Tagged articles
358 articles
Page 3 of 4
Architects' Tech Alliance
Architects' Tech Alliance
Nov 13, 2021 · Information Security

Understanding Firewalls: Definition, Principles, Architecture, and Functions

This article explains firewalls by defining their purpose, describing how they monitor and filter network traffic, outlining their architecture—including screening routers and proxy servers—and listing their key security functions such as access control, traffic filtering, logging, and attack detection.

access controlfirewallinformation security
0 likes · 7 min read
Understanding Firewalls: Definition, Principles, Architecture, and Functions
Douyu Streaming
Douyu Streaming
Oct 29, 2021 · Information Security

Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security

This article explains the security risks of early Internet protocols, the evolution of SSL/TLS and DTLS, fundamental cryptographic concepts such as symmetric and asymmetric encryption, hashing, MACs, digital signatures, AES modes and padding, and how these technologies are applied in TLS handshakes, DTLS, and WebRTC.

AESDTLSSSL
0 likes · 27 min read
Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security
Selected Java Interview Questions
Selected Java Interview Questions
Oct 13, 2021 · Information Security

Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication

This article explains the fundamentals of the HTTP protocol, illustrates how plain‑text communication enables man‑in‑the‑middle attacks, and describes how symmetric and asymmetric encryption, SSL/TLS handshakes, and CA certificate chains are used in HTTPS to secure web traffic.

HTTPHTTPSMan-in-the-Middle
0 likes · 8 min read
Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication
Architects' Tech Alliance
Architects' Tech Alliance
Oct 11, 2021 · Information Security

How AI‑Powered Firewalls Outperform Traditional NGFWs in Detecting Advanced Threats

The article examines why conventional next‑generation firewalls (NGFW) struggle with sophisticated, unknown attacks, and explains how Huawei’s AI firewall leverages cloud‑trained and on‑premise unsupervised learning models, dedicated hardware, and encrypted‑traffic analysis to automatically detect and mitigate advanced threats across the attack chain.

AI firewallNGFWThreat Detection
0 likes · 9 min read
How AI‑Powered Firewalls Outperform Traditional NGFWs in Detecting Advanced Threats
Architects' Tech Alliance
Architects' Tech Alliance
Sep 26, 2021 · Fundamentals

IPv6 Evolution for Government External Networks: Benefits, Challenges, and Technical Overview

The article explains how IPv6 addresses the address shortage, security, and scalability challenges of government external networks, outlines IPv6 advantages such as abundant address space, extensibility, and higher security, and describes the emerging IPv6+ ecosystem with SRv6, network slicing, and AI-driven operations.

Address ExhaustionIPv6IPv6+
0 likes · 12 min read
IPv6 Evolution for Government External Networks: Benefits, Challenges, and Technical Overview
Liangxu Linux
Liangxu Linux
Sep 20, 2021 · Information Security

Mastering iptables: Tables, Chains, Rules and Practical Commands

This guide explains the architecture of iptables—including tables, chains and rules—covers common targets, shows how to list, flush, persist and modify rules, and provides complete examples for SSH, HTTP, NAT port forwarding and source‑IP restrictions on Linux firewalls.

LinuxNATfirewall
0 likes · 16 min read
Mastering iptables: Tables, Chains, Rules and Practical Commands
MaGe Linux Operations
MaGe Linux Operations
Sep 9, 2021 · Information Security

Can You Crack WiFi Passwords with Python? A Step‑by‑Step Guide

This tutorial walks through building both command‑line and Tkinter‑based Python tools that scan nearby Wi‑Fi networks, read password dictionaries, and perform brute‑force attacks using the pywifi library, while also showing how to package the script as an executable and discussing potential multithreading improvements.

PythonTkinterWiFi
0 likes · 14 min read
Can You Crack WiFi Passwords with Python? A Step‑by‑Step Guide
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Aug 24, 2021 · Information Security

How NetEase Cloud IM SDK Prevents DNS Hijacking with HttpDNS High‑Availability

This article explains the DNS hijacking threat, shares a real incident affecting NetEase Cloud IM, and details a comprehensive high‑availability architecture—including HttpDNS, laddered HTTP requests, caching strategies, and SNI handling—that protects the SDK from DNS attacks and ensures reliable service.

CacheDNS hijackingHTTPDNS
0 likes · 13 min read
How NetEase Cloud IM SDK Prevents DNS Hijacking with HttpDNS High‑Availability
Ops Development Stories
Ops Development Stories
Aug 18, 2021 · Information Security

How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy

This guide demonstrates how to use Python's Scapy library to extract IP addresses from PCAP files, sniff usernames and passwords from mail traffic, discover live hosts via SYN packets, launch MAC address table flooding attacks, and conduct ARP spoofing for man‑in‑the‑middle attacks, providing complete code examples.

