes · 31 min read
Essential Networking Concepts: From OSI Model to VPN and Beyond
Liangxu Linux
Liangxu Linux
Nov 6, 2022 · Information Security

How to Open and Manage Linux Firewall Ports on CentOS 6/7

This guide explains step‑by‑step how to check firewall status, enable firewalld, open specific ports, reload or restart the firewall, and modify iptables on CentOS 6 and 7, including useful commands and common pitfalls.

CentOSLinuxfirewalld
0 likes · 4 min read
How to Open and Manage Linux Firewall Ports on CentOS 6/7
Laravel Tech Community
Laravel Tech Community
Nov 6, 2022 · Information Security

Implementing Rate Limiting with iptables hashlimit Module

This article explains how to use the iptables hashlimit module to create a stateful rate‑limiting chain, details the required commands, clarifies the meaning of the --hashlimit‑upto and --hashlimit‑burst parameters, and provides an example illustrating credit‑based packet acceptance.

Linuxfirewallhashlimit
0 likes · 4 min read
Implementing Rate Limiting with iptables hashlimit Module
Bilibili Tech
Bilibili Tech
Nov 4, 2022 · Information Security

Analysis of Sliver C2 Tool Traffic Features and Detection Rules for Snort/Suricata

The paper systematically analyzes the Sliver C2 framework’s HTTP and HTTPS traffic, detailing URL, cookie, and parameter patterns as well as JA3/JA3S TLS fingerprints, and presents validated Snort and Suricata rules that reliably detect Sliver beacons while highlighting evasion challenges and broader applicability to emerging malware tools.

C2 detectionJA3Snort
0 likes · 17 min read
Analysis of Sliver C2 Tool Traffic Features and Detection Rules for Snort/Suricata
Open Source Linux
Open Source Linux
Oct 9, 2022 · Information Security

What Is a DDoS Attack? Understanding Types, Motives, and Trends

This article explains the fundamentals of Distributed Denial of Service attacks, covering their definition, key characteristics, common motivations, classification by technique and protocol layer, current attack statistics, target industries, and emerging trends shaping the future of DDoS threats.

Cyber AttacksDDoSDistributed Denial of Service
0 likes · 14 min read
What Is a DDoS Attack? Understanding Types, Motives, and Trends
MaGe Linux Operations
MaGe Linux Operations
Sep 27, 2022 · Information Security

Understanding Network Security: Threats, Encryption, and Defense Mechanisms

This article provides a comprehensive overview of network security, covering passive and active threats, cryptographic models, digital signatures, authentication methods, key distribution, firewalls, and intrusion detection systems, highlighting essential concepts and practical defenses.

Firewallscryptographydigital signatures
0 likes · 14 min read
Understanding Network Security: Threats, Encryption, and Defense Mechanisms
DaTaobao Tech
DaTaobao Tech
Sep 27, 2022 · Information Security

Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes

This article examines the inherent security flaws of plain HTTP, proposes four solution approaches, and explains why the fourth—combining digital certificates, asymmetric and symmetric encryption—forms the basis of HTTPS, then details TLS 1.2 handshake steps, cryptographic primitives, and practical implementation considerations.

HTTPSTLSTLS Handshake
0 likes · 21 min read
Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes
Liangxu Linux
Liangxu Linux
Sep 22, 2022 · Information Security

Comparing Top Open-Source Linux Firewalls: Features & Use Cases

An overview of essential Linux firewall solutions—including iptables, IPCop, Shorewall, UFW, Vuurmuur, pfSense, IPFire, Smoothwall, Endian, and ConfigServer—covers their core functions, key features, and typical use cases, helping administrators choose the right tool for network protection.

Linuxfirewalliptables
0 likes · 9 min read
Comparing Top Open-Source Linux Firewalls: Features & Use Cases
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Detailed HTTPS Handshake Analysis Using Wireshark

This article explains the HTTPS protocol, its security advantages over HTTP, and provides a step‑by‑step Wireshark packet capture and analysis of a test website, covering TCP three‑way handshake, TLS ClientHello/ServerHello, certificate verification, key exchange, and encrypted data transmission.

