Tagged articles
358 articles
Page 4 of 4
MaGe Linux Operations
MaGe Linux Operations
Jan 28, 2018 · Information Security

Essential IT Security Practices Every Ops Engineer Should Master

This article shares a seasoned ops engineer's evolving understanding of IT security, covering network, host, application, data, and web security measures, practical tools like ELK and OSSEC, and actionable recommendations to strengthen system protection against attacks and breaches.

Application SecurityELKIT security
0 likes · 10 min read
Essential IT Security Practices Every Ops Engineer Should Master
Ctrip Technology
Ctrip Technology
Jan 25, 2018 · Operations

Software Session Border Controller (SBC): Overview, Application Scenarios, and Practical Implementation Experience

This article introduces Session Border Controllers (SBC), outlines three typical deployment scenarios, and shares detailed practical experiences—including architecture, implementation steps, and common pitfalls—of building software‑based SBC solutions such as VAG, VIG, and VTG for VoIP services.

FreeSWITCHNATOpenSIPS
0 likes · 11 min read
Software Session Border Controller (SBC): Overview, Application Scenarios, and Practical Implementation Experience
Efficient Ops
Efficient Ops
Nov 12, 2017 · Operations

How 360’s LVS FULLNAT Transforms Load Balancing and Boosts Security

This article explains how 360’s Linux Virtual Server (LVS) platform evolved with the FULLNAT forwarding mode, enhancing cross‑VLAN deployment, simplifying real‑server configuration, adding SYN‑proxy protection, and improving UDP handling, while detailing the new deployment architecture and operational benefits.

DeploymentFullNATLVS
0 likes · 10 min read
How 360’s LVS FULLNAT Transforms Load Balancing and Boosts Security
Meituan Technology Team
Meituan Technology Team
Oct 26, 2017 · Information Security

External Network Port Monitoring: Evolution, Methods, and Best Practices

The article chronicles Meituan‑Dianping’s external network port monitoring evolution—from slow Python‑driven Nmap scans to a fast Masscan‑Nmap pipeline and real‑time traffic‑driven DPDK module—explaining black‑box scanning, white‑box analysis, best‑practice recommendations, and the critical role of continuous port visibility for security.

Security OperationsTCP SYNmasscan
0 likes · 13 min read
External Network Port Monitoring: Evolution, Methods, and Best Practices
Efficient Ops
Efficient Ops
Oct 25, 2017 · Information Security

Securing Cloud‑Era Network Boundaries: Practices and Automated Operations

This article presents a comprehensive overview of cloud‑era network boundary management, detailing security challenges, unified access control concepts, endpoint protection, traffic analysis, and how automated operations and visualization platforms can reduce risk while maintaining efficient network operations.

AutomationOperationsaccess control
0 likes · 24 min read
Securing Cloud‑Era Network Boundaries: Practices and Automated Operations
MaGe Linux Operations
MaGe Linux Operations
Oct 8, 2017 · Information Security

25 Must‑Know Linux iptables Rules for Secure Firewall Management

This guide presents 25 essential Linux iptables rules—from clearing existing policies to configuring SSH, HTTP, DNS, and DoS protection—illustrated with command screenshots, enabling administrators to quickly adapt firewall settings to their specific network security needs.

Sysadminiptablesnetwork security
0 likes · 4 min read
25 Must‑Know Linux iptables Rules for Secure Firewall Management
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Sep 28, 2017 · Fundamentals

Why NB‑IoT Is Poised to Power the Next IoT Revolution in China

The 2017 China International Information Communication Exhibition highlighted NB‑IoT as a pivotal, low‑power, wide‑coverage technology set to dominate over 60% of IoT demand, while outlining China's policy support, deployment milestones, industry challenges, and recommended actions for secure, scalable growth.

ChinaIoTNB-IoT
0 likes · 6 min read
Why NB‑IoT Is Poised to Power the Next IoT Revolution in China
MaGe Linux Operations
MaGe Linux Operations
Sep 19, 2017 · Information Security

Master Network Security: A Complete Mind Map of Threats & Defenses

This article presents a detailed mind‑map of network security, covering introductory concepts, scanning and defense, monitoring, password cracking, deception attacks, denial‑of‑service, buffer overflow, web and trojan attacks, computer viruses, and future trends, each illustrated with explanatory images.