ARP spoofingMAC FloodMITM
0 likes · 7 min read
How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy
Architects' Tech Alliance
Architects' Tech Alliance
Jul 30, 2021 · Fundamentals

White-Box Switches: Development, Architecture, and Future Trends

The article provides a comprehensive overview of white‑box switches, covering their rapid evolution over the past three decades, open‑source ecosystems, hardware‑software decoupling, programmable networking, hardware acceleration, security challenges, and emerging trends shaping future network architectures.

Network ProgrammabilityOpen NetworkingSDN
0 likes · 13 min read
White-Box Switches: Development, Architecture, and Future Trends
Byte Quality Assurance Team
Byte Quality Assurance Team
Jul 28, 2021 · Information Security

Understanding iptables: Chains, Tables, Rules, and Common Commands

This article provides a comprehensive guide to iptables, covering its underlying netfilter architecture, the five built‑in chains and tables, rule syntax, common match and target options, and practical command examples for adding, deleting, querying, and managing firewall rules on Linux systems.

Linuxcommand-linefirewall
0 likes · 15 min read
Understanding iptables: Chains, Tables, Rules, and Common Commands
Python Crawling & Data Mining
Python Crawling & Data Mining
Jul 28, 2021 · Information Security

Essential Network Security Tools: A Comprehensive Beginner's Guide

This article presents a curated list of network security utilities—including anti‑malware, scanners, encryption, IDS, port scanners, exploit frameworks, monitoring, proxies, wireless, rootkit detectors, and packet sniffers—each with brief descriptions and download links for aspiring security practitioners.

intrusion detectionnetwork securitypacket sniffing
0 likes · 17 min read
Essential Network Security Tools: A Comprehensive Beginner's Guide
Architects' Tech Alliance
Architects' Tech Alliance
Jul 12, 2021 · Industry Insights

How AI and Automation Are Shaping the Next Network Era – Key Insights

The 2020 Global Network Trends Report analyzes how large‑scale automation, intent‑based networking, AI‑driven assurance, multi‑cloud connectivity, wireless evolution, and shifting security roles are reshaping enterprise networks, highlighting adoption statistics, technical challenges, and strategic recommendations for IT leaders.

AI AssuranceIntent-based NetworkingMulti-Cloud Networking
0 likes · 14 min read
How AI and Automation Are Shaping the Next Network Era – Key Insights
Baidu Geek Talk
Baidu Geek Talk
Jun 23, 2021 · Information Security

Black-Gray Industry Attack Detection Based on Community Encoding Using Graph Embedding

The paper introduces a community‑encoding, GraphSAGE‑based detection framework that embeds whole user‑account, IP, device, and phone‑number graphs—both homogeneous and heterogeneous—to identify previously unseen black‑gray industry attacks, achieving about 95% IP‑risk accuracy via an asynchronous near‑real‑time system, though computational and automation challenges persist.

GraphSAGEblack-gray-industrycommunity-detection
0 likes · 12 min read
Black-Gray Industry Attack Detection Based on Community Encoding Using Graph Embedding
MaGe Linux Operations
MaGe Linux Operations
Jun 8, 2021 · Fundamentals

Essential Networking Q&A: From OSI Layers to VPN and Beyond

This article provides concise explanations of core networking concepts, covering everything from basic link definitions, OSI model layers, and backbone networks to LANs, nodes, routers, point‑to‑point links, FTP, subnet masks, UTP cable limits, data encapsulation, network topologies, VPN, NAT, TCP/IP layers, routing protocols, security measures, and many other fundamental topics essential for understanding computer networks.

NetworkingOSI modelProtocols
0 likes · 31 min read
Essential Networking Q&A: From OSI Layers to VPN and Beyond
Efficient Ops
Efficient Ops
May 24, 2021 · Information Security

Mastering Full‑Traffic Analysis for Security Drills in Mid‑Size Enterprises

This article explains how mid‑size enterprises can inventory their network assets, understand complex zone structures, and apply full‑traffic network analysis and tracing techniques—such as SPAN, tunneling, and real‑time monitoring—to improve the effectiveness of security drills.

