Tagged articles
69 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
May 19, 2026 · Fundamentals

Add a Progress Bar to Linux cp and mv Commands

This guide shows how to patch coreutils so that the Linux cp and mv commands display a visual progress bar, covering version checks, source download, applying the advcpmv patch, compiling, configuring replacements, and testing the new functionality.

Linuxadvcpmvcoreutils
0 likes · 3 min read
Add a Progress Bar to Linux cp and mv Commands
Weekly Large Model Application
Weekly Large Model Application
Mar 22, 2026 · Artificial Intelligence

Inside MiMo-Audio: Dissecting the Large-Scale Audio Model

The article breaks down MiMo-Audio, a next‑token‑prediction‑style large‑scale audio model built on Qwen2, detailing its acoustic front‑end, RVQ tokenizer, patch‑based transformer architecture, streaming capabilities, performance advantages, engineering constraints, and recommended application scenarios.

Audio ModelingFew-ShotQwen2
0 likes · 9 min read
Inside MiMo-Audio: Dissecting the Large-Scale Audio Model
Node.js Tech Stack
Node.js Tech Stack
Dec 23, 2025 · Information Security

Critical Storybook Flaw May Leak API Keys and Database Passwords

Storybook versions 7.0+ can unintentionally bundle the entire .env file into static builds when using process.env patterns, exposing API keys and database passwords to anyone accessing the published site; the advisory lists affected versions, plugin triggers, and recommends immediate upgrade to patched releases and key rotation.

Env VariablesSecurity VulnerabilityStorybook
0 likes · 6 min read
Critical Storybook Flaw May Leak API Keys and Database Passwords
Cognitive Technology Team
Cognitive Technology Team
Oct 12, 2025 · Backend Development

Java Diff Utils Guide: Compare Text, Generate Patches, and Visualize Changes

This tutorial introduces Java Diff Utils, a lightweight open-source library for computing text differences, showing how to set it up in a Spring Boot project, compare string lists, generate unified diffs, apply patches, and create side-by-side visualizations for robust version-control and change-tracking in Java applications.

diff-utilspatchspring-boot
0 likes · 11 min read
Java Diff Utils Guide: Compare Text, Generate Patches, and Visualize Changes
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Sep 25, 2025 · Backend Development

Master Text Diff in Java with Diff Utils: Real‑World Spring Boot Examples

This article introduces the Java Diff Utils library, explains its core features such as computing differences, applying patches, and generating unified diffs, and provides step‑by‑step Spring Boot 3 examples—including dependency setup, string list comparison, patch generation, application, side‑by‑side view creation, and HTML rendering—for efficient text version control.

Spring BootText Diffdiff-utils
0 likes · 11 min read
Master Text Diff in Java with Diff Utils: Real‑World Spring Boot Examples
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Feb 19, 2025 · Frontend Development

Debugging and Fixing Memory Leaks in Vue2 Applications

This article walks through reproducing a memory‑leak scenario in a Vue2‑based terminal application, analyzes common leak causes, demonstrates how adding dynamic keys and patching Vue's sameVnode function resolves the issue, and shows how to ship the fix with patch‑package for production deployments.

KEYVuedebugging
0 likes · 9 min read
Debugging and Fixing Memory Leaks in Vue2 Applications
Linux Kernel Journey
Linux Kernel Journey
Nov 12, 2024 · Operations

eBPF Talk: Fixing a 7‑Year‑Old Bug in bpftool

The article details how a long‑standing bug that displayed incorrect call‑address information in bpftool’s JIT disassembly was reproduced, analyzed, and fixed by correcting the PC parameter to use the function’s kernel symbol address, with patches applied to both LLVM and libbfd back‑ends.

LLVMbpftooldisassembly
0 likes · 9 min read
eBPF Talk: Fixing a 7‑Year‑Old Bug in bpftool
Java Tech Enthusiast
Java Tech Enthusiast
Nov 4, 2024 · Fundamentals

Linux Kernel Patch Improves Performance by 2.6% in Intel Benchmark

Linus Torvalds merged a small patch into the Linux kernel that streamlines the 64‑bit copy_from_user() routine by skipping the costly barrier_nospec() and applying masked user‑address handling, delivering a 2.6% speedup on Intel’s “will it scale” per‑thread‑ops benchmark and slated for inclusion in the upcoming Linux 6.12 stable release.

