Tagged articles
2152 articles
Page 13 of 22
Python Crawling & Data Mining
Python Crawling & Data Mining
Jul 31, 2022 · Information Security

10 Hidden Python Security Pitfalls Every Developer Must Avoid

This article reveals ten little‑known Python security pitfalls—from optimized‑away asserts and directory permission quirks to URL parsing quirks and Unicode normalization issues—explaining each flaw, its impact, and how to mitigate it, helping developers safeguard their code.

Code reviewbest practicessecurity
0 likes · 17 min read
10 Hidden Python Security Pitfalls Every Developer Must Avoid
AntTech
AntTech
Jul 30, 2022 · Fundamentals

Open Source Core Infrastructure: Ant Group’s Strategy and Key Projects

In his keynote at the 2022 Open Atom Global Open Source Summit, He Zhengyu outlined Ant Group’s open‑source strategy, highlighting over 900 repositories and key projects such as OceanBase, SOFA Mesh, MOSN, BabaSSL, Occlum, and the upcoming TuGraph, emphasizing how open core infrastructure drives industry innovation and ecosystem growth.

Ant GroupCloud NativeInfrastructure
0 likes · 9 min read
Open Source Core Infrastructure: Ant Group’s Strategy and Key Projects
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jul 29, 2022 · Information Security

How Android’s Binder Uses SELinux to Enforce Secure IPC Permissions

This article examines Android’s Binder inter‑process communication mechanism, detailing how SELinux integrates with the /dev/binder driver, the role of ServiceManager as ContextManager, the definition of binder‑related permissions, and the kernel‑level security hooks that enforce SEAndroid checks during binder transactions.

AndroidBinderIPC
0 likes · 20 min read
How Android’s Binder Uses SELinux to Enforce Secure IPC Permissions
Architect
Architect
Jul 28, 2022 · Information Security

Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and emails in MySQL and Java applications by combining SQL string functions with the MyBatis‑Mate Sensitive Jackson plugin, providing complete configuration, custom strategies, and runnable Spring Boot examples.

MyBatisSpring Bootdata masking
0 likes · 9 min read
Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson
Programmer DD
Programmer DD
Jul 27, 2022 · Information Security

Secure Your Linux SSH: 8 Essential Hardening Steps

This guide walks through eight essential steps to harden SSH on Linux servers, including disabling root login, changing the default port, restricting password usage, limiting authentication attempts, enforcing protocol 2, disabling forwarding, using key-based authentication, and applying IP-based access controls.

ConfigurationLinuxServer
0 likes · 8 min read
Secure Your Linux SSH: 8 Essential Hardening Steps
DaTaobao Tech
DaTaobao Tech
Jul 26, 2022 · Frontend Development

Evolution of Web Container Architecture: From AEF to CEF and Future Enhancements

The QianNiu client migrated its custom Application Embedded Framework to Chromium Embedded Framework, introducing a multi‑process architecture with isolated browser and render processes, remote RPC components, unified JS injection, render‑group optimization, comprehensive network interception, white‑screen detection, and plans for memory reclamation and further security hardening.

AEFBrowser ArchitectureCEF
0 likes · 12 min read
Evolution of Web Container Architecture: From AEF to CEF and Future Enhancements
DevOps Cloud Academy
DevOps Cloud Academy
Jul 26, 2022 · Operations

9 DevOps Best Practices: What You Should Do and Not Do

This article outlines nine essential DevOps best practices—from fostering a collaborative, blameless culture and adopting CI/CD, automated testing, observability, and IaC, while also highlighting common anti‑patterns such as isolated DevOps teams, hero reliance, and unchecked tool sprawl.

DevOpsautomationci/cd
0 likes · 13 min read
9 DevOps Best Practices: What You Should Do and Not Do
21CTO
21CTO
Jul 25, 2022 · Fundamentals

Why HTTP/3 and QUIC Are Revolutionizing Web Performance

This article explains how HTTP/3, built on the QUIC transport, improves latency, reliability, and security compared to earlier HTTP versions, outlines its adoption across browsers and CDNs, and lists language libraries for developers to start implementing the new protocol.

