Tag

Security

1 views collected around this technical thread.

Java Captain
Java Captain
Jun 12, 2025 · Information Security

How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide

This comprehensive 2025 guide explains how to identify WeChat restriction types, prepare necessary evidence and materials, use both client‑side and web‑based self‑service tools, complete assisted verification, and follow new regulations to successfully restore account access.

Account RecoveryGuidelinesSecurity
0 likes · 9 min read
How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide
Sohu Tech Products
Sohu Tech Products
Jun 11, 2025 · Frontend Development

Why WebSocket Is the Secret Weapon for Real‑Time Web Apps

This article explains how WebSocket enables low‑latency, bidirectional communication for AI‑driven real‑time applications, covering its protocol basics, advantages, heartbeat mechanism, connection management challenges, security enhancements, and emerging trends such as WebTransport and integration with modern frameworks.

Real‑Time CommunicationSecurityWebSocket
0 likes · 6 min read
Why WebSocket Is the Secret Weapon for Real‑Time Web Apps
Java Captain
Java Captain
Jun 11, 2025 · Information Security

Mastering WeChat Account Unblocking: A Step‑by‑Step Self‑Service Guide

This comprehensive guide explains the types of WeChat account restrictions, preparation steps, the five‑stage self‑service unblocking workflow, common issues and solutions, friend‑assisted verification procedures, advanced appeal strategies for permanent bans, and post‑unblock security measures to help users efficiently restore access.

Account RecoverySecuritySelf-Service
0 likes · 18 min read
Mastering WeChat Account Unblocking: A Step‑by‑Step Self‑Service Guide
Java Captain
Java Captain
Jun 10, 2025 · Operations

How to Unlock a Banned WeChat Account: Step‑by‑Step 2025 Guide

This 2025 guide details every step to diagnose the type of WeChat ban, prepare required documents and devices, and use both client‑side and web‑based self‑service channels, including advanced verification tips and FAQs, to successfully restore a restricted or permanently blocked account.

2025 GuidelinesAccount UnblockingSecurity
0 likes · 10 min read
How to Unlock a Banned WeChat Account: Step‑by‑Step 2025 Guide
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 8, 2025 · Information Security

Why SBOMs Are the Key to Secure Software Supply Chains

This article explains how Software Bill of Materials (SBOM) mirrors hardware BOMs, outlines their core differences, presents best practices, tools, and implementation strategies to improve supply‑chain transparency, compliance, and security for modern software development.

ComplianceSBOMSecurity
0 likes · 12 min read
Why SBOMs Are the Key to Secure Software Supply Chains
IT Services Circle
IT Services Circle
Jun 8, 2025 · Information Security

Why mmap Shared Memory Is More Dangerous Than malloc – Risks Explained

mmap shared memory lets multiple processes access the same physical memory, which can break process isolation, expose permission misconfigurations like PROT_EXEC, and cause cross‑process crashes or code‑injection attacks, making it far riskier than heap allocations with malloc that remain confined to a single process.

C ProgrammingMMAPSecurity
0 likes · 5 min read
Why mmap Shared Memory Is More Dangerous Than malloc – Risks Explained
Java Captain
Java Captain
Jun 8, 2025 · Operations

Step-by-Step 2025 Guide to Unlocking Your WeChat Account

This comprehensive 2025 guide walks users through identifying restriction types, preparing evidence, using WeChat's self‑service unlocking tools or web‑based appeal, completing assisted verification, handling enterprise account checks, and applying best‑practice safeguards to maximize the chance of successful account restoration.

2025 GuidelinesSecuritySelf-Service
0 likes · 9 min read
Step-by-Step 2025 Guide to Unlocking Your WeChat Account
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 7, 2025 · Information Security

Unlocking Software Supply Chain Security with SBOM

This article explains how Software Bill of Materials (SBOM) serves as a digital map for component dependency and change management, detailing its functions in visualizing dependencies, detecting version conflicts, ensuring license compliance, and providing supply‑chain risk alerts, ultimately improving development efficiency, security, and regulatory compliance.

ComplianceDependency ManagementSBOM
0 likes · 11 min read
Unlocking Software Supply Chain Security with SBOM
macrozheng
macrozheng
Jun 6, 2025 · Backend Development

Why “null” Strings Break Your Java Backend – and How to Fix It

The article explains how treating the literal string "null" as an empty value can cause serious bugs in Java backend registration, demonstrates the issue with code examples, and provides practical input‑sanitizing and validation techniques to prevent such errors and related security risks.

JavaNull HandlingSecurity
0 likes · 7 min read
Why “null” Strings Break Your Java Backend – and How to Fix It
360 Tech Engineering
360 Tech Engineering
Jun 4, 2025 · Information Security

Security Risk Assessment and Governance for Model Context Protocol (MCP) Ecosystem

This article systematically analyzes the security threats of the Model Context Protocol (MCP) ecosystem—including supply‑chain poisoning, backdoors, tool‑description injection, malicious updates, cloud‑service abuse, installer vulnerabilities, and open‑source risks—and proposes concrete governance measures and early‑stage implementations to help enterprises secure MCP deployments and operations.