Linux kernelbenchmarkcopy_from_user
0 likes · 4 min read
Linux Kernel Patch Improves Performance by 2.6% in Intel Benchmark
Liangxu Linux
Liangxu Linux
Aug 25, 2024 · Operations

When systemd‑tmpfiles Wiped Home Files: The Bug, the Fallout, and the Fix

A recent incident with systemd‑tmpfiles – triggered by the ‑‑purge option in version 256 – caused unexpected deletion of files in /home, prompting a heated discussion among developers, a GitHub issue, and a rapid patch that clarified the command’s scope and added safeguards.

Data lossLinuxSystemd
0 likes · 5 min read
When systemd‑tmpfiles Wiped Home Files: The Bug, the Fallout, and the Fix
Architect
Architect
Aug 16, 2024 · Information Security

How to Patch Critical Spring & Nacos Vulnerabilities in 2024

This article analyzes recent critical security flaws in Spring Framework (CVE‑2024‑38808 and CVE‑2024‑38809) and Nacos Jraft port, explains their impact, provides version‑specific mitigation steps, code snippets for Spring Boot fixes, and offers additional hardening recommendations for developers and operators.

CVE-2024-38808CVE-2024-38809Nacos
0 likes · 7 min read
How to Patch Critical Spring & Nacos Vulnerabilities in 2024
Open Source Linux
Open Source Linux
Aug 16, 2024 · Information Security

Critical Windows IPv6 RCE Vulnerability (CVE‑2024‑38063): Risks & Fixes

A high‑severity Windows TCP/IP IPv6 vulnerability (CVE‑2024‑38063) allows unauthenticated remote attackers to trigger denial‑of‑service or execute arbitrary code on millions of systems, and Microsoft recommends immediate patching or temporary IPv6 disabling as mitigation.

CVE-2024-38063IPv6Information Security
0 likes · 9 min read
Critical Windows IPv6 RCE Vulnerability (CVE‑2024‑38063): Risks & Fixes
21CTO
21CTO
Jun 15, 2024 · Backend Development

When to Use POST, PUT, or PATCH? Clear Differences Explained

This article demystifies the confusion between HTTP methods POST, PUT, and PATCH by explaining their distinct purposes, showing practical code examples, and highlighting when each should be used in RESTful API design.

APIHTTPPOST
0 likes · 5 min read
When to Use POST, PUT, or PATCH? Clear Differences Explained
Beijing SF i-TECH City Technology Team
Beijing SF i-TECH City Technology Team
May 30, 2024 · Mobile Development

Design and Implementation of a HotFix System for Android Applications

This article presents a comprehensive overview of a mobile hot‑update solution for Android, covering its motivation, goals, technical selection of Tinker, comparative analysis of existing frameworks, system architecture, implementation steps, usage workflow, and the benefits it brings to rapid bug fixing and minor version releases.

Continuous DeliveryHotfixMobile
0 likes · 9 min read
Design and Implementation of a HotFix System for Android Applications
IT Services Circle
IT Services Circle
Oct 18, 2023 · Information Security

Critical libcurl Vulnerabilities (CVE-2023-38545 & CVE-2023-38546) and Upcoming curl 8.4.0 Patch

The article reports two high‑severity libcurl vulnerabilities (CVE‑2023‑38545 and CVE‑2023‑38546) disclosed by curl’s maintainer, explains the limited public information before the scheduled curl 8.4.0 release, and urges developers to upgrade promptly due to the library’s widespread use.