HTTP/3Network ProtocolsQUIC
0 likes · 7 min read
Why HTTP/3 and QUIC Are Revolutionizing Web Performance
ITPUB
ITPUB
Jul 25, 2022 · Information Security

How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint

This article details 58.com’s end‑to‑end approach to securing mobile, H5, and server SDKs—covering security fundamentals, the 5A methodology, the 金盾 architecture, integration steps, data‑flow encryption, comprehensive risk‑based testing, performance evaluation, and release decision making.

Information SecurityMobileSDK
0 likes · 18 min read
How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint
Selected Java Interview Questions
Selected Java Interview Questions
Jul 22, 2022 · Backend Development

WeChat Open Platform QR Code Login Integration with Spring Boot

This article explains how to implement WeChat QR code login using OAuth2.0 in a Spring Boot backend, detailing the authorization flow, required configuration, code examples for obtaining access tokens, user authentication, Spring AOP login verification, and exception handling to securely integrate WeChat login into a Java application.

OAuth2QR loginSpring Boot
0 likes · 11 min read
WeChat Open Platform QR Code Login Integration with Spring Boot
Alibaba Cloud Native
Alibaba Cloud Native
Jul 21, 2022 · Information Security

Why Ingress Nginx’s Architecture Exposes Critical Vulnerabilities and How MSE Cloud‑Native Gateway Secures Them

The article analyzes three recent high‑severity CVEs in the Kubernetes Ingress Nginx project, explains how its combined control‑plane and data‑plane design creates serious security and stability risks, and demonstrates how the MSE cloud‑native gateway’s separated architecture and xDS‑based configuration provide a safer, more reliable alternative.

CVECloud NativeKubernetes
0 likes · 10 min read
Why Ingress Nginx’s Architecture Exposes Critical Vulnerabilities and How MSE Cloud‑Native Gateway Secures Them
Liangxu Linux
Liangxu Linux
Jul 20, 2022 · Information Security

How to Harden SSH on Linux: 8 Essential Security Steps

This guide explains why the default SSH configuration is risky and provides eight concrete actions—including disabling root login, changing the default port, limiting authentication attempts, and using key‑based authentication—to secure Linux servers against common attacks.

ConfigurationHardeningLinux
0 likes · 8 min read
How to Harden SSH on Linux: 8 Essential Security Steps
Liangxu Linux
Liangxu Linux
Jul 19, 2022 · Information Security

Why Linux Often Skips Antivirus and Firewall – Understanding Its Security Model

Linux is generally more secure than other desktop operating systems, so many users wonder whether antivirus software or a firewall is necessary; this article explains the technical reasons why Linux typically does not need them, outlines the limits of protection, and offers practical security tips.

AntivirusLinuxPermissions
0 likes · 8 min read
Why Linux Often Skips Antivirus and Firewall – Understanding Its Security Model
Architect
Architect
Jul 19, 2022 · Information Security

Custom Logback Desensitization Component: Configuration and Usage Guide

This article introduces a Logback desensitization component for Java applications, explains two common masking approaches, compares their pros and cons, and provides step‑by‑step instructions—including Maven dependency, appender replacement, YAML configuration, supported data types, matching rules, custom regex, and jar installation—to securely mask sensitive information in logs.

data maskingdesensitizationlogback
0 likes · 12 min read
Custom Logback Desensitization Component: Configuration and Usage Guide
ITPUB
ITPUB
Jul 17, 2022 · Backend Development

36 Essential Tips for Designing Robust Backend APIs

This comprehensive guide presents 36 practical recommendations for backend engineers, covering parameter validation, compatibility, extensibility, idempotency, error handling, logging, performance optimization, caching, rate limiting, security, transaction management, and clear communication to help design reliable, maintainable, and scalable service interfaces.

BackendScalabilityapi-design
0 likes · 27 min read
36 Essential Tips for Designing Robust Backend APIs
IT Services Circle
IT Services Circle
Jul 17, 2022 · Frontend Development

Bypassing WeChat Mini‑Program JavaScript Interpreter Restrictions with a Bytecode VM Hidden in Images

This article explains how to circumvent WeChat's ban on JavaScript interpreters in mini‑programs by compiling JavaScript to a compact bytecode, embedding the bytecode in an image's alpha channel, and executing it with a lightweight custom virtual machine, while also discussing why such hot‑updates cannot be fundamentally blocked.

