Tagged articles
4 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 2, 2026 · Information Security

Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation

This article walks operations engineers through the most frequent security‑configuration problems encountered during Grade‑Protection (等保) remediation, detailing the regulatory background, specific compliance gaps, step‑by‑step remediation commands for Linux systems, verification methods, FAQs, and a practical implementation workflow.

AuditdGrade ProtectionLinux Hardening
0 likes · 28 min read
Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation
Java Architecture Diary
Java Architecture Diary
Jan 17, 2025 · Information Security

Why Spring Security 7.0 Forces Lambda DSL and How to Migrate Your Configurations

Spring Security 7.0 drops the traditional chain‑style configuration in favor of a new Lambda DSL, offering clearer hierarchy, type safety, and IDE support; the article explains the breaking change, compares old and new syntax, provides migration examples, and shares tips for custom DSLs and WebFlux security.

Backend DevelopmentLambda DSLSecurity Configuration
0 likes · 9 min read
Why Spring Security 7.0 Forces Lambda DSL and How to Migrate Your Configurations
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jan 2, 2024 · Information Security

Master Spring Security: Custom Configurations, Filters, and Advanced Features

An in‑depth Spring Security guide covering custom configurations, authentication providers, user‑details services, path‑based authorization, role hierarchies, exception handling, custom filters, multiple filter chains, method security, internationalization, and session management, complete with practical code examples for Spring Boot 2.7.

AuthenticationAuthorizationJava
0 likes · 10 min read
Master Spring Security: Custom Configurations, Filters, and Advanced Features