CVE-2023-38545CVE-2023-38546Vulnerability
0 likes · 5 min read
Critical libcurl Vulnerabilities (CVE-2023-38545 & CVE-2023-38546) and Upcoming curl 8.4.0 Patch
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 7, 2023 · Frontend Development

Understanding and Fixing the Reset Behavior Issue in Element‑Plus Form Component

This article analyzes why the reset button in an Element‑Plus form clears all fields instead of restoring the initial values, explains the underlying cause related to the onMounted lifecycle timing, and presents several practical solutions—including lifecycle adjustment, patch‑package, component extension, and repository forking—to reliably preserve initial form data in Vue projects.

Element PlusFormVue
0 likes · 7 min read
Understanding and Fixing the Reset Behavior Issue in Element‑Plus Form Component
Meituan Technology Team
Meituan Technology Team
May 18, 2023 · Mobile Development

Adapting Meituan's Android Robust Hot‑Fix Framework to R8 and Optimization Strategies

The article explains how Meituan migrated its method‑instrumentation hot‑fix system Robust from ProGuard to Google’s R8 by moving change detection ahead of optimization, disabling or tuning R8’s built‑in optimizations, and implementing special handling for anonymous classes, inlined methods, super calls, constructors and static initializers to ensure reliable patch generation.

AndroidHotfixProGuard
0 likes · 21 min read
Adapting Meituan's Android Robust Hot‑Fix Framework to R8 and Optimization Strategies
IT Services Circle
IT Services Circle
Jan 16, 2023 · Operations

Integrating the Final Windows 7 Updates (including Secure Boot/UEFI) into a Custom ISO – UpdatePack7R2 Guide

This article explains how Microsoft ended Windows 7 updates, details the Secure Boot/UEFI patch KB5017361 and its successors, and provides step‑by‑step instructions for using the UpdatePack7R2 collection to create a custom Windows 7 ISO that includes the final patches, drivers, and optional fixes.

ISOIntegrationSecureBoot
0 likes · 4 min read
Integrating the Final Windows 7 Updates (including Secure Boot/UEFI) into a Custom ISO – UpdatePack7R2 Guide
Laravel Tech Community
Laravel Tech Community
Oct 18, 2022 · Information Security

Linux Kernel Remote Code Execution Vulnerability (CVE-2022-42721)

A remote code execution vulnerability (CVE-2022-42721) affecting Linux kernel versions 5.1 through 5.19.14 allows local attackers to inject malicious WLAN frames that corrupt the mac80211 BSS handling list, enabling execution of arbitrary code, and can be mitigated by upgrading to kernel 5.19.15 or later.

Remote Code ExecutionVulnerabilitycve-2022-42721
0 likes · 2 min read
Linux Kernel Remote Code Execution Vulnerability (CVE-2022-42721)
Laravel Tech Community
Laravel Tech Community
Oct 11, 2022 · Information Security

Label Studio <1.6.0 SSRF Vulnerability (CVE‑2022‑36551)

Label Studio versions prior to 1.6.0 contain an SSRF flaw that allows authenticated users to access arbitrary files on the server via the data import module, with self‑registration enabled by default, and a proof‑of‑concept exploit is publicly available.

CVE-2022-36551Label StudioSSRF
0 likes · 3 min read
Label Studio <1.6.0 SSRF Vulnerability (CVE‑2022‑36551)
Laravel Tech Community
Laravel Tech Community
Sep 26, 2022 · Information Security

Privilege Escalation Vulnerability in Visual Studio Code < 1.71.1 (CVE-2022-38020)

Visual Studio Code versions prior to 1.71.1 contain a privilege‑escalation flaw where a low‑privileged Windows attacker can place a malicious bash.exe in a special directory, causing the editor to load and execute the file, and the issue is fixed by upgrading to version 1.71.1 or later.

CVE-2022-38020Security VulnerabilityVisual Studio Code
0 likes · 2 min read
Privilege Escalation Vulnerability in Visual Studio Code < 1.71.1 (CVE-2022-38020)
JD Retail Technology
JD Retail Technology
Jul 4, 2022 · Frontend Development

Iframe State Preservation and Vue Patch Mechanism Exploration

This article examines how iframe state can be preserved in a Vue‑based platform by using CSS display toggling, introduces an iframe resource pool with a competition eviction strategy, and analyzes Vue's patch algorithm and DOM insertBefore behavior to propose a solution that avoids unwanted iframe refreshes.