Bytecode VMCode Hot UpdateJavaScript
0 likes · 12 min read
Bypassing WeChat Mini‑Program JavaScript Interpreter Restrictions with a Bytecode VM Hidden in Images
AntTech
AntTech
Jul 14, 2022 · Information Security

HyperEnclave: An Open and Cross‑Platform Trusted Execution Environment

The article introduces HyperEnclave, an open and cross‑platform Trusted Execution Environment that overcomes hardware‑binding limitations of traditional TEEs, supports multiple CPU architectures, offers three flexible enclave modes, and demonstrates superior performance across diverse workloads while maintaining strong security guarantees.

HyperEnclavecross‑platformsecurity
0 likes · 4 min read
HyperEnclave: An Open and Cross‑Platform Trusted Execution Environment
Open Source Linux
Open Source Linux
Jul 14, 2022 · Information Security

Why Mapping Docker Ports to 127.0.0.1 Isn’t Safe – Exploit and Fix

A recent Docker security issue shows that publishing container ports to 127.0.0.1 does not prevent external access, because Docker adds an iptables rule that forwards traffic to the container’s internal IP, allowing attackers on the same network to reach the service.

Vulnerabilityiptablesport mapping
0 likes · 7 min read
Why Mapping Docker Ports to 127.0.0.1 Isn’t Safe – Exploit and Fix
WeDoctor Frontend Technology
WeDoctor Frontend Technology
Jul 14, 2022 · Backend Development

How to Safely Upgrade npm Dependencies and Keep Your Project Healthy

This guide explains why and how to assess the health of npm dependencies, outlines a step‑by‑step upgrade process, highlights tools like npm outdated, npm audit, depcheck, and offers practical advice on changelog review, lock‑file management, and distinguishing dependencies from devDependencies.

DevOpsNode.jsdependency management
0 likes · 13 min read
How to Safely Upgrade npm Dependencies and Keep Your Project Healthy
DevOps Cloud Academy
DevOps Cloud Academy
Jul 11, 2022 · Information Security

Understanding DevOps, SecOps, and DevSecOps: Definitions, Benefits, and Choosing the Right Approach

This article explains the concepts of DevOps, SecOps, and DevSecOps, outlines their core principles and benefits, compares their focus on collaboration, automation, and security, and provides guidance on selecting the most suitable approach for organizations seeking integrated development, operations, and security practices.

CollaborationDevOpsDevSecOps
0 likes · 7 min read
Understanding DevOps, SecOps, and DevSecOps: Definitions, Benefits, and Choosing the Right Approach
Top Architect
Top Architect
Jul 11, 2022 · Information Security

Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot

This article explains how to integrate the CAS (Central Authentication Service) single sign‑on solution into a Spring Boot backend by adding necessary dependencies, configuring a series of CAS filters, creating a custom MyAuthenticationFilter to handle AJAX requests, and demonstrating a Vue.js frontend that interacts with the authentication flow, complete with screenshots of the login, ticket validation, and logout processes.

AuthenticationCASSingle Sign-On
0 likes · 14 min read
Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot
Cloud Native Technology Community
Cloud Native Technology Community
Jul 5, 2022 · Cloud Native

Trends and Use Cases of Cloud‑Native Networking

This article analyses the rapid evolution of cloud‑native networking, identifies key challenges across traditional, data‑center, edge, multi‑cluster, financial, and telecom scenarios, and presents open‑source and commercial solutions such as Kube‑OVN, Underlay networks, flexible IPAM, and hardware‑software acceleration.

CNIEdge ComputingKube-OVN
0 likes · 14 min read
Trends and Use Cases of Cloud‑Native Networking
Sensors Frontend
Sensors Frontend
Jul 5, 2022 · Frontend Development

Essential Frontend Articles: Babel 7.18 Issues, TypeScript Migration, Monitoring & JS Security

This roundup presents a curated list of recent frontend development articles covering Babel 7.18 upgrade issues, TypeScript migration strategies, monitoring system design, JavaScript security techniques, ES2022 features, React Native Skia integration, GraphQL BFF practices, and thoughts on software complexity.

