Tagged articles
6 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Nov 26, 2024 · Information Security

New “Silver Fox” Trojan Variant Targets Chinese Users – Spread, Impact, and Prevention

The National Computer Virus Emergency Response Center reports a new “Silver Fox” Trojan variant distributed via phishing links in WeChat groups, disguised as tax‑related installers, which can hijack systems for remote control and fraud, and provides concrete steps for users and enterprises to defend against it.

PreventionViruscybersecurity
0 likes · 6 min read
New “Silver Fox” Trojan Variant Targets Chinese Users – Spread, Impact, and Prevention
MaGe Linux Operations
MaGe Linux Operations
Feb 13, 2024 · Databases

How to Detect, Diagnose, and Prevent MySQL InnoDB Deadlocks

This guide explains what MySQL deadlocks are, shows how to use InnoDB status and performance‑schema queries to locate them, demonstrates a reproducible deadlock scenario, and provides practical prevention techniques such as reducing transaction size, quick commits, proper indexing, and consistent access order.

InnoDBPreventiondeadlock
0 likes · 11 min read
How to Detect, Diagnose, and Prevent MySQL InnoDB Deadlocks
Liangxu Linux
Liangxu Linux
Aug 19, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Defend Against Them

This article explains the fundamentals of Cross‑Site Request Forgery (CSRF), describing its background, attack mechanics, key concepts, common prevention techniques such as anti‑CSRF tokens and SameSite cookies, and provides practical GET and POST examples to illustrate the threat.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Defend Against Them
ITPUB
ITPUB
Apr 24, 2017 · Information Security

Which Linux Commands Can Wipe Your System and How to Stay Safe

The article lists a series of Linux commands that can permanently delete files, format disks, or overload system resources, explains why they are dangerous, and provides practical tips such as avoiding root for daily work, verifying command purpose, using trusted sources, and regularly backing up data.

LinuxPreventionSecurity
0 likes · 7 min read
Which Linux Commands Can Wipe Your System and How to Stay Safe
Efficient Ops
Efficient Ops
Jun 15, 2016 · Operations

Avoid Costly DBA Mistakes: Real‑World Deletion Cases and How to Prevent Them

This article shares a collection of real DBA deletion mishaps—from accidental Oracle home removal to mistaken rm‑rf commands—and offers practical prevention tips such as aliasing rm, monitoring storage, backing up before deletions, and enforcing peer review to improve operational safety.

Database AdministrationOperational MistakesPrevention
0 likes · 8 min read
Avoid Costly DBA Mistakes: Real‑World Deletion Cases and How to Prevent Them