State Managementiframepatch
0 likes · 10 min read
Iframe State Preservation and Vue Patch Mechanism Exploration
JavaEdge
JavaEdge
Mar 29, 2022 · Information Security

How to Detect and Fix the Spring SPEL Remote Code Execution Vulnerability

This guide explains the Spring SPEL injection flaw, how to determine if your Java application is affected by checking JDK version and Spring usage in WAR or JAR packages, and provides official upgrade steps along with temporary WAF and code‑level mitigations.

DetectionRCESpEL
0 likes · 5 min read
How to Detect and Fix the Spring SPEL Remote Code Execution Vulnerability
Sohu Tech Products
Sohu Tech Products
Dec 15, 2021 · Frontend Development

Implementing a Simple Virtual DOM Library with Patch and Diff Algorithms

This article explains how to build a lightweight virtual DOM library in JavaScript, covering the creation of VNode objects, the patch and diff algorithms, handling of attributes, classes, styles, and events, and demonstrates a step‑by‑step implementation using the Snabbdom approach.

Diff AlgorithmJavaScriptSnabbdom
0 likes · 18 min read
Implementing a Simple Virtual DOM Library with Patch and Diff Algorithms
21CTO
21CTO
Dec 13, 2021 · Information Security

Log4Shell Unleashed: How a Single Log4j Flaw Threatens Every Server

The Log4Shell (CVE‑2021‑44228) zero‑day in the widely used Log4j library lets attackers execute remote code without authentication, prompting massive internet‑wide scans, crypto‑mining malware, and threats to critical infrastructure, while open‑source maintainers struggle with limited support despite adoption by giants like Apple and Microsoft.

CVE-2021-44228Log4ShellSecurity Vulnerability
0 likes · 4 min read
Log4Shell Unleashed: How a Single Log4j Flaw Threatens Every Server
MaGe Linux Operations
MaGe Linux Operations
Dec 10, 2021 · Information Security

How the Log4j2 RCE Flaw Threatened Global Systems and What to Do Now

A critical remote code execution vulnerability in Apache Log4j2, exposed through JNDI injection, has impacted major services worldwide, prompting urgent patches, temporary mitigations, and ongoing updates from the Apache project to protect vulnerable Java applications.

Remote Code ExecutionSecurity Vulnerabilityjava
0 likes · 6 min read
How the Log4j2 RCE Flaw Threatened Global Systems and What to Do Now
ITPUB
ITPUB
Dec 10, 2021 · Information Security

Why the Log4j2 RCE Bug Is a Global Threat and How to Fix It

The Log4j2 remote code execution vulnerability (CVE‑2021‑44228, CNVD‑2021‑95914) affects all Java‑based applications from version 2.0 to 2.15.0‑rc1, allowing unauthenticated attackers to execute arbitrary code, and requires immediate inventory, patching, and hardening measures across all affected systems.

RCEVulnerability Managementjava
0 likes · 6 min read
Why the Log4j2 RCE Bug Is a Global Threat and How to Fix It
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 23, 2021 · Frontend Development

Understanding Virtual DOM and Diff Algorithm in Vue.js (Vue2 and Vue3)

This article explains the concept of virtual DOM, its structure, and how Vue's diff (patch) algorithm works, including detailed code walkthroughs, optimization strategies, key usage, and differences between Vue2 and Vue3 implementations, helping readers fully grasp the underlying principles and performance improvements.

Diff AlgorithmKEYVirtual DOM
0 likes · 28 min read
Understanding Virtual DOM and Diff Algorithm in Vue.js (Vue2 and Vue3)
Top Architect
Top Architect
Apr 18, 2021 · Information Security

WeChat PC Client 0day Vulnerability and Recommended Mitigation Steps

A critical 0day vulnerability in the WeChat Windows desktop client allows attackers to execute shellcode via a crafted web link without leaving files or new processes, prompting users to update to version 3.2.1.143 or apply temporary safeguards such as using the system browser and avoiding unknown links.