Threat Detectioncybersecuritydefense techniques
0 likes · 3 min read
Master Network Security: A Complete Mind Map of Threats & Defenses
dbaplus Community
dbaplus Community
Sep 9, 2017 · Information Security

Why MongoDB Nodes Are Getting Hijacked and How to Secure Them

The article examines the widespread exposure of MongoDB instances on default ports, outlines how attackers hijack them, and provides concrete steps—including enabling authentication, configuring role‑based access, encrypting traffic, and limiting network exposure—to secure MongoDB deployments.

AuthenticationAuthorizationMongoDB
0 likes · 7 min read
Why MongoDB Nodes Are Getting Hijacked and How to Secure Them
MaGe Linux Operations
MaGe Linux Operations
Aug 15, 2017 · Information Security

Xshell Backdoor Discovered in Build 1326 – Critical Security Alert

A critical backdoor was discovered in NetSarang’s Xshell 5 Build 1326, where the nssock2.dll module contains malicious code that contacts a remote domain, affecting multiple NetSarang products; the article details the vulnerability, affected versions, behavior, and provides safe download links.

Remote Code ExecutionVulnerabilitybackdoor
0 likes · 4 min read
Xshell Backdoor Discovered in Build 1326 – Critical Security Alert
Efficient Ops
Efficient Ops
Aug 14, 2017 · Information Security

Critical Xshell Backdoor Alert: How Malicious DLLs Leak Data and What to Do

A recent security advisory reveals that popular remote terminal Xshell versions contain a backdoor in the nssock2.dll component, enabling shellcode to harvest host information, generate monthly DGA domains, and potentially expose sensitive data, prompting immediate version checks and upgrades.

DGAXshellbackdoor
0 likes · 6 min read
Critical Xshell Backdoor Alert: How Malicious DLLs Leak Data and What to Do
Efficient Ops
Efficient Ops
Jul 2, 2017 · Operations

How to Build a Multi‑Layered Security Defense: Practical Ops Strategies

This article outlines a comprehensive, multi‑layered security framework for operations teams, covering policy design, dual‑account permission separation, grid‑based vulnerability management, topology and network safeguards, OS and database hardening, common misconceptions, and actionable principles for maintaining robust protection.

OperationsSecuritySystem Hardening
0 likes · 31 min read
How to Build a Multi‑Layered Security Defense: Practical Ops Strategies
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 12, 2017 · Operations

Alibaba’s Journey to a Smart, Cost‑Effective Office with Self‑Developed Cloud Wi‑Fi

Alibaba’s IT platform evolved from a simple employee directory in 2013 to a comprehensive, self‑developed ecosystem—including cloud‑based Wi‑Fi, soft‑phone, wireless casting, device management, and unified audio‑video conferencing—that reduces costs, enhances security, and delivers seamless, mobile‑first office experiences across global campuses.

Alibaba Cloudcloud Wi-Fienterprise operations
0 likes · 13 min read
Alibaba’s Journey to a Smart, Cost‑Effective Office with Self‑Developed Cloud Wi‑Fi
MaGe Linux Operations
MaGe Linux Operations
May 14, 2017 · Information Security

Why the ONION & WNCRY Ransomware Hit 70 Countries – Protection Tips

The recent ONION and WNCRY ransomware outbreak, originating from leaked NSA tools like EternalBlue, rapidly infected over 70 nations, targeting hospitals, universities and other institutions, and this article explains the attack timeline, infection mechanisms, impact on Chinese campuses, and practical mitigation steps such as backups, patching, port blocking and domain filtering.

EternalBluePatch managementnetwork security
0 likes · 8 min read
Why the ONION & WNCRY Ransomware Hit 70 Countries – Protection Tips
Efficient Ops
Efficient Ops
Apr 13, 2017 · Information Security

From Traditional Ops to Automated Security: Ctrip’s Journey and Lessons

This article recounts a Ctrip security engineer’s evolution from early Unix‑based operations to fully automated network security, highlighting challenges in forecasting, application security integration, rapid incident response, and large‑scale firewall automation within a fast‑growing enterprise.

AutomationSecurity Operationsincident response
0 likes · 12 min read
From Traditional Ops to Automated Security: Ctrip’s Journey and Lessons
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2017 · Information Security

Master Linux iptables: Build and Manage Robust Firewalls

This comprehensive guide explains Linux firewall fundamentals, the role of iptables and Netfilter, the structure of tables and chains, rule ordering, common commands, and real‑world configuration examples for securing networks and handling port mapping.