ElectronGraphQLJavaScript
0 likes · 5 min read
Essential Frontend Articles: Babel 7.18 Issues, TypeScript Migration, Monitoring & JS Security
Code Ape Tech Column
Code Ape Tech Column
Jul 5, 2022 · Information Security

Understanding and Implementing HttpBasic Authentication in Spring Security

This article explains the classic HttpBasic authentication mode in Spring Security, its limited use cases, how to integrate it with a Spring Boot project by adding Maven dependencies and configuration code, and details the underlying Base64‑based mechanism with step‑by‑step illustrations.

AuthenticationBackendHttpBasic
0 likes · 6 min read
Understanding and Implementing HttpBasic Authentication in Spring Security
DevOps
DevOps
Jul 1, 2022 · Information Security

Understanding DevSecOps: Concepts, Benefits, and Practical Implementation

This article explains what DevSecOps is, why traditional security approaches no longer suffice in fast‑paced software delivery, outlines its key advantages such as risk control and cost reduction, and provides detailed guidance on organizational, process, and technology practices—including tool recommendations and CI/CD pipeline integration—to embed security throughout the software lifecycle.

DevOpsDevSecOpsInfrastructure as Code
0 likes · 17 min read
Understanding DevSecOps: Concepts, Benefits, and Practical Implementation
Cloud Native Technology Community
Cloud Native Technology Community
Jun 30, 2022 · Cloud Native

Top 10 Kubernetes Application Security Hardening Techniques

This article presents ten practical methods for hardening Kubernetes application manifests, covering securityContext settings such as runAsUser, privileged mode, capabilities, read‑only root filesystem, privilege escalation, Seccomp, resource limits, image tagging, and optional AppArmor/SELinux policies, to reduce attack surface during development and deployment.

ContainersHardeningcloud-native
0 likes · 11 min read
Top 10 Kubernetes Application Security Hardening Techniques
21CTO
21CTO
Jun 29, 2022 · Fundamentals

What’s New in Git 2.37? Performance Boosts, Sparse Checkout & Security Fixes

Git 2.37 introduces a built‑in file‑system monitor for faster status checks, supports sparse checkout to avoid downloading whole repositories, adds performance‑enhancing stash improvements, and tightens credential‑in‑URL security, offering developers a more efficient and safer version‑control experience.

Gitperformancerelease
0 likes · 4 min read
What’s New in Git 2.37? Performance Boosts, Sparse Checkout & Security Fixes
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationAuthorizationGrant Types
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
OPPO Amber Lab
OPPO Amber Lab
Jun 29, 2022 · Information Security

Inside Android Bluetooth: Three Critical CVEs and Their Exploits

This article examines the complexity of the Bluetooth protocol stack, focusing on Android’s Host layer vulnerabilities, and provides detailed analyses of three critical CVEs—CVE‑2020‑27024 (SMP), CVE‑2021‑0918 (GATT), and CVE‑2021‑39805 (L2CAP)—including protocol overviews, code excerpts, and exploitation paths.

AndroidBluetoothCVE
0 likes · 13 min read
Inside Android Bluetooth: Three Critical CVEs and Their Exploits
Open Source Linux
Open Source Linux
Jun 28, 2022 · Operations

Essential Ops Lessons: 22 Hard‑Earned Rules to Prevent Disasters

Drawing from three and a half years of DevOps experience, this guide compiles critical operational practices—ranging from cautious command execution and strict change control to robust backup, security hardening, continuous monitoring, performance tuning, and a disciplined mindset—to help engineers avoid costly outages and data loss.

BackupDevOpsOperational Best Practices
0 likes · 12 min read
Essential Ops Lessons: 22 Hard‑Earned Rules to Prevent Disasters
Architects' Tech Alliance
Architects' Tech Alliance
Jun 27, 2022 · Fundamentals

What Is a SmartNIC? Features, Benefits, Types, and Future Outlook

The article explains what a SmartNIC (intelligent network interface card) is, how it differs from traditional NICs, its computing off‑load capabilities for networking, storage, and security, the problems it solves, various types, limitations, and its growing role in modern data‑center architectures.