NTATraffic analysisfull traffic monitoring
0 likes · 11 min read
Mastering Full‑Traffic Analysis for Security Drills in Mid‑Size Enterprises
macrozheng
macrozheng
May 15, 2021 · Information Security

Can Your Company Spy on WeChat Chats? Protocol Analysis Reveals the Truth

This article examines whether a company can monitor WeChat conversations on its network by dissecting the web and mobile versions' protocols, demonstrating how tools like Fiddler and Wireshark can decrypt web chats while mobile traffic remains secure through private protocols and embedded server keys.

FiddlerMMTLSTLS
0 likes · 9 min read
Can Your Company Spy on WeChat Chats? Protocol Analysis Reveals the Truth
Liangxu Linux
Liangxu Linux
May 5, 2021 · Information Security

Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM

This guide reviews the most frequent TCP/IP attacks—including IP spoofing, SYN flooding, UDP flooding, TCP reset hijacking, man‑in‑the‑middle, and DDoS—explains their underlying protocols, demonstrates practical exploitation with Python/Scapy and Netcat, and outlines mitigation techniques and cryptographic fundamentals.

DDoSMITMPython
0 likes · 27 min read
Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM
21CTO
21CTO
Apr 26, 2021 · Information Security

Remembering Dan Kaminsky: The Hacker Who Secured the Internet

The article commemorates Dan Kaminsky, the renowned information‑security researcher who uncovered the critical DNS vulnerability in 2008, outlines his career, explains the impact of his discovery and coordinated patch, and dispels rumors surrounding his death.

DNS vulnerabilityDan Kaminskyinformation security
0 likes · 5 min read
Remembering Dan Kaminsky: The Hacker Who Secured the Internet
dbaplus Community
dbaplus Community
Apr 25, 2021 · Information Security

Essential MySQL Security Practices: From Storage to Data Encryption

Learn comprehensive MySQL security strategies covering storage RAID configurations, network whitelisting, OS hardening, account management, privilege restrictions, audit logging, regular backups, data encryption, and disaster recovery to protect enterprise data against breaches and ensure stable, high‑performance operations.

BackupDatabase Securityaccess control
0 likes · 13 min read
Essential MySQL Security Practices: From Storage to Data Encryption
Open Source Linux
Open Source Linux
Apr 25, 2021 · Information Security

Understanding Remote-Control Trojans: Concepts, Deployment, Communication, and APT Threats

This comprehensive guide explains remote‑control trojans—covering their basic concepts, classifications, infection methods, communication techniques, typical functionalities, their role in APT attacks, and practical detection strategies—providing security professionals with essential knowledge to defend against these sophisticated threats.

APTRemote accessmalware analysis
0 likes · 24 min read
Understanding Remote-Control Trojans: Concepts, Deployment, Communication, and APT Threats
Efficient Ops
Efficient Ops
Apr 12, 2021 · Information Security

Understanding TCP/IP Layers and Common Network Attacks: ARP, DoS, DNS

This article explains how increasing network attacks exploit vulnerabilities across TCP/IP layers, detailing ARP spoofing, DoS techniques, and DNS hijacking, while outlining detection methods and defensive measures to protect information security.

ARP AttackDNS AttackDoS attack
0 likes · 9 min read
Understanding TCP/IP Layers and Common Network Attacks: ARP, DoS, DNS
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAHTTPHTTPS
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
Tencent Cloud Developer
Tencent Cloud Developer
Mar 29, 2021 · Information Security

What Is Zero Trust? Benefits, Technologies, and Deployment Guide

This article explains the Zero Trust security model, its advantages over traditional perimeter defenses, core technologies such as SDP, IAM, and micro‑segmentation, implementation principles, essential components, real‑world deployment scenarios, future trends, and Tencent's practical contributions to the industry.

IAMSDPZero Trust
0 likes · 16 min read
What Is Zero Trust? Benefits, Technologies, and Deployment Guide
Sohu Tech Products
Sohu Tech Products
Jan 20, 2021 · Artificial Intelligence

Graph Algorithm Design and Optimization for Detecting Black‑Market Users in Virtual Networks

This article presents a comprehensive study on using graph representation learning, particularly GraphSAGE and its optimizations, to identify and mitigate black‑market accounts in virtual networks, covering background, algorithm design, handling isolated nodes and heterogeneity, and evaluation results.