HTTPSTLSTLS Handshake
0 likes · 15 min read
Detailed HTTPS Handshake Analysis Using Wireshark
Liangxu Linux
Liangxu Linux
Sep 4, 2022 · Information Security

Restrict Host and Docker Ports to a Specific IP Using iptables

This guide shows how to use iptables to allow only a designated IP address to access a host's port 80, how to apply the same restriction to Docker containers by adding rules to the DOCKER-USER chain, and how to make the settings persistent across reboots.

DockerLinuxfirewall
0 likes · 3 min read
Restrict Host and Docker Ports to a Specific IP Using iptables
Ziru Technology
Ziru Technology
Aug 5, 2022 · Information Security

Why Network Security Incident Response Matters: Strategies, Plans, and Real‑World Cases

This article outlines the current state of network security in China, the government's strong emphasis on it, the legal framework, the necessity of incident response, detailed emergency‑response procedures, Ziru's own security program, and three illustrative case studies including Log4j2, a 2021 drill, and a FastJson vulnerability.

Case Studycybersecurityemergency planning
0 likes · 11 min read
Why Network Security Incident Response Matters: Strategies, Plans, and Real‑World Cases
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2022 · Information Security

Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques

This comprehensive FAQ explains key information‑security concepts, covering white‑hat hacking, IP vs MAC addresses, common penetration‑testing tools, hacker types, footprinting methods, brute‑force, DoS, SQL injection, sniffing, ARP spoofing, MAC flooding, rogue DHCP, XSS, Burp Suite, pharming, defacement, website protection, keyloggers, enumeration, NTP, MIB, password‑cracking techniques, attack stages, and CSRF mitigation.

cybersecurityhackinginformation security
0 likes · 10 min read
Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques
Laravel Tech Community
Laravel Tech Community
Jun 20, 2022 · Information Security

Understanding iptables: Structure, Tables, Chains, Rules, and Practical Configuration

This article provides a comprehensive guide to iptables, explaining its hierarchical structure of tables, chains, and rules, detailing the built‑in tables (filter, nat, mangle, raw) and their chains, describing rule syntax and target actions, and offering practical command examples for listing, flushing, saving, setting default policies, and configuring SSH, HTTP, NAT, and IP‑based restrictions.

LinuxNATfirewall
0 likes · 17 min read
Understanding iptables: Structure, Tables, Chains, Rules, and Practical Configuration
Architects' Tech Alliance
Architects' Tech Alliance
Jun 10, 2022 · Information Security

Understanding Firewalls: Principles, Architecture, and Functions

This article explains what a firewall is, how it isolates risk zones from safe zones, its working principles, the typical architecture involving screening routers and proxy servers, and the key security functions it provides for protecting network communications.

access controlfirewallinformation security
0 likes · 6 min read
Understanding Firewalls: Principles, Architecture, and Functions
MaGe Linux Operations
MaGe Linux Operations
Jun 8, 2022 · Information Security

164 Must‑Know Network Security Interview Questions (Full List)

This article provides two comprehensive collections of network security interview questions, totaling 164 real‑world questions that cover fundamentals such as SQL injection, XSS, CSRF, protocol basics, cryptography, penetration testing techniques, and incident response, helping candidates prepare effectively for technical interviews and increase their chances of landing high‑pay offers.

cybersecurityinformation securityinterview-questions
0 likes · 14 min read
164 Must‑Know Network Security Interview Questions (Full List)
AntTech
AntTech
Jun 6, 2022 · Information Security

Five Years of China’s Cybersecurity Law: Achievements, Challenges, and Ant Group’s Technical Innovations

The article reviews the five‑year impact of China’s Cybersecurity Law, highlights progress in legal‑driven security governance, and details Ant Group’s advanced network and data security architectures, privacy‑preserving computing techniques, and collaborative recommendations for tackling emerging cyber threats.

Ant GroupChinaCybersecurity Law
0 likes · 7 min read
Five Years of China’s Cybersecurity Law: Achievements, Challenges, and Ant Group’s Technical Innovations
Top Architect
Top Architect
May 30, 2022 · Information Security

Implementing Transparent Encrypted Communication with mTLS Using Nginx and OpenSSL

This article explains how to secure cross‑data‑center traffic by applying TLS principles, setting up a private Certificate Authority, generating self‑signed certificates with OpenSSL, configuring mutual TLS (mTLS) on Nginx proxies for both HTTP and TCP streams, and verifying the setup with curl and redis‑cli commands.