0dayPC clientVulnerability
0 likes · 4 min read
WeChat PC Client 0day Vulnerability and Recommended Mitigation Steps
Java Architecture Diary
Java Architecture Diary
Jan 15, 2021 · Information Security

How to Exploit and Patch the Nacos Authentication Bypass Vulnerability (v1.2‑v1.4)

This article explains the Nacos authentication bypass vulnerability affecting versions 1.2‑1.4, how attackers can exploit whitelist headers to gain unauthorized access, the widespread exposure revealed by Zoomeye scans, and the official remediation steps including upgrading to v1.4.1 and disabling the UA whitelist.

Authentication BypassNacosSecurity Vulnerability
0 likes · 3 min read
How to Exploit and Patch the Nacos Authentication Bypass Vulnerability (v1.2‑v1.4)
Programmer DD
Programmer DD
Aug 28, 2020 · Information Security

Critical BaoTa Panel Vulnerability (2020): Impact, Global Exposure, and Fixes

A critical vulnerability in BaoTa Linux panel 7.4.2, disclosed on August 23, 2020, allows attackers to bypass authentication, access databases and gain server control; the article details affected versions, global exposure statistics, proof‑of‑concept evidence, and recommended remediation steps.

BaoTaLinux PanelVulnerability
0 likes · 4 min read
Critical BaoTa Panel Vulnerability (2020): Impact, Global Exposure, and Fixes
Laravel Tech Community
Laravel Tech Community
Jul 5, 2020 · Information Security

RuoYi Management System v4.3.1 Release Notes and Security Vulnerability Fixes

RuoYi Management System v4.3.1 introduces multiple functional enhancements and critical security patches, including fixes for Shiro remember‑Me command execution, SQL injection via PageHelper, Shiro permission‑bypass, and Fastjson deserialization vulnerabilities, along with code examples and configuration guidance.

RuoYiShiroVulnerability
0 likes · 8 min read
RuoYi Management System v4.3.1 Release Notes and Security Vulnerability Fixes
Alibaba Cloud Native
Alibaba Cloud Native
Jun 1, 2020 · Cloud Native

Why Updating a Kubernetes Resource via API Fails While kubectl Apply Succeeds – Understanding Update vs Patch

This article explains the Kubernetes update mechanism, why an API update can fail due to missing resourceVersion, how patch operations differ, and the internal logic of kubectl apply and edit, providing practical guidance for choosing between update and patch in cloud‑native deployments.

Cloud NativeKubernetesOpenKruise
0 likes · 14 min read
Why Updating a Kubernetes Resource via API Fails While kubectl Apply Succeeds – Understanding Update vs Patch
FunTester
FunTester
Jun 1, 2020 · Information Security

Fastjson <=1.2.68 Remote Code Execution Vulnerability and Mitigation Recommendations

Tencent Cloud Security reports that Fastjson versions up to 1.2.68 contain a high‑risk remote code execution vulnerability exploitable via the autotype feature, allowing attackers to gain server system privileges, and recommends immediate updates, enabling SafeMode, or replacing the library with alternatives such as Jackson‑databind or Gson.

Remote Code ExecutionSafeModeSecurity Vulnerability
0 likes · 3 min read
Fastjson <=1.2.68 Remote Code Execution Vulnerability and Mitigation Recommendations
vivo Internet Technology
vivo Internet Technology
Jan 8, 2020 · Backend Development

Analysis and Fix of Tomcat 9.0.26 Deadlock Issue

Tomcat 9.0.26 suffers a high‑concurrency deadlock caused by a lock‑order inversion among NIO poller and executor threads, dropping TPS to zero and creating thousands of CLOSE_WAIT sockets; downgrading to Tomcat 8 or applying the 9.0.31+ patch that moves the close operation into a finally block restores performance to around 15 K TPS.

