Tagged articles
9 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 31, 2026 · Information Security

DeepSeek’s Early‑Year Security Fallout: A Post‑Mortem

The article dissects DeepSeek’s series of security breaches in early 2025—including an open ClickHouse database, multiple XSS flaws, model‑level attacks, and regulatory fallout—highlighting how rapid AI product rollout can outpace essential security safeguards.

AI securityClickHouse exposureDeepSeek
0 likes · 14 min read
DeepSeek’s Early‑Year Security Fallout: A Post‑Mortem
Black & White Path
Black & White Path
Mar 14, 2026 · Information Security

360training Data Breach Exposes 24,594 Customers – What It Means for Online Education Security

A recent breach at the US‑based online vocational training platform 360training exposed personal, payment, and credential data of 24,594 customers, highlighting systemic security gaps in the online education sector and prompting detailed recommendations for both platform operators and users to mitigate identity‑theft and trust risks.

User Privacydata breachinformation security
0 likes · 10 min read
360training Data Breach Exposes 24,594 Customers – What It Means for Online Education Security
AI Info Trend
AI Info Trend
Mar 13, 2026 · Artificial Intelligence

What Is OpenClaw and How to Deploy Your Own AI‑Powered Digital Assistant

OpenClaw is a self‑hosted gateway that links popular chat apps with AI agents, turning them from simple Q&A bots into actionable digital employees; the article explains its rapid popularity, required API‑key setup, one‑line installation, usage tips, security precautions, and uninstallation steps.

AI AgentsChatbot IntegrationOpenClaw
0 likes · 8 min read
What Is OpenClaw and How to Deploy Your Own AI‑Powered Digital Assistant
MaGe Linux Operations
MaGe Linux Operations
Jul 13, 2025 · Information Security

Master Linux Firewalls: Complete iptables & firewalld Configuration Guide

Learn the fundamentals of Linux firewalls, compare iptables and firewalld, explore tables, chains, targets, and advanced features, and follow practical scripts for web and database server protection, rule persistence, troubleshooting, performance tuning, and security best practices in a comprehensive step‑by‑step guide.

Linux firewallfirewall rulesfirewalld
0 likes · 21 min read
Master Linux Firewalls: Complete iptables & firewalld Configuration Guide
ITPUB
ITPUB
May 3, 2025 · Information Security

20 Critical Server Operations You Must Never Do – Real Cases & Fixes

Based on analysis of over 500 enterprise server failure cases, this guide lists 20 absolutely prohibited server actions across six dimensions, each illustrated with a real incident and practical technical measures to prevent recurrence.

DevOpsSystem Administrationincident response
0 likes · 14 min read
20 Critical Server Operations You Must Never Do – Real Cases & Fixes
Efficient Ops
Efficient Ops
Feb 23, 2025 · Information Security

Top 10 Server Ops Mistakes That Can Cripple Your Business – How to Avoid Them

This article presents ten critical server‑operation blunders—from forced power‑offs to neglecting firewall rules—and illustrates each with real‑world incidents, offering concrete best‑practice recommendations to help IT teams prevent costly outages and security breaches.

incident preventionsecurity best practicesserver operations
0 likes · 7 min read
Top 10 Server Ops Mistakes That Can Cripple Your Business – How to Avoid Them
Java Tech Enthusiast
Java Tech Enthusiast
Sep 1, 2024 · Information Security

XSS Defense in Spring Boot Applications

The article explains how to protect Spring Boot applications from XSS attacks by using custom annotations such as @XSS with an XssValidator and by implementing a request‑filter chain—including XssFilter and XssWrapper—to sanitize input, demonstrating through tests that both approaches reliably secure user data.

JavaSecuritySpring Boot
0 likes · 14 min read
XSS Defense in Spring Boot Applications
Efficient Ops
Efficient Ops
May 30, 2016 · Information Security

Why Weak Passwords and Unpatched Redis Threaten Operational Security

The article explains how weak passwords, misconfigured services like Redis, careless port changes, and leaked data enable attackers to compromise servers and internal networks, illustrating each risk with real‑world case studies and offering practical mitigation advice for robust ops security.

Redis vulnerabilitydata breachincident response
0 likes · 11 min read
Why Weak Passwords and Unpatched Redis Threaten Operational Security