Network Interface CardOffloadSmartNIC
0 likes · 10 min read
What Is a SmartNIC? Features, Benefits, Types, and Future Outlook
Java Backend Technology
Java Backend Technology
Jun 24, 2022 · Fundamentals

Why NanoID Is Faster, Smaller, and Safer Than UUID – A Deep Dive

NanoID, a modern alternative to UUID, offers significantly smaller IDs, up to 60% faster generation, stronger security via crypto APIs, customizable alphabets, and broad language support, making it a compelling choice for developers seeking efficient, compact, and secure unique identifiers across various platforms.

ID generationJavaScriptnanoid
0 likes · 8 min read
Why NanoID Is Faster, Smaller, and Safer Than UUID – A Deep Dive
IT Services Circle
IT Services Circle
Jun 23, 2022 · Information Security

Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions

This article provides an in‑depth overview of JSON Web Tokens (JWT), explaining their structure, authentication workflow, advantages such as statelessness and CSRF protection, drawbacks like revocation difficulty, and presents practical solutions including blacklist, secret rotation, short‑lived tokens and refresh‑token strategies.

AuthenticationBackendCSRF
0 likes · 13 min read
Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions
Efficient Ops
Efficient Ops
Jun 22, 2022 · Operations

Top 13 Essential Linux Ops Tools Every Sysadmin Should Master

This guide introduces thirteen practical Linux operations tools—from network bandwidth monitors like Nethogs to security scanners such as NMap—providing concise descriptions, installation commands, and usage tips to help system administrators efficiently manage and secure their servers.

OperationsSysadminmonitoring
0 likes · 12 min read
Top 13 Essential Linux Ops Tools Every Sysadmin Should Master
Liangxu Linux
Liangxu Linux
Jun 21, 2022 · Operations

Essential Linux Commands Every Sysadmin Should Master

A concise cheat‑sheet of frequently used Linux commands covering file searching, bulk moving, log cleanup, directory checks, text substitution with sed, network packet capture, firewall rules, and log analysis to boost sysadmin productivity.

CommandLineLinuxShell
0 likes · 6 min read
Essential Linux Commands Every Sysadmin Should Master
Top Architect
Top Architect
Jun 18, 2022 · Information Security

OAuth 2.0 Protocol Overview and Authorization Flows

This article provides a comprehensive introduction to the OAuth 2.0 protocol, explaining its core concepts, the roles of resource owner, client, authorization server and resource server, and detailing the four grant types—authorization code, implicit, resource‑owner password credentials, and client credentials—along with token request/response formats and refresh token usage.

AuthorizationGrant TypesOAuth2.0
0 likes · 23 min read
OAuth 2.0 Protocol Overview and Authorization Flows
IT Architects Alliance
IT Architects Alliance
Jun 18, 2022 · Information Security

OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types

This article provides a comprehensive introduction to OAuth 2.0, covering its purpose, core roles, token types, four main grant flows (authorization code, implicit, resource‑owner password, client credentials), token refresh mechanisms, and practical request/response examples for developers.

AuthorizationGrant TypesOAuth2.0
0 likes · 22 min read
OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types
DeWu Technology
DeWu Technology
Jun 17, 2022 · Mobile Development

Analyzing Android WebView Multi‑Process Initialization and Optimization

The article dissects Android WebView’s evolution to Chromium‑based multi‑process mode, explains the costly initialization steps—including thread checks, provider creation, and Chromium engine startup in a sandbox process—highlights common security pitfalls, and offers idle‑time pre‑initialization and request‑interception techniques to boost performance.

AndroidWebViewmulti-process
0 likes · 27 min read
Analyzing Android WebView Multi‑Process Initialization and Optimization
360 Quality & Efficiency
360 Quality & Efficiency
Jun 17, 2022 · Information Security

Understanding and Using Microsoft AppVerifier for Application Debugging and Security

This article explains what Microsoft AppVerifier is, how it helps detect memory corruption, security vulnerabilities, and privilege issues in Windows applications, and provides detailed download links, usage steps, configuration tips, common troubleshooting problems, and best‑practice recommendations for reliable testing.