GraphSAGEblack market detectiongraph algorithms
0 likes · 13 min read
Graph Algorithm Design and Optimization for Detecting Black‑Market Users in Virtual Networks
Open Source Tech Hub
Open Source Tech Hub
Jan 17, 2021 · Fundamentals

Master Secure Copy (scp): Syntax, Options, and Real-World Examples

This guide explains how the scp command works as a secure copy tool built on SSH, covering its basic syntax, three main copy scenarios, essential options for encryption, compression, bandwidth control, and practical examples for transferring files and directories between local and remote hosts.

linux commandnetwork securityscp
0 likes · 8 min read
Master Secure Copy (scp): Syntax, Options, and Real-World Examples
Java Interview Crash Guide
Java Interview Crash Guide
Jan 1, 2021 · Information Security

How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, details the role of Certificate Authorities, illustrates the handshake process, and clarifies common misconceptions about its safety and vulnerability to packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks
ITPUB
ITPUB
Dec 14, 2020 · Information Security

Master SSH: Remote Login, Port Forwarding, and Secure Tunneling Explained

This guide introduces SSH, explains its encryption-based login mechanism, demonstrates common commands for remote access, local and remote port forwarding, dynamic tunneling, and highlights security risks such as man‑in‑the‑middle attacks, providing practical examples for Linux environments.

LinuxRemote LoginSSH
0 likes · 13 min read
Master SSH: Remote Login, Port Forwarding, and Secure Tunneling Explained
Huolala Tech
Huolala Tech
Dec 14, 2020 · Information Security

Passive OS Fingerprinting: Detect Humans vs Bots with SYN Header Analysis

This article explains a passive method that captures SYN packet IP headers in user space, extracts OS‑specific features to build a fingerprint database, and uses the results to improve human‑machine detection while discussing implementation details on Linux kernels and typical network architectures.

LinuxOS fingerprintingSYN packet
0 likes · 5 min read
Passive OS Fingerprinting: Detect Humans vs Bots with SYN Header Analysis
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 8, 2020 · Information Security

Understanding HTTPS: How Secure Communication Is Achieved Over HTTP

This article explains why plain HTTP is insecure, outlines the four fundamental principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and digital signatures to establish confidentiality, integrity, authentication, and non-repudiation for web traffic.

HTTPSTLSdigital certificate
0 likes · 13 min read
Understanding HTTPS: How Secure Communication Is Achieved Over HTTP
Top Architect
Top Architect
Dec 1, 2020 · Information Security

SSH Overview: Concepts, Basic Commands, Port Forwarding, and Remote Operations

This article introduces SSH, explains its encryption-based login mechanism, demonstrates basic command syntax, shows practical examples of remote login, local/remote/dynamic port forwarding, remote command execution, and discusses common security concerns such as man‑in‑the‑middle attacks.

LinuxRemote LoginSSH
0 likes · 13 min read
SSH Overview: Concepts, Basic Commands, Port Forwarding, and Remote Operations
JD Cloud Developers
JD Cloud Developers
Nov 13, 2020 · Information Security

How to Secure Major Events: Offensive & Defensive Strategies Revealed

This article presents the complete PPT from Zhu Yanyong’s CSDN live session, detailing offensive and defensive practices for ensuring network security during large‑scale events, covering threat modeling, DDoS mitigation, WAF deployment, incident response, and post‑event analysis.

CSDNSecurity Operationsmajor events
0 likes · 3 min read
How to Secure Major Events: Offensive & Defensive Strategies Revealed
Liangxu Linux
Liangxu Linux
Oct 19, 2020 · Information Security

Exploiting Linux’s DelayedACKLost Counter to Infer TCP Sequence Numbers

An imaginative tale reveals how two covert agents exploit the Linux kernel’s DelayedACKLost counter via /proc/net/netstat, using it to infer TCP sequence numbers and perform a side‑channel hijack, while illustrating the underlying delayed ACK mechanism, related kernel functions, and the security implications of this hidden metric.

Delayed ACKKernelLinux
0 likes · 8 min read
Exploiting Linux’s DelayedACKLost Counter to Infer TCP Sequence Numbers
Tencent Cloud Developer
Tencent Cloud Developer
Oct 12, 2020 · Information Security

Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions

The article explains DDoS attack fundamentals, illustrates escalating real‑world incidents and their mitigation, and compares Tencent Cloud’s free, high‑defense package, and high‑defense IP solutions, guiding readers on selecting appropriate protection based on attack history, bandwidth needs, and budget constraints.

Case StudyCloud ProtectionDDoS
0 likes · 9 min read
Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions
Python Crawling & Data Mining
Python Crawling & Data Mining
Oct 6, 2020 · Information Security

How to Reveal Hidden Wi‑Fi Networks Using Python and Scapy

Learn to uncover concealed Wi‑Fi networks by capturing router signals with a wireless adapter, using Ubuntu’s airodump-ng and Python’s Scapy library to monitor packets, identify hidden SSIDs, and display them when a client connects, complete with step‑by‑step setup and screenshots.