Linux firewallfirewall rulesiptables
0 likes · 10 min read
Master Linux iptables: Build and Manage Robust Firewalls
MaGe Linux Operations
MaGe Linux Operations
Mar 25, 2017 · Information Security

Mastering FirewallD: A Complete Guide to Linux Firewall Management

This guide explains how to install, enable, and manage FirewallD on Linux, covering zones, services, ports, rich rules, port forwarding, and direct iptables integration, with step‑by‑step commands and visual examples to help administrators configure persistent, dynamic firewalls efficiently.

Linuxfirewalldiptables
0 likes · 11 min read
Mastering FirewallD: A Complete Guide to Linux Firewall Management
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 21, 2017 · Information Security

Smart Intelligent Defense and Big Data Capabilities in Alibaba's Self‑Developed High‑Performance Anti‑Attack Product

The article describes Alibaba's smart defense model that uses real‑time traffic analysis and big‑data insights to automatically adjust DDoS mitigation strategies, outlines the system's capabilities such as attacker identification and traffic quantification, and discusses future challenges in handling increasingly complex and large‑scale attacks.

AlibabaAnti-DDoSDDoS
0 likes · 5 min read
Smart Intelligent Defense and Big Data Capabilities in Alibaba's Self‑Developed High‑Performance Anti‑Attack Product
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 17, 2017 · Information Security

Alibaba's Self‑Developed High‑Performance DDoS Defense Product AliGuard: Development History, Architecture, and Capabilities

This article reviews the 2016 Dyn DDoS incident, explains why DDoS attacks remain a critical security challenge, and details Alibaba's internally built high‑performance DDoS mitigation solution AliGuard, covering its development timeline, multi‑user architecture, scalability from 40 Gbps to over 400 Gbps, and deployment models.

AliGuardAlibabaDDoS
0 likes · 9 min read
Alibaba's Self‑Developed High‑Performance DDoS Defense Product AliGuard: Development History, Architecture, and Capabilities
ZhiKe AI
ZhiKe AI
Feb 15, 2017 · Information Security

Understanding iptables: A Comprehensive Introduction to Linux Packet Filtering

This article introduces Linux’s built-in iptables (netfilter) firewall, explains its four tables and chains, and provides detailed command-line examples for starting, stopping, configuring, listing, and managing rules, including common options and extended matching techniques.

Linux firewallfirewall rulesiptables
0 likes · 7 min read
Understanding iptables: A Comprehensive Introduction to Linux Packet Filtering
dbaplus Community
dbaplus Community
Jan 25, 2017 · Information Security

Effective Server Security Incident Response: Step‑by‑Step Guide

When a production server is compromised, abrupt actions like pulling the plug can disrupt services, so this guide outlines an eight‑stage, evidence‑driven response process—including verification, on‑site preservation, containment, impact assessment, online analysis, backup, deep forensics, and reporting—plus real‑world case studies and concrete command examples.

Case StudyForensicsLinux
0 likes · 14 min read
Effective Server Security Incident Response: Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Jan 2, 2017 · Information Security

Master iptables: Essential Commands and Advanced Matching Techniques

This guide walks through iptables fundamentals—including listing, flushing, and setting default policies—then demonstrates adding, inserting, replacing, and deleting rules, explores basic and extended match modules, and provides practical exercises for building robust firewall configurations.

Linuxfirewalliptables
0 likes · 7 min read
Master iptables: Essential Commands and Advanced Matching Techniques
Ctrip Technology
Ctrip Technology
Aug 26, 2016 · Information Security

Automated Firewall Operations and Management System at Ctrip

The article describes how Ctrip’s network security team built an automated, centralized firewall management platform that handles multi‑brand firewalls, streamlines policy queries, generation, and deployment, integrates with change‑ticket workflows, and dramatically improves operational efficiency while reducing human error.

CtripInfrastructureOperations
0 likes · 14 min read
Automated Firewall Operations and Management System at Ctrip
ITPUB
ITPUB
Aug 25, 2016 · Information Security

Understanding Linux Netfilter: How the Kernel Handles Packet Filtering

This article provides an in‑depth technical overview of Linux Netfilter, explaining its hook architecture, key macros, packet‑processing flow, and how iptables interacts with the kernel to filter, NAT, and track connections across the IPv4 stack.