AppVerifierMemoryWindows
0 likes · 8 min read
Understanding and Using Microsoft AppVerifier for Application Debugging and Security
Cloud Native Technology Community
Cloud Native Technology Community
Jun 13, 2022 · Information Security

2022 Cloud‑Native Threat Report: Key Findings on Kubernetes Attacks, Supply‑Chain Risks, and Log4j Exploits

The 2022 Cloud‑Native Threat Report reveals a rise in Kubernetes‑targeted attacks, persistent supply‑chain threats in container images, and active exploitation of the Log4j zero‑day, underscoring the urgent need for specialized security measures in modern cloud‑native environments.

KubernetesSupply Chaincloud-native
0 likes · 4 min read
2022 Cloud‑Native Threat Report: Key Findings on Kubernetes Attacks, Supply‑Chain Risks, and Log4j Exploits
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 8, 2022 · Fundamentals

eBPF Explained: Core Concepts, Use Cases, and Best Practices

eBPF is a kernel‑level sandbox technology that enables safe, high‑performance, programmable instrumentation for networking, security, and observability, and this article answers seven key questions covering its definition, applications, origins, usage steps, implementation details, best practices, and current ecosystem.

Kernel InstrumentationLinuxPerformance Monitoring
0 likes · 21 min read
eBPF Explained: Core Concepts, Use Cases, and Best Practices
IT Architects Alliance
IT Architects Alliance
Jun 3, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign-On using the CAS (Central Authentication Service) framework, covering the concepts of SSO and CAS, required development environment, server-side deployment, client configuration, and end‑to‑end testing with detailed code examples.

AuthenticationCASSSO
0 likes · 8 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration
MaGe Linux Operations
MaGe Linux Operations
Jun 2, 2022 · Information Security

How a Hacker Cracked Firefox in 8 Seconds: Inside the Pwn2Own Exploit

In the Pwn2Own 2022 competition, hacker Manfred Paul exploited two critical Firefox vulnerabilities in under eight seconds, earning $100,000, while the event also uncovered major bugs across Ubuntu, Tesla, Microsoft, and Safari, highlighting the real-world impact of rapid zero‑day exploits.

FirefoxPwn2OwnVulnerability
0 likes · 6 min read
How a Hacker Cracked Firefox in 8 Seconds: Inside the Pwn2Own Exploit
IT Architects Alliance
IT Architects Alliance
Jun 1, 2022 · Backend Development

Mastering Nginx: From Basics to Advanced Configurations and Security

This comprehensive guide explains what Nginx is, its core features, typical use cases, ecosystem extensions, installation methods, detailed configuration examples—including HTTPS, redirects, static mapping, proxying, rate limiting, authentication, load‑balancing strategies, and security hardening—plus an overview of its architecture and source‑code layout.

ConfigurationNginxWeb server
0 likes · 10 min read
Mastering Nginx: From Basics to Advanced Configurations and Security
macrozheng
macrozheng
Jun 1, 2022 · Backend Development

How to Upgrade the mall‑tiny Spring Boot Scaffold to 2.7.0: Tips and Code Changes

This article introduces the open‑source mall‑tiny rapid‑development scaffold, explains its core features and integration with the mall‑admin‑web front‑end, and provides a step‑by‑step guide to upgrading it to Spring Boot 2.7.0, covering Swagger, Spring Security, MyBatis‑Plus, circular‑dependency resolution, and CORS configuration.

Backendsecurityspring-boot
0 likes · 14 min read
How to Upgrade the mall‑tiny Spring Boot Scaffold to 2.7.0: Tips and Code Changes
DevOps Cloud Academy
DevOps Cloud Academy
May 31, 2022 · Information Security

Kubernetes Security Best Practices and Assessment Tools

This article outlines essential Kubernetes security principles based on the 4C model, discusses best practices for clusters, containers, and code, and reviews several open‑source tools such as Kubescape, kube‑bench, Terrascan, kube‑hunter, and Anchore for assessing and improving cluster security.

