Tag

Penetration

0 views collected around this technical thread.

Selected Java Interview Questions
Selected Java Interview Questions
Jan 20, 2022 · Information Security

A Practical Guide to Common Intranet Penetration Tools: nps, frp, EW, and ngrok

This article provides a comprehensive overview of popular intranet penetration tools—including nps, frp, EW, and ngrok—detailing their features, installation steps, configuration examples, and usage scenarios for exposing internal services such as HTTP, SSH, RDP, and file sharing to the public internet.

Network ToolsNgrokPenetration
0 likes · 15 min read
A Practical Guide to Common Intranet Penetration Tools: nps, frp, EW, and ngrok
Architect
Architect
Oct 29, 2021 · Backend Development

Cache Breakdown, Penetration, and Avalanche: Causes and Mitigation Strategies in Redis

The article explains why cache breakdown, penetration, and avalanche occur in high‑concurrency Redis environments, and presents practical mitigation techniques such as distributed locking, Bloom‑filter filtering, and careful expiration strategies to keep backend services stable.

CacheCache BreakdownDistributed Lock
0 likes · 6 min read
Cache Breakdown, Penetration, and Avalanche: Causes and Mitigation Strategies in Redis
Selected Java Interview Questions
Selected Java Interview Questions
Dec 7, 2019 · Backend Development

Understanding Redis Cache Avalanche, Penetration, and Breakdown: Causes and Mitigation Strategies

The article explains what Redis cache avalanche, penetration, and breakdown are, illustrates real‑world incidents, and provides pre‑, during‑, and post‑incident solutions such as high‑availability setups, local caches with rate limiting, fallback mechanisms, and placeholder writes to prevent database overload.

AvalancheBreakdownCache
0 likes · 8 min read
Understanding Redis Cache Avalanche, Penetration, and Breakdown: Causes and Mitigation Strategies
Architecture Digest
Architecture Digest
Aug 13, 2018 · Backend Development

Cache Consistency, Concurrency, Penetration, Avalanche, and Bottomless Pit Issues and Mitigation Strategies

The article explains various cache problems—including consistency, concurrency, penetration, avalanche, and the bottomless‑pit phenomenon—and presents practical mitigation techniques such as active updates, locking, empty‑object caching, request filtering, consistent hashing, and multi‑level caching to ensure reliable high‑performance systems.

AvalancheCachePenetration
0 likes · 8 min read
Cache Consistency, Concurrency, Penetration, Avalanche, and Bottomless Pit Issues and Mitigation Strategies