KernelLinuxfirewall
0 likes · 15 min read
Understanding Linux Netfilter: How the Kernel Handles Packet Filtering
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jul 21, 2016 · Information Security

How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential

This article explains how DNS hijacking injects unwanted ads by exploiting HTTP's lack of encryption, identity verification, and integrity checks, and demonstrates how HTTPS, with SSL/TLS encryption, certificates, and integrity validation, protects users from such attacks while also discussing performance impacts.

Certificate AuthorityDNS hijackingHTTPS
0 likes · 15 min read
How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential
21CTO
21CTO
Jun 10, 2016 · Information Security

Understanding HTTP & DNS Hijacking: Causes, Risks, and Practical Countermeasures

This article explains what HTTP and DNS hijacking are, illustrates real-world examples, analyzes root causes such as ad injection and malicious attacks, and presents concrete anti‑hijacking techniques like data legitimacy checks, timeliness verification, HttpDNS, and operator cache mitigation.

DNS hijackingHTTP hijackingHTTPDNS
0 likes · 10 min read
Understanding HTTP & DNS Hijacking: Causes, Risks, and Practical Countermeasures
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Jun 7, 2016 · Information Security

Understanding HTTP and DNS Hijacking: Causes, Impacts, and Countermeasures

The article explains what HTTP and DNS hijacking are, illustrates real‑world examples, analyzes root causes such as ad injection and ISP caching, describes the resulting harms, and presents practical anti‑hijack techniques including data validation, HttpDNS, and logging strategies.

DNS hijackingHTTP hijackinganti‑hijack
0 likes · 8 min read
Understanding HTTP and DNS Hijacking: Causes, Impacts, and Countermeasures
Tencent TDS Service
Tencent TDS Service
May 26, 2016 · Information Security

Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained

This article explains the fundamentals of HTTPS by comparing web communication to passing notes in a classroom, covering symmetric and asymmetric encryption, RSA key exchange, the role of Certificate Authorities, and how these mechanisms together protect against man‑in‑the‑middle attacks.

Certificate AuthorityHTTPSSSL
0 likes · 10 min read
Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained
360 Quality & Efficiency
360 Quality & Efficiency
May 9, 2016 · Information Security

Comprehensive Guide to Security Testing: Methods, Tools, and Best Practices

This article provides an in‑depth overview of security testing, covering its definition, lifecycle, test types, a wide range of scanning and injection tools, practical checklists, evaluation metrics, and recommendations for integrating security assessments throughout the software development process.

information securitynetwork securitypenetration testing
0 likes · 20 min read
Comprehensive Guide to Security Testing: Methods, Tools, and Best Practices
Big Data and Microservices
Big Data and Microservices
Apr 7, 2016 · Big Data

Turning Big Data into Actionable Security Visualizations: Process & Real‑World Cases

This article explains how to transform massive security‑related big data into clear visual insights, covering storytelling, data processing, visual encoding, design workflow, and two real‑world case studies that illustrate vulnerability mapping and internal traffic analysis for improved threat awareness.

Big DataData visualizationdesign process
0 likes · 10 min read
Turning Big Data into Actionable Security Visualizations: Process & Real‑World Cases
Architecture Digest
Architecture Digest
Apr 1, 2016 · Information Security

Understanding DDoS: A Resource War, Emerging Trends, and Defense Strategies

The article explains what Distributed Denial of Service (DDoS) attacks are, why they are a persistent resource‑war in cyberspace, outlines new hybrid attack trends, the expanding range of compromised devices, and discusses evolving defense approaches from local cleaning to cloud‑based anti‑DDoS services.

Anti-DDoSAttack TrendsDDoS
0 likes · 11 min read
Understanding DDoS: A Resource War, Emerging Trends, and Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Mar 3, 2016 · Information Security

Master iptables Quickly with This Visual Mind Map

This article presents a concise visual mind map of iptables, illustrating its core concepts, chains, tables, and typical rules, enabling readers to quickly grasp firewall configuration and operation at a glance in.

Linuxfirewalliptables
0 likes · 1 min read
Master iptables Quickly with This Visual Mind Map
ITPUB
ITPUB
Feb 25, 2016 · Information Security

Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate

This guide explains how to protect Linux servers from SYN flood and DDoS attacks by tuning sysctl parameters, applying iptables rules, installing the free DDoS‑deflate script, and monitoring nginx logs to identify and block malicious IPs and user agents.

