Tagged articles
16 articles
Page 1 of 1
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Mar 27, 2026 · Artificial Intelligence

Securing RAG Systems: A Three‑Layer Permission Framework for Banking AI

This article explains why vector databases lack row‑level security, presents a three‑layer permission architecture—including JWT authentication, Milvus metadata or partition filtering, and post‑retrieval validation—covers document security levels, PostgreSQL RLS, audit logging, caching strategies, and offers interview‑ready talking points.

JWTMilvusPostgreSQL RLS
0 likes · 18 min read
Securing RAG Systems: A Three‑Layer Permission Framework for Banking AI
Alibaba Cloud Observability
Alibaba Cloud Observability
Mar 16, 2026 · Information Security

Can AI Agents Be Truly Controlled? Auditing, Cost, and Security Insights for OpenClaw

This article examines whether AI agents operate under strict control by analyzing OpenClaw's attack surface, security incidents, session audit logs, application logs, and OTEL metrics, and demonstrates how multi‑source observability can answer who triggered actions, what costs were incurred, which high‑risk tools were used, and whether the behavior is fully traceable.

AI AgentLLM CostOTEL
0 likes · 22 min read
Can AI Agents Be Truly Controlled? Auditing, Cost, and Security Insights for OpenClaw
Alibaba Cloud Observability
Alibaba Cloud Observability
Mar 16, 2026 · Information Security

Secure OpenClaw AI Agents: One‑Click Log Integration & Real‑Time Auditing with Alibaba SLS

This article explains how to connect OpenClaw, a leading AI agent platform, to Alibaba Cloud Log Service (SLS) using the SLS Access Center, providing one‑click log ingestion, built‑in audit and observability dashboards, and detailed guidance for security auditing, cost monitoring, and troubleshooting across multiple data sources.

AI AgentAlibaba CloudCloud Native
0 likes · 29 min read
Secure OpenClaw AI Agents: One‑Click Log Integration & Real‑Time Auditing with Alibaba SLS
dbaplus Community
dbaplus Community
Oct 27, 2025 · Operations

30 Essential Linux Command Combinations to Supercharge System Administration

This guide presents 30 practical Linux command pipelines—organized into system monitoring, log analysis, file management, process control, network troubleshooting, and security auditing—that let administrators quickly diagnose resource bottlenecks, extract key log data, automate batch operations, and secure servers without writing complex scripts.

LinuxSecurity AuditingShell Commands
0 likes · 33 min read
30 Essential Linux Command Combinations to Supercharge System Administration
ITPUB
ITPUB
Oct 7, 2025 · Operations

100+ Essential IT Operations Checklist to Keep Your Infrastructure Running Smoothly

This comprehensive guide presents a standardized operations manual covering over one hundred core maintenance checkpoints across server hardware, network devices, storage systems, operating systems, databases, virtualization platforms, backup solutions, security appliances, and data‑center facilities, helping IT teams ensure stable and reliable service delivery.

Data centerDatabase AdministrationIT Operations
0 likes · 34 min read
100+ Essential IT Operations Checklist to Keep Your Infrastructure Running Smoothly
Alibaba Cloud Observability
Alibaba Cloud Observability
Aug 18, 2025 · Information Security

How to Use MCP Server for Real‑Time AccessKey Security Audits in Cloud Native Environments

This guide walks through a real‑time security investigation of suspicious AccessKey activity using Alibaba Cloud's MCP server, detailing environment setup, JSON configuration, natural‑language queries, and four practical audit scenarios—including tracking AK usage, identifying high‑risk operations, monitoring root account activity, and summarizing recent cloud service events.

AccessKeyAlibaba CloudCloud Native
0 likes · 8 min read
How to Use MCP Server for Real‑Time AccessKey Security Audits in Cloud Native Environments
Liangxu Linux
Liangxu Linux
Oct 20, 2024 · Information Security

How to Install and Use Lynis for Powerful Linux Security Audits

This guide explains how to set up the free, open‑source Lynis tool on a CentOS 8 server, run comprehensive system audits, explore its command‑line options, and interpret the generated security reports to strengthen Linux host defenses.

LinuxLynisSecurity Auditing
0 likes · 4 min read
How to Install and Use Lynis for Powerful Linux Security Audits
Liangxu Linux
Liangxu Linux
Jan 12, 2021 · Information Security

What Is a Bastion Host and How Does It Secure Operations?

This article explains the concept, purpose, design principles, functional modules, authentication methods, deployment options, and open‑source implementations of bastion hosts, highlighting how they centralize control, audit, and protect privileged access to servers and network devices.

AuthenticationBastion HostDeployment
0 likes · 9 min read
What Is a Bastion Host and How Does It Secure Operations?
Top Architect
Top Architect
Aug 12, 2020 · Information Security

Practical Guide to Auditing MyBatis SQL Injection Vulnerabilities

This article explains common MyBatis SQL injection patterns such as fuzzy queries, improper use of the $ placeholder in IN clauses and ORDER BY statements, and provides a step‑by‑step methodology for locating, analyzing, and confirming these vulnerabilities in Java web applications.

JavaMyBatisSQL injection
0 likes · 7 min read
Practical Guide to Auditing MyBatis SQL Injection Vulnerabilities
Efficient Ops
Efficient Ops
Mar 28, 2019 · Information Security

How Leading Tech Companies Audit and Control Ops Permissions

This article explains how large enterprises such as BAT and banks implement strict auditing and supervision of operational privileges, using personal accounts, command logging, OSSEC monitoring, firewall limits, and cross‑team oversight to enforce the principle of least privilege.

DevOpsOperationsPrivilege Management
0 likes · 6 min read
How Leading Tech Companies Audit and Control Ops Permissions
MaGe Linux Operations
MaGe Linux Operations
Mar 7, 2017 · Operations

How to Build a Scalable Python‑Based Operations Automation Platform

This article explores the design and implementation of a Python‑driven, extensible operations automation platform, covering its motivations, architecture, module customization, security auditing, client‑server structure, and future enhancements for robust DevOps workflows.

DevOpsModule CustomizationOperations Automation
0 likes · 9 min read
How to Build a Scalable Python‑Based Operations Automation Platform
Efficient Ops
Efficient Ops
Jul 7, 2016 · Operations

Designing a Scalable Python Ops Automation Platform with OMServer

This article explores building a scalable Python-based operations automation platform, detailing the OMServer architecture, why Python is chosen, module customization, security auditing, and client‑server implementation, while highlighting key third‑party libraries and future enhancements for DevOps teams.

C/S DesignDevOpsOps Automation
0 likes · 8 min read
Designing a Scalable Python Ops Automation Platform with OMServer