Tomcatdeadlockjava
0 likes · 6 min read
Analysis and Fix of Tomcat 9.0.26 Deadlock Issue
AI Code to Success
AI Code to Success
Jan 8, 2020 · Mobile Development

Step-by-Step Guide to Building Your Own Android Hotfix Framework

This tutorial walks through the principles of Android hotfixing, explains class loaders, and provides a complete hands‑on implementation—including a buggy class, a custom Dex loader, patch creation, and runtime injection—so developers can quickly patch bugs without releasing a full app update.

AndroidDexClassLoaderHotfix
0 likes · 11 min read
Step-by-Step Guide to Building Your Own Android Hotfix Framework
ITPUB
ITPUB
Oct 17, 2019 · Information Security

Understanding the Sudo CVE‑2019‑14287 Vulnerability and How to Mitigate It

The article explains the CVE‑2019‑14287 sudo bug that lets attackers bypass root restrictions by using special user IDs, assesses its severity and real‑world impact, and provides concrete steps—including patch installation and sudoers configuration checks—to protect Linux systems.

CVE-2019-14287Linux securitySudo
0 likes · 7 min read
Understanding the Sudo CVE‑2019‑14287 Vulnerability and How to Mitigate It
Aikesheng Open Source Community
Aikesheng Open Source Community
Jul 4, 2019 · Databases

Analysis and Fix for MySQL Mixed Binlog Format Event Creation Bug

This article investigates a MySQL bug where creating an event with sysdate() in mixed binlog format causes replication failure, reproduces the issue on MySQL 5.6.23, analyzes the relevant source functions with SystemTap tracing, and proposes a patch that forces statement format during event creation to prevent row‑based logging.

debuggingmixed modemysql
0 likes · 12 min read
Analysis and Fix for MySQL Mixed Binlog Format Event Creation Bug
MaGe Linux Operations
MaGe Linux Operations
Jan 29, 2018 · Backend Development

Master Python Mock: Simulate External Calls for Seamless Unit Testing

This article explains what the Python Mock library does, how to install and import it, demonstrates basic and advanced usage including creating mock objects, setting return values and side effects, and shows how to apply patch and patch.object for effective unit testing without a real server.

Mockpatchunit-testing
0 likes · 12 min read
Master Python Mock: Simulate External Calls for Seamless Unit Testing
ITPUB
ITPUB
Jan 25, 2018 · Information Security

Critical MySQL CVE-2018-2696 & Related Vulnerabilities: Impact, Exploits, and Fixes

Oracle's recent advisory reveals multiple high‑severity MySQL vulnerabilities (CVE‑2018‑2562, CVE‑2018‑2591, CVE‑2018‑2696) that allow unauthenticated denial‑of‑service attacks and potential code execution, outlines affected versions, detection steps, and recommends immediate upgrades to patched releases.

CVE-2018-2696Vulnerabilitymysql
0 likes · 5 min read
Critical MySQL CVE-2018-2696 & Related Vulnerabilities: Impact, Exploits, and Fixes
Architects' Tech Alliance
Architects' Tech Alliance
Jan 20, 2018 · Information Security

Understanding Meltdown, Spectre, Skyfall, and Solace CPU Vulnerabilities – FAQ and Mitigation

This article explains the Meltdown and Spectre speculative‑execution CPU flaws, introduces the alleged Skyfall and Solace vulnerabilities, lists affected hardware and operating systems, and provides a detailed FAQ on detection, patches, performance impact, and safe mitigation steps.

CPU vulnerabilitiesInformation SecurityMeltdown
0 likes · 8 min read
Understanding Meltdown, Spectre, Skyfall, and Solace CPU Vulnerabilities – FAQ and Mitigation
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2017 · Information Security

How Zabbix Guest Access Enables Unauthenticated SQL Injection – Full Exploit Walkthrough

This article details a high‑severity SQL injection vulnerability in Zabbix’s jsrpc.php profileIdx2 parameter that allows unauthenticated attackers to gain system privileges, outlines its impact, demonstrates testing methods with screenshots, analyzes the vulnerable code paths, and recommends mitigation steps such as upgrading, patching, and disabling the guest account.