Cloud NativeDevOpsKubernetes
0 likes · 7 min read
Kubernetes Security Best Practices and Assessment Tools
Python Programming Learning Circle
Python Programming Learning Circle
May 30, 2022 · Information Security

Mozilla Blocks Malicious Firefox Add-ons “Bypass” and “Bypass XM” and Details Security Risks and Updates

Mozilla’s security team has blocked the malicious Firefox add-ons “Bypass” and “Bypass XM”, which abused the browser’s proxy API to hijack updates and bypass paywalls, affecting hundreds of thousands of users, and introduced new fallback mechanisms and a “Proxy Failover” extension in Firefox 93.

Add-onsFirefoxbrowser updates
0 likes · 5 min read
Mozilla Blocks Malicious Firefox Add-ons “Bypass” and “Bypass XM” and Details Security Risks and Updates
IT Services Circle
IT Services Circle
May 28, 2022 · Information Security

Xiaomi Engineer’s AOSP Commit to Block Shell Access to Installed APKs Rejected

An AOSP commit proposed by a Xiaomi engineer to prohibit shell extraction of installed APKs—citing potential IP leakage—was rejected after receiving only the author’s support and two opposing votes, with reviewers arguing that such restrictions are ineffective, could be bypassed, and should be handled via DRM or device‑specific policies.

AOSPAPKDRM
0 likes · 3 min read
Xiaomi Engineer’s AOSP Commit to Block Shell Access to Installed APKs Rejected
Programmer DD
Programmer DD
May 27, 2022 · Information Security

What’s New in Spring Authorization Server 0.3.0? Key Features and Changes

Spring Authorization Server 0.3.0 has been officially released, bringing updated documentation, major feature changes such as token customizer relocation, removal of deprecated APIs, dependency upgrades to Spring Boot 2.7.0 and Spring Security 5.7.1, and new contributors, with detailed module overviews and changelog links.

OAuth2Release NotesSpring Authorization Server
0 likes · 5 min read
What’s New in Spring Authorization Server 0.3.0? Key Features and Changes
IT Architects Alliance
IT Architects Alliance
May 24, 2022 · Information Security

Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT

This document explains the need for a unified account management system in enterprise cloud platforms, defines key terminology, outlines the advantages of token‑based authentication, describes the OAuth2 password‑grant flow and JWT usage, and details the technical design, interface specifications, and credential renewal process for secure cross‑service access.

JWTOAuth2access control
0 likes · 9 min read
Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT
IEG Growth Platform Technology Team
IEG Growth Platform Technology Team
May 23, 2022 · Information Security

Android 12 Security and Privacy Settings Overview

This article provides a comprehensive overview of Android 12's new security and privacy features, including the Privacy Information Center, location accuracy levels, package visibility filtering, deprecation of system‑dialog closing intents, app hibernation, permission group queries, microphone and camera toggles, and numerous other system‑level changes that affect app behavior and user experience.

AndroidAndroid12Permissions
0 likes · 21 min read
Android 12 Security and Privacy Settings Overview
macrozheng
macrozheng
May 18, 2022 · Backend Development

36 Essential Tips for Designing Robust Backend APIs

This article presents 36 practical guidelines for backend engineers covering interface parameter validation, compatibility, extensibility, idempotency, logging, error handling, security, rate limiting, caching, transaction management, and more, helping you design reliable, maintainable, and high‑performance APIs across any language.

BackendIdempotencyScalability
0 likes · 30 min read
36 Essential Tips for Designing Robust Backend APIs
Liangxu Linux
Liangxu Linux
May 12, 2022 · Information Security

Do CPUs Hide Secret Instructions? Uncovering the Dark Corners of the x86 ISA

This article explores whether modern CPUs contain undocumented or hidden instructions, explains the challenges of searching the variable‑length x86 ISA, presents a depth‑first algorithm that skips irrelevant bytes, shows how to infer instruction length using page‑fault side‑effects, and reveals discovered hidden opcodes on Intel and AMD processors.

CPUInstruction Sethidden instructions
0 likes · 10 min read
Do CPUs Hide Secret Instructions? Uncovering the Dark Corners of the x86 ISA
Code Ape Tech Column
Code Ape Tech Column
May 7, 2022 · Information Security

SQL Injection Attack Demonstration and Prevention in a Java Spring Application

This article explains how SQL injection can exploit a Java Spring course‑selection system by concatenating user input into SQL statements, demonstrates various injection techniques such as always‑true conditions and UNION queries, and provides multiple defensive measures including prepared statements, type checking, permission restrictions, and request‑parameter filtering.