PythonScapyUbuntu
0 likes · 6 min read
How to Reveal Hidden Wi‑Fi Networks Using Python and Scapy
Liangxu Linux
Liangxu Linux
Sep 20, 2020 · Operations

Mastering SSH: Remote Login, Port Forwarding, and Advanced Usage

This guide explains what SSH is, its login mechanism, basic command syntax, and demonstrates remote login, local and remote port forwarding, dynamic forwarding, and common SSH operations with practical examples and troubleshooting tips for Linux environments.

LinuxRemote LoginSSH
0 likes · 14 min read
Mastering SSH: Remote Login, Port Forwarding, and Advanced Usage
DataFunTalk
DataFunTalk
Sep 15, 2020 · Information Security

Optimizing Regular Expression Engines for High‑Performance Deep Packet Inspection

This article presents a series of algorithmic innovations—including efficient NFA construction, reduced epsilon‑transitions, prefix/suffix optimizations, fast NFA‑to‑DFA conversion, space‑compressed automata, hybrid finite automata, and large‑scale regex matching techniques—designed to improve regular‑expression matching speed and memory usage in deep packet inspection systems.

Algorithm OptimizationDFANFA
0 likes · 27 min read
Optimizing Regular Expression Engines for High‑Performance Deep Packet Inspection
Liangxu Linux
Liangxu Linux
Aug 26, 2020 · Information Security

Can the US Shut Down .cn Domains? Inside DNS Root Servers and Their Defenses

The article explains how the DNS system works, why there are only 13 logical root servers, how anycast and global mirrors keep the system resilient, and evaluates the realistic risk of a nation‑state like the United States tampering with root zone data, especially for Chinese .cn domains.

AnycastDNSICANN
0 likes · 22 min read
Can the US Shut Down .cn Domains? Inside DNS Root Servers and Their Defenses
21CTO
21CTO
Aug 23, 2020 · Fundamentals

Can the US Really Shut Down .cn Sites? Inside DNS Root Server Mechanics

This article explains how DNS works, why there are only 13 logical root servers, how root mirrors and anycast keep the system resilient, the historical control of root zones, and why the United States cannot easily block Chinese domains despite its dominance in root server ownership.

AnycastDNSDomain Name System
0 likes · 21 min read
Can the US Really Shut Down .cn Sites? Inside DNS Root Server Mechanics
ITPUB
ITPUB
Aug 22, 2020 · Fundamentals

Can the US Pull the Plug on .cn Domains? A Deep Dive into DNS Root Servers

The article explains how DNS works, why there are only 13 logical root servers, how anycast and mirror servers provide resilience, recounts historical cases of domain shutdowns, examines US control over root zones, and discusses mitigation strategies for protecting national domains.

AnycastDNSInternet Governance
0 likes · 24 min read
Can the US Pull the Plug on .cn Domains? A Deep Dive into DNS Root Servers
Programmer DD
Programmer DD
Jul 3, 2020 · Information Security

Why HTTPS Matters: Understanding Symmetric & Asymmetric Encryption

This article explains why HTTPS is essential, compares symmetric and asymmetric encryption, illustrates how encryption keys are securely exchanged, and outlines the three core reasons HTTPS reliably protects data from eavesdropping and man‑in‑the‑middle attacks.

HTTPSTLSencryption
0 likes · 5 min read
Why HTTPS Matters: Understanding Symmetric & Asymmetric Encryption
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying cryptographic processes—including certificate verification, asymmetric and symmetric encryption, and the role of Certificate Authorities—while also addressing common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security Mechanisms of HTTPS
TAL Education Technology
TAL Education Technology
Jun 4, 2020 · Information Security

Data Security Governance: Motivation, Technical Objectives, Classification, and Management Practices

The article explains why data security governance is essential for rapidly growing businesses, outlines technical goals across the data lifecycle, describes data classification and labeling methods, and details approval processes, network security zones, and management controls to protect data throughout its lifecycle.

classificationdata securitygovernance
0 likes · 10 min read
Data Security Governance: Motivation, Technical Objectives, Classification, and Management Practices
Open Source Linux
Open Source Linux
May 14, 2020 · Information Security

Master iptables: Essential Command Syntax and Practical Examples

This article breaks down the fundamental iptables command syntax, explains each option and parameter, provides practical examples for adding, inserting, listing, deleting, and managing firewall rules, and covers common modules, backup, and restoration techniques for effective Linux network security.