DDoS mitigationLinuxfirewall
0 likes · 10 min read
Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate
Architect
Architect
Jan 15, 2016 · Information Security

Understanding Traffic Hijacking and How HTTPS Prevents It

Traffic hijacking, a form of man‑in‑the‑middle attack that injects unwanted ads or modifies web content, can be mitigated by HTTPS, which uses SSL/TLS for server authentication, encryption, and integrity, and the article explains the attack methods, HTTPS fundamentals, and practical deployment steps including Alibaba Cloud support.

Alibaba CloudCertificateHTTPS
0 likes · 8 min read
Understanding Traffic Hijacking and How HTTPS Prevents It
Efficient Ops
Efficient Ops
Jul 30, 2015 · Information Security

Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies

This article summarizes a comprehensive ops security talk that breaks down network segmentation, system hardening, and permission management into layered defenses, offering practical guidance on VLANs, ACLs, least‑privilege principles, and account auditing for robust enterprise protection.

System Hardeningaccess controlinformation security
0 likes · 11 min read
Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies
Architect
Architect
Jul 19, 2015 · Information Security

Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps

This article explains the mechanisms of HTTP and DNS hijacking, illustrates real‑world examples, analyzes their causes and impacts on mobile applications, and presents practical anti‑hijacking techniques such as data validation, HttpDNS, ISP cache handling, illegal redirect blocking, and monitoring strategies.

DNS hijackingHTTP hijackingMobile Security
0 likes · 10 min read
Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps
Practical DevOps Architecture
Practical DevOps Architecture
Jun 15, 2015 · Information Security

Configuring NAT, ACL, and Static Routing on a Router

This guide demonstrates how to configure NAT with an ACL, set up internal and external interface IP addresses, define a default static route, and create an ACL‑based traffic policy to block specific internal hosts from accessing a given external IP address.

ACLNATRouter configuration
0 likes · 3 min read
Configuring NAT, ACL, and Static Routing on a Router
Qunar Tech Salon
Qunar Tech Salon
May 29, 2015 · Information Security

Implementing Network ACL for Memcached Using iptables

This article explains how to use Linux iptables to create network-level ACLs that block non-production IP ranges from accessing a Memcached server, providing command examples for adding, listing, and clearing firewall rules, and discusses future considerations such as IPv6 support.

ACLLinuxMemcached
0 likes · 5 min read
Implementing Network ACL for Memcached Using iptables
MaGe Linux Operations
MaGe Linux Operations
Aug 9, 2014 · Information Security

Master Linux iptables: From Basics to Advanced Firewall Rules

This comprehensive guide explains Linux firewall concepts, the evolution and operation of iptables, rule chains, policies, command syntax, matching criteria, state tracking, NAT/DNAT techniques, and practical exercises, providing readers with the knowledge to configure and manage secure network access effectively.

LinuxNATfirewall
0 likes · 17 min read
Master Linux iptables: From Basics to Advanced Firewall Rules
Baidu Tech Salon
Baidu Tech Salon
Jul 8, 2014 · Information Security

Understanding TCP RST Attacks: From Handshakes to Exploiting Sequence Numbers

This article explains TCP fundamentals—including three‑way handshakes, sliding windows, and four‑way termination—then details how the RST flag works and how attackers can forge packets using source ports and sequence numbers to execute powerful RST denial‑of‑service attacks.

HandshakeRST attackSliding Window
0 likes · 9 min read
Understanding TCP RST Attacks: From Handshakes to Exploiting Sequence Numbers
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

How Linux’s SYNPROXY Shields Against SYN Flood DoS Attacks

The article explains how the Linux kernel’s SYNPROXY feature, introduced in version 3.13, effectively mitigates SYN flood DoS attacks by acting as a gateway, validating handshake cookies, and dramatically reducing kernel soft‑IRQ load during testing on Debian and SLES‑12.

DoSLinuxSYNPROXY
0 likes · 2 min read
How Linux’s SYNPROXY Shields Against SYN Flood DoS Attacks
Baidu Tech Salon
Baidu Tech Salon
Apr 14, 2014 · Information Security

Unmasking Modern Traffic Hijacking: Router, Wi‑Fi and LAN Attack Techniques

The article provides a comprehensive overview of traffic hijacking methods—from legacy hub sniffing and MAC spoofing to DNS poisoning, router CSRF, PPPoE phishing, and Wi‑Fi hotspot attacks—explaining how each works, real‑world examples, and practical mitigation steps for network administrators.

ARP spoofingTraffic HijackingWiFi phishing
0 likes · 32 min read
Unmasking Modern Traffic Hijacking: Router, Wi‑Fi and LAN Attack Techniques