AICloudMCP
0 likes · 18 min read
Security Risk Assessment and Governance for Model Context Protocol (MCP) Ecosystem
php中文网 Courses
php中文网 Courses
Jun 3, 2025 · Backend Development

Using PHP password_hash for Secure Password Storage

This article explains how PHP's password_hash function can securely hash passwords, automatically handle salting, and be verified with password_verify, providing code examples and best practices for protecting user credentials in web applications.

BackendHashingPHP
0 likes · 5 min read
Using PHP password_hash for Secure Password Storage
php中文网 Courses
php中文网 Courses
Jun 3, 2025 · Backend Development

Using PHP's setcookie Function to Create and Manage Cookies

This article explains how PHP's setcookie function works, describes each parameter, and provides several practical code examples for setting cookies with different lifetimes, scopes, and security options, helping developers manage client‑side data effectively.

BackendSecurityWeb Development
0 likes · 5 min read
Using PHP's setcookie Function to Create and Manage Cookies
Code Ape Tech Column
Code Ape Tech Column
May 27, 2025 · Information Security

Combining JWT and Session for Secure and Scalable User Authentication

This article explains how JWT provides stateless authentication while Session adds an extra security layer and lifecycle management, and demonstrates their combined use with Java code to achieve both scalability and fine‑grained control over user sessions.

AuthenticationJWTJava
0 likes · 8 min read
Combining JWT and Session for Secure and Scalable User Authentication
Cloud Native Technology Community
Cloud Native Technology Community
May 27, 2025 · Cloud Native

Kubernetes v1.33 Fixes a Decade-Old Image Pull Loophole

Kubernetes v1.33 introduces the KubeletEnsureSecretPulledImages feature gate, which forces credential verification for cached private images, closing a ten‑year‑old security loophole that allowed Pods to reuse unauthorized images across namespaces regardless of imagePullPolicy settings.

Cloud NativeFeature GatesImagePullPolicy
0 likes · 6 min read
Kubernetes v1.33 Fixes a Decade-Old Image Pull Loophole
FunTester
FunTester
May 27, 2025 · Backend Development

Java Serialization: Ten Common Pitfalls and Safer Alternatives

Java serialization, while convenient for persisting objects, suffers from versioning issues, hidden fields, mutable data snapshots, performance overhead, security vulnerabilities, singleton breaches, final field tampering, external dependencies, maintenance burdens, and format limitations, and the article recommends explicit serialVersionUID, custom methods, and JSON/Protobuf alternatives.

JSONJavaProtobuf
0 likes · 18 min read
Java Serialization: Ten Common Pitfalls and Safer Alternatives
Aikesheng Open Source Community
Aikesheng Open Source Community
May 26, 2025 · Information Security

Building a Minimal Offline MySQL CVE Scanning Tool with DuckDB

This article demonstrates how to create a lightweight, offline MySQL CVE scanning and reporting tool by cloning the CVEProject JSON repository, leveraging DuckDB for fast JSON parsing and SQL queries, and providing simple shell commands for data updates, version scanning, and vulnerability matching.

CVEMySQLSecurity
0 likes · 6 min read
Building a Minimal Offline MySQL CVE Scanning Tool with DuckDB
Deepin Linux
Deepin Linux
May 24, 2025 · Information Security

Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux

The article introduces KASAN, a Kernel Address Sanitizer for Linux that uses shadow memory and redzones to accurately detect out‑of‑bounds accesses, use‑after‑free, and double‑free errors, explains its underlying mechanisms, shows how to enable it in the kernel, and provides extensive example code and log analysis.

KASANKernel Address SanitizerLinux kernel
0 likes · 34 min read
Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux
Code Mala Tang
Code Mala Tang
May 24, 2025 · Backend Development

7 Essential FastAPI Middleware to Boost Performance, Security, and Maintainability

This guide explores seven practical FastAPI middleware components—covering CORS, GZip compression, request logging, trusted hosts, HTTPS redirection, custom exception handling, and rate limiting—to help developers build faster, safer, and more maintainable APIs.

FastAPIPythonSecurity
0 likes · 7 min read
7 Essential FastAPI Middleware to Boost Performance, Security, and Maintainability
php中文网 Courses
php中文网 Courses
May 22, 2025 · Backend Development

PHP Form Data Validation and Filtering Techniques

This article explains how to use PHP functions to validate required fields, email and phone formats, and to filter HTML tags, special characters, and prevent SQL injection, providing clear code examples for each technique.

BackendData FilteringPHP
0 likes · 4 min read
PHP Form Data Validation and Filtering Techniques
Efficient Ops
Efficient Ops
May 20, 2025 · Operations

How AI Is Transforming Enterprise Monitoring and Automated Operations

This article outlines a comprehensive AI‑driven framework for upgrading intelligent monitoring, automating operations, enhancing log analysis, optimizing cloud costs, strengthening security, and improving disaster recovery, showcasing practical techniques such as unified data platforms, dynamic baselines, smart ticket routing, and self‑healing infrastructure.

AI monitoringSecurityautomation
0 likes · 9 min read
How AI Is Transforming Enterprise Monitoring and Automated Operations