LinuxNATSNAT
0 likes · 13 min read
Master iptables: Essential Command Syntax and Practical Examples
Open Source Linux
Open Source Linux
May 13, 2020 · Information Security

Mastering iptables: A Beginner’s Guide to Linux Firewall Configuration

This article introduces iptables, explains its tables, chains, and packet‑processing flow, and provides step‑by‑step commands for installing and configuring the Linux firewall, offering a solid foundation for anyone new to network security on Linux systems.

Linux firewallSystem Administrationiptables
0 likes · 6 min read
Mastering iptables: A Beginner’s Guide to Linux Firewall Configuration
ITPUB
ITPUB
Mar 27, 2020 · Information Security

Was GitHub Hacked? Inside the Suspected MITM Attack on GitHub

In late March, users in China reported errors accessing GitHub Pages and the main site, prompting investigations that suggest a possible man‑in‑the‑middle attack affecting GitHub’s services, with evidence such as a suspicious certificate issued to a QQ email, network hijacking on port 443, and similar disruptions across major Chinese ISPs, while the issue resolved by mid‑afternoon.

ChinaCyberattackGitHub
0 likes · 5 min read
Was GitHub Hacked? Inside the Suspected MITM Attack on GitHub
ITPUB
ITPUB
Mar 26, 2020 · Information Security

How to Quickly Identify Open Ports on Linux Using Nmap, Netcat, and Bash

This guide explains multiple practical methods for discovering which ports are open on a Linux system, covering Nmap scans, Netcat probing, and Bash pseudo‑device checks, complete with command examples, option details, and output interpretation.

BashLinuxnetcat
0 likes · 8 min read
How to Quickly Identify Open Ports on Linux Using Nmap, Netcat, and Bash
Efficient Ops
Efficient Ops
Feb 3, 2020 · Information Security

Mastering Linux iptables: From Theory to Real-World Service Mesh Deployments

This article explains the fundamentals of Linux iptables—including its role with netfilter, rule ordering, tables and chains—then walks through packet‑processing flows and three practical scenarios such as Envoy traffic hijacking, massive long‑connection handling, and bastion‑host security.

LinuxMicroservicesService Mesh
0 likes · 16 min read
Mastering Linux iptables: From Theory to Real-World Service Mesh Deployments
Architects' Tech Alliance
Architects' Tech Alliance
Nov 25, 2019 · Cloud Computing

Key Capabilities and Emerging Trends of Multi‑Cloud and Hybrid Cloud Management

The article explains why enterprises adopt multi‑cloud strategies, outlines essential multi‑cloud management functions, discusses cloud‑network collaboration and security measures, and highlights future trends such as deep cloud‑network integration, data‑layer unification, consistent management, and edge‑cloud adoption.

Cloud Managementcloud trendshybrid cloud
0 likes · 10 min read
Key Capabilities and Emerging Trends of Multi‑Cloud and Hybrid Cloud Management
Architects Research Society
Architects Research Society
Nov 10, 2019 · Cloud Computing

Understanding Azure Virtual Networks (VNet): Concepts, Best Practices, and Connectivity Options

Azure Virtual Network (VNet) is a private network in Azure that provides scalable, isolated address spaces, subnets, and region or subscription scopes, with best‑practice design guidelines, internet connectivity, inter‑resource communication, on‑premises integration via VPN or ExpressRoute, traffic filtering, routing options, and quota limits.

AzureVNetVirtual Network
0 likes · 10 min read
Understanding Azure Virtual Networks (VNet): Concepts, Best Practices, and Connectivity Options
Python Programming Learning Circle
Python Programming Learning Circle
Nov 3, 2019 · Fundamentals

From Packet Switching to a Global Threat: Leonard Kleinrock’s 50‑Year Internet Reflection

On the internet’s 50th anniversary, UCLA professor Leonard Kleinrock recounts the pioneering packet‑switching breakthrough, the first ARPANET transmission, and warns that the original open, ethical ethos has been eclipsed by commercialization, security threats, and the urgent need for collective responsibility.

ARPANETInternet HistoryKleinrock
0 likes · 8 min read
From Packet Switching to a Global Threat: Leonard Kleinrock’s 50‑Year Internet Reflection
MaGe Linux Operations
MaGe Linux Operations
Sep 9, 2019 · Information Security

Demystifying HTTPS: How Secure HTTP Protects Your Data

This article explains what HTTPS is, why it adds encryption to HTTP, how SSL/TLS, symmetric and asymmetric cryptography, certificates, and handshakes work together to ensure confidentiality, integrity, and authenticity, and discusses the performance impact of HTTPS connections.