Certificate AuthorityNGINXOpenSSL
0 likes · 24 min read
Implementing Transparent Encrypted Communication with mTLS Using Nginx and OpenSSL
Java Backend Technology
Java Backend Technology
May 28, 2022 · Artificial Intelligence

5 Mind-Blowing Open-Source Projects That Let You Control Faces, Erase Spiders, and Hack Wi-Fi

This article showcases five cutting‑edge open‑source projects—from a ROS‑based system that lets a gamepad animate facial muscles, to AI‑driven video inpainting, text‑to‑image generation, eye‑gaze computer control, and a comprehensive Wi‑Fi cracking toolkit—each pushing the boundaries of modern tech.

AIComputer VisionRobotics
0 likes · 6 min read
5 Mind-Blowing Open-Source Projects That Let You Control Faces, Erase Spiders, and Hack Wi-Fi
21CTO
21CTO
Apr 30, 2022 · Information Security

How Zero Trust Architecture Redefines Enterprise Security

This article explains the zero‑trust security model, its dynamic trust evaluation, common SDP components, three implementation approaches (application‑layer proxy, traffic‑layer proxy, hybrid), deployment scenarios for office, remote and data‑center environments, and practical steps for successful adoption.

Dynamic AuthenticationSDPZero Trust
0 likes · 14 min read
How Zero Trust Architecture Redefines Enterprise Security
Top Architect
Top Architect
Apr 28, 2022 · Information Security

SSL VPN Technology Overview and Configuration Guide

This article provides a comprehensive overview of SSL VPN technology, covering its encryption principles, limitations of IPSec, virtual gateway functions, web proxy, file sharing, port forwarding, network expansion modes, endpoint security checks, certificate‑based authentication methods, typical application scenarios, and step‑by‑step configuration procedures.

AuthenticationEndpoint SecuritySSL VPN
0 likes · 9 min read
SSL VPN Technology Overview and Configuration Guide
58 Tech
58 Tech
Apr 28, 2022 · Information Security

Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System

The article presents a comprehensive case study of the Magic Butler system—a zero‑trust security management solution developed by 58 Group’s TEG department—detailing its business drivers, design principles, architecture, key technical features, deployment scale, and future outlook for enterprise network security.

Endpoint ManagementZero Trustaccess control
0 likes · 14 min read
Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System
Programmer DD
Programmer DD
Apr 23, 2022 · Information Security

How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step handshake process—including connection establishment, version and algorithm negotiation, key exchange, and user authentication methods—while also describing common clients like PuTTY and OpenSSH and the role of symmetric and asymmetric encryption.

AuthenticationOpenSSHPutty
0 likes · 11 min read
How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained
Architecture Digest
Architecture Digest
Apr 23, 2022 · Information Security

SSL VPN Technology Overview and Configuration Guide

This article provides a comprehensive overview of SSL VPN technology, detailing its advantages over IPSec, core functions such as virtual gateways, web proxy, file sharing, port forwarding, network extension, endpoint security, logging, authentication methods, typical application scenarios, and step‑by‑step configuration procedures.

AuthenticationEndpoint SecuritySSL VPN
0 likes · 9 min read
SSL VPN Technology Overview and Configuration Guide
IT Architects Alliance
IT Architects Alliance
Apr 19, 2022 · Information Security

How Zero Trust Redefines Enterprise Security: Architecture, Implementation, and Real‑World Practices

This article provides a comprehensive analysis of Zero Trust security, explaining its core principles, SDP‑based architecture, various implementation models—including user‑to‑resource and service‑to‑service schemes—deployment options, practical use cases, and guidance for successful enterprise adoption.

SDPZero Trustaccess control
0 likes · 16 min read
How Zero Trust Redefines Enterprise Security: Architecture, Implementation, and Real‑World Practices
Top Architect
Top Architect
Apr 18, 2022 · Information Security

Zero Trust Architecture: Concepts, Implementation Schemes, Deployment Practices, and Practical Experience

This article provides a comprehensive overview of zero‑trust security, explaining its core principles, architectural models such as SDP, various implementation approaches (application‑layer proxy, traffic‑layer proxy, hybrid), deployment patterns for office and multi‑branch environments, practical rollout experience, and how zero‑trust integrates with existing security products.