Guest accessInformation SecuritySQL injection
0 likes · 5 min read
How Zabbix Guest Access Enables Unauthenticated SQL Injection – Full Exploit Walkthrough
MaGe Linux Operations
MaGe Linux Operations
Mar 27, 2017 · Information Security

Top 10 Enterprise Linux Server Security Practices You Must Implement

This guide outlines ten essential security measures for enterprise Linux servers, covering password management, network service restriction, user account controls, root privilege handling, logging, firewall and IDS integration, vulnerability tracking, and regular patch updates to strengthen system protection.

Serverfirewallpassword
0 likes · 14 min read
Top 10 Enterprise Linux Server Security Practices You Must Implement
Node Underground
Node Underground
Sep 29, 2016 · Information Security

What Critical Security Fixes Did Node.js Release on Sep 28?

On September 28 Node.js issued four security updates—including maintenance releases 0.10.47 and 0.12.16, LTS 4.6.0 Argon, and stable 6.7.0—addressing multiple CVEs such as wildcard certificate validation, HTTP header validation, OCSP extension misuse, and the SWEET32 attack, and urging users to upgrade promptly.

CVEInformation SecurityNode.js
0 likes · 3 min read
What Critical Security Fixes Did Node.js Release on Sep 28?
ITPUB
ITPUB
Sep 28, 2016 · Backend Development

Why Enabling Multipath Routing Shrinks the FIB Table: Uncovering a Hidden Linux Kernel Bug

A long‑standing Linux kernel bug causes the FIB routing hash table to shrink from 256 to 2 entries when multipath routing is enabled, leading to performance degradation; the article explains the faulty macros, traces the communication with the original authors, and advises applying the upstream fix or patching locally.

FIBLinux kernelmultipath
0 likes · 3 min read
Why Enabling Multipath Routing Shrinks the FIB Table: Uncovering a Hidden Linux Kernel Bug
ITPUB
ITPUB
Aug 22, 2016 · Information Security

How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability

This article explains the unauthenticated SQL injection flaw in Zabbix's JSRPC profileIdx2 parameter, details its high impact on versions 2.2.x and 3.0.0‑3.0.3, provides a step‑by‑step proof‑of‑concept exploit, and recommends upgrading to version 3.0.4 to remediate the issue.

ExploitInformation SecuritySQL injection
0 likes · 4 min read
How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability
Tencent TDS Service
Tencent TDS Service
Aug 4, 2016 · Mobile Development

Accelerating Android Bug Fixes and Version Updates with a Hotfix Patch Framework

Android's fragmented versions and market‑specific policies make bug fixes and version upgrades painfully slow, but by treating the app as a loader and delivering patch files that replace the Application class, dex files, resources, and native libraries, developers can achieve near‑instant, user‑transparent updates without disrupting the normal release flow.

AndroidContinuous DeliveryHotfix
0 likes · 16 min read
Accelerating Android Bug Fixes and Version Updates with a Hotfix Patch Framework
Efficient Ops
Efficient Ops
Nov 11, 2015 · Information Security

Why Redis Unauthorized Access Is a Critical Threat and How to Fix It

This article explains a high‑severity Redis unauthorized‑access vulnerability that can let attackers write SSH keys to the host, highlights the risk of exposing Redis to the Internet without authentication, and provides guidance on remediation and network protection.

Network ExposureVulnerabilitypatch
0 likes · 4 min read
Why Redis Unauthorized Access Is a Critical Threat and How to Fix It
21CTO
21CTO
Aug 23, 2015 · Backend Development

How to Enable HTTP/2 in Nginx with the Early Alpha Patch – Step‑by‑Step Guide

This guide explains how to apply Nginx's early‑alpha HTTP/2 patch, covering required source versions, OpenSSL/LibreSSL preparation, patch application, configuration flags, compilation, and enabling HTTP/2 in the server block, while noting the patch's production limitations.

ConfigurationHTTP2Nginx
0 likes · 4 min read
How to Enable HTTP/2 in Nginx with the Early Alpha Patch – Step‑by‑Step Guide