HTTPSTLScertificates
0 likes · 11 min read
Demystifying HTTPS: How Secure HTTP Protects Your Data
360 Tech Engineering
360 Tech Engineering
Aug 19, 2019 · Information Security

Highlights of the 7th Internet Security Conference: Global Collaboration and Emerging Cybersecurity Challenges

The 7th Internet Security Conference in Beijing gathered international experts to discuss the merging of cyberspace and physical space, the heightened impact of 5G and industrial IoT on cyber attacks, and collaborative strategies among China, Israel, Russia, and Singapore to build a comprehensive security ecosystem.

5GInternational Cooperationconference
0 likes · 8 min read
Highlights of the 7th Internet Security Conference: Global Collaboration and Emerging Cybersecurity Challenges
Architects Research Society
Architects Research Society
Aug 15, 2019 · Information Security

Understanding IDS, IPS, and UTM: Differences and Deployment Considerations

The article explains the fundamental differences between intrusion detection systems (IDS), intrusion prevention systems (IPS), and unified threat management (UTM) devices, covering their detection methods, placement strategies, operational trade‑offs, and maintenance requirements to help security professionals choose and manage the appropriate solution.

IDSIPSUTM
0 likes · 9 min read
Understanding IDS, IPS, and UTM: Differences and Deployment Considerations
HomeTech
HomeTech
Jul 31, 2019 · Information Security

Enterprise Intrusion Detection System Architecture and Feature Overview

This document outlines the background, challenges, and a comprehensive enterprise intrusion detection solution that combines host‑based and network‑based monitoring, automated CVE and GitHub leak collection, a modular agent‑middle‑display architecture, and future plans for multi‑dimensional threat modeling to enhance preventive security capabilities.

CVE collectionSOCasset visualization
0 likes · 10 min read
Enterprise Intrusion Detection System Architecture and Feature Overview
macrozheng
macrozheng
Jun 6, 2019 · Operations

Master Linux Firewall: firewalld and iptables Commands Explained

This guide walks you through using Linux's two main firewall tools—firewalld for CentOS 7+ and iptables for older versions—covering installation, service control, rule management, port handling, and useful commands with clear examples and screenshots.

Linuxfirewalldiptables
0 likes · 4 min read
Master Linux Firewall: firewalld and iptables Commands Explained
Tencent Cloud Developer
Tencent Cloud Developer
May 10, 2019 · Information Security

Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies

The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.

DDoSTCP reflectiondefense algorithm
0 likes · 10 min read
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies
Liangxu Linux
Liangxu Linux
Apr 8, 2019 · Operations

Master SSH: 7 Essential Commands for Efficient Remote Server Management

This guide explains seven practical SSH techniques—including basic login, custom ports, compression, debugging, source address binding, remote command execution, and mounting remote filesystems—providing clear examples and command syntax for secure and efficient Linux server administration.

Remote ManagementSSHServer Administration
0 likes · 7 min read
Master SSH: 7 Essential Commands for Efficient Remote Server Management
Programmer DD
Programmer DD
Mar 17, 2019 · Operations

Understanding Forward and Reverse Proxies: Concepts, Uses, and Key Differences

This article explains the definitions, real‑world analogies, practical applications, and fundamental differences between forward (client‑side) and reverse (server‑side) proxy servers, helping developers and operators grasp why these concepts matter for access control, performance, and security.

ProxyWeb Performanceforward proxy
0 likes · 9 min read
Understanding Forward and Reverse Proxies: Concepts, Uses, and Key Differences
MaGe Linux Operations
MaGe Linux Operations
Jan 14, 2019 · Information Security

Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses

This article presents a comprehensive collection of network security mind maps covering introductory concepts, scanning and defense techniques, monitoring, password cracking, deception attacks, denial-of-service, buffer overflow, web, trojan, virus threats, and future trends, guiding learners through a structured technical roadmap.

cybersecuritydefense techniquesinformation security
0 likes · 3 min read
Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses
NetEase Game Operations Platform
NetEase Game Operations Platform
Dec 10, 2018 · Information Security

Understanding and Improving Operations Security: Practices, Risks, and Enterprise‑Level Solutions

This article explains the concept of operations security, why it has become critical, enumerates common mis‑configurations and vulnerabilities such as open ports, weak permissions, insecure scripts and supply‑chain risks, and provides a comprehensive set of best‑practice guidelines and an enterprise‑level framework to build a resilient operations security posture.