SDPSecurity DeploymentZero Trust
0 likes · 15 min read
Zero Trust Architecture: Concepts, Implementation Schemes, Deployment Practices, and Practical Experience
IT Services Circle
IT Services Circle
Apr 10, 2022 · Information Security

Building a Simple Python Port Scanner in 20 Lines

This tutorial explains how to create a lightweight Python port scanner using only standard libraries, covering required imports, command‑line host input, a full‑range port loop with socket connections, result handling, and runtime measurement, all within a concise 20‑line script.

Pythonnetwork securityport scanning
0 likes · 4 min read
Building a Simple Python Port Scanner in 20 Lines
MaGe Linux Operations
MaGe Linux Operations
Feb 13, 2022 · Information Security

Unlock Secure Remote LANs with Tailscale and WireGuard

This article introduces Tailscale, a WireGuard‑based virtual networking tool, explains its key security features, shows how to install and configure it on various platforms, and outlines practical use cases such as file transfer, remote development, and network proxying.

Remote accessTailscaleVPN
0 likes · 11 min read
Unlock Secure Remote LANs with Tailscale and WireGuard
Cloud Native Technology Community
Cloud Native Technology Community
Jan 26, 2022 · Cloud Native

Unlocking Edge Cloud: Kube-OVN’s Security Groups, VIP, Live Migration & Smart NIC Offload

This article details how the Kube-OVN community extended the CNI for edge cloud scenarios by adding security‑group based access control, high‑availability virtual IP support, live‑migration‑friendly networking, and smart‑NIC hardware offload, including implementation steps, CRD designs, and relevant pull‑request references.

CNIEdge ComputingKube-OVN
0 likes · 10 min read
Unlocking Edge Cloud: Kube-OVN’s Security Groups, VIP, Live Migration & Smart NIC Offload
Cloud Native Technology Community
Cloud Native Technology Community
Jan 24, 2022 · Cloud Native

Building a Unified Cross‑Cluster Network Plane with Kube‑OVN for TiDB Deployment

The article explains how Kube‑OVN can create a flexible, efficient, and secure cross‑Kubernetes‑cluster network plane to meet user demands such as high availability, multi‑cloud separation, disaster‑recovery, and hybrid‑cloud compliance, and demonstrates its use with TiDB, MySQL, and WordPress workloads.

Cloud NativeCross-Cluster NetworkingKube-OVN
0 likes · 8 min read
Building a Unified Cross‑Cluster Network Plane with Kube‑OVN for TiDB Deployment
Tencent Cloud Developer
Tencent Cloud Developer
Nov 29, 2021 · Information Security

DNSPod's GM DoH: China's First DNS over HTTPS with National Cryptographic Algorithms

DNSPod’s GM DoH, the first Chinese DNS‑over‑HTTPS service to employ national SM2 cryptographic algorithms and certificates, upgrades the traditional TLS handshake by encrypting the pre‑master secret with SM2 keys, thereby filling a critical gap in China’s secure networking infrastructure and enhancing national network security.

DNS InfrastructureDNS over HTTPSDNSPod
0 likes · 8 min read
DNSPod's GM DoH: China's First DNS over HTTPS with National Cryptographic Algorithms
Architects' Tech Alliance
Architects' Tech Alliance
Nov 25, 2021 · Information Security

Future Network Architecture: Precise Connection, Compute Network, and Inherent Security

This article examines the evolving requirements of future networks, proposing a precise‑connection architecture, flexible plug‑in forwarding, compute‑network integration, and inherent security mechanisms to support diverse quality‑of‑service demands across layers, while outlining control‑plane and data‑plane designs for scalable deployment.

Compute Networkarchitectural designfuture network
0 likes · 11 min read
Future Network Architecture: Precise Connection, Compute Network, and Inherent Security
Liangxu Linux
Liangxu Linux
Nov 21, 2021 · Operations

Enforcing Per‑IP Rate Limiting on a TCP Port with iptables

This guide explains how to protect a shared development TCP port—used as a sidecar proxy for a Unix Domain Socket—by applying per‑IP rate limiting with iptables' hashlimit module, including full command examples, parameter details, and practical calculations.

iptablesnetwork securitysocat
0 likes · 6 min read
Enforcing Per‑IP Rate Limiting on a TCP Port with iptables