AutomationInfrastructureincident response
0 likes · 28 min read
Understanding and Improving Operations Security: Practices, Risks, and Enterprise‑Level Solutions
MaGe Linux Operations
MaGe Linux Operations
Nov 18, 2018 · Operations

Essential Linux iptables Rules Every Sysadmin Should Know

This guide presents a collection of commonly used Linux iptables rules—ranging from deleting existing rules and setting default policies to allowing specific services like SSH, HTTP, HTTPS, and configuring port forwarding, logging, and DoS protection—so you can tailor firewall settings to your environment.

Sysadminiptablesnetwork security
0 likes · 4 min read
Essential Linux iptables Rules Every Sysadmin Should Know
Efficient Ops
Efficient Ops
Sep 6, 2018 · Information Security

Key Findings from China’s 2018 Q2 Internet Security Threat Report

The 2018 second‑quarter report by the Ministry of Industry and Information Technology details the monitoring of approximately 18.4 million internet security threats, highlighting compromised user email accounts, attacks on industrial IoT platforms and devices, the rise of illegal cryptocurrency mining, and outlines the major mitigation actions taken, including vulnerability remediation, network protection for major events, and coordinated emergency drills.

Cryptocurrency MiningIndustrial IoTemail hijacking
0 likes · 8 min read
Key Findings from China’s 2018 Q2 Internet Security Threat Report
MaGe Linux Operations
MaGe Linux Operations
Jul 25, 2018 · Information Security

Master Port Scanning, Subdomain Enumeration, and CMS Fingerprinting with Python

This article explains the principles of port scanning, lists common service ports and their states, demonstrates nmap usage, and provides both single‑threaded and multithreaded Python scripts for port scanning, followed by three Python‑based subdomain collection methods and two approaches for CMS fingerprinting, complete with code examples.

CMS fingerprintingSubdomain Enumerationnetwork security
0 likes · 16 min read
Master Port Scanning, Subdomain Enumeration, and CMS Fingerprinting with Python
Architects' Tech Alliance
Architects' Tech Alliance
Jun 13, 2018 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms such as HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, the differences between symmetric and asymmetric cryptography, and the core security requirements of confidentiality, integrity, authenticity, and performance.

HTTPHTTPSTLS
0 likes · 14 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
Tencent Cloud Developer
Tencent Cloud Developer
Jun 13, 2018 · Information Security

Analysis of DDoS Attack Trends in the First Half of 2018

In the first half of 2018 DDoS attacks surged, with IoT‑based SSDP and newly dominant Memcached reflection amplifications reaching 1.7 Tbps, gaming becoming the top‑targeted sector, SYN and HTTP floods rising, attack infrastructure shifting abroad, and automated, low‑cost services enabling teenage operators, prompting recommendations for high‑bandwidth cloud and BGP defenses.

Attack TrendsDDoSThreat analysis
0 likes · 13 min read
Analysis of DDoS Attack Trends in the First Half of 2018
ITPUB
ITPUB
May 24, 2018 · Information Security

How Attackers Exploit UPnP to Bypass DDoS Defenses with Obfuscated Source Ports

Recent DDoS campaigns are using UPnP protocol flaws to hide source‑port information, allowing amplification attacks such as DNS spoofing to evade traditional defenses by routing traffic through compromised IoT routers and manipulating port‑forwarding rules via SOAP requests.

Amplification AttackDDoSPort Obfuscation
0 likes · 6 min read
How Attackers Exploit UPnP to Bypass DDoS Defenses with Obfuscated Source Ports
MaGe Linux Operations
MaGe Linux Operations
Mar 20, 2018 · Information Security

How to Crack Wi‑Fi Passwords with Python: Step‑by‑Step Guide

This tutorial explains two practical methods for cracking Wi‑Fi passwords using Python—first by leveraging the pywifi library with custom dictionaries and scanning scripts, and second by employing the Wifiphisher tool to create a rogue access point and capture credentials.

PythonWi-Fi crackingWifiphisher
0 likes · 9 min read
How to Crack Wi‑Fi Passwords with Python: Step‑by‑Step Guide
Tencent Cloud Developer
Tencent Cloud Developer
Mar 7, 2018 · Information Security

Memcached Reflection DDoS Attacks Set New Traffic Records

Memcached reflection DDoS attacks have surged, breaking terabit‑per‑second records with peaks of 1.35 Tbps and 1.94 Tbps, prompting warnings from Cloudflare and Arbor, targeting online services worldwide, while Tencent Cloud’s Zeus Shield mitigated the traffic and experts advise stronger UDP monitoring, high‑capacity defenses, and regular simulations.

AmplificationDDoSMemcached
0 likes · 7 min read
Memcached Reflection DDoS Attacks Set New Traffic Records