SQL injectiondatabasejava
0 likes · 5 min read
SQL Injection Attack Demonstration and Prevention in a Java Spring Application
Top Architect
Top Architect
May 1, 2022 · Cloud Native

Podman vs Docker: A Comprehensive Comparison

This article provides an in‑depth comparison of Podman and Docker, covering their architectures, root‑less operation, security, integration with Kubernetes, support for Swarm/Compose, and practical guidance on when to choose or combine each container solution.

ContainerLinuxPodman
0 likes · 12 min read
Podman vs Docker: A Comprehensive Comparison
21CTO
21CTO
Apr 29, 2022 · Information Security

How Nimbuspwn Exploits systemd’s networkd-dispatcher for Root Access

Microsoft researchers uncovered the Nimbuspwn vulnerability in systemd’s networkd-dispatcher, detailing how directory‑traversal, symlink‑race, and TOCTOU flaws let attackers replace root‑owned scripts, achieve privilege escalation, and why coordinated patching across hundreds of Linux distributions is critical.

LinuxSystemdVulnerability
0 likes · 4 min read
How Nimbuspwn Exploits systemd’s networkd-dispatcher for Root Access
Sohu Tech Products
Sohu Tech Products
Apr 27, 2022 · Fundamentals

Understanding the ShadowRealm API: Isolated JavaScript Realms and Their Usage

The article introduces the ShadowRealm API, a new JavaScript proposal that creates highly isolated execution realms, explains its type signatures, demonstrates .evaluate() and .importValue() methods with code examples, compares it to eval, Function, iframes, Web Workers, and Node.js vm, and outlines practical use cases such as plugin execution, testing, and web scraping.

IsolationJavaScriptShadowRealm
0 likes · 9 min read
Understanding the ShadowRealm API: Isolated JavaScript Realms and Their Usage
ITPUB
ITPUB
Apr 24, 2022 · Operations

What Happens When You Run These Dangerous Linux Commands?

This article explains several Linux commands—such as rm -rf, fork bombs, direct writes to block devices, and malicious script execution—that can irreversibly damage systems, detailing their effects, typical usage examples, and essential precautions to avoid catastrophic data loss.

LinuxSystem Administrationdangerous-commands
0 likes · 5 min read
What Happens When You Run These Dangerous Linux Commands?
Yunxuetang Frontend Team
Yunxuetang Frontend Team
Apr 24, 2022 · Frontend Development

Exploring Modern Front‑End Technologies and Security Practices

This article surveys a range of front‑end topics—including alternative web‑framework solutions, the rise of pnpm, JavaScript stack memory, TypeScript overloads, integrating Golang with Node.js, innovative development approaches, and essential network security insights—providing concise technical overviews and references.

JavaScriptTypeScriptWeb Development
0 likes · 4 min read
Exploring Modern Front‑End Technologies and Security Practices
Architecture Digest
Architecture Digest
Apr 24, 2022 · Operations

Comprehensive Checklist for Deploying Web Services on Kubernetes in Production

This article presents a detailed checklist covering general information, application requirements, security and compliance, CI/CD practices, Kubernetes configuration, monitoring, testing, and 24/7 service team readiness to ensure reliable production deployment of HTTP‑based web services on Kubernetes.

Kubernetesci/cdproduction deployment
0 likes · 10 min read
Comprehensive Checklist for Deploying Web Services on Kubernetes in Production
Liangxu Linux
Liangxu Linux
Apr 23, 2022 · Information Security

How to Generate Strong Linux Passwords and Verify Their Strength

This tutorial explains how to create complex, high‑entropy passwords on Linux using GPG or OpenSSL, optionally filter out special characters with sed, and then assess password strength with the cracklib‑check tool on CentOS 8, illustrating both weak and strong examples.

GPGOpenSSLcracklib
0 likes · 4 min read
How to Generate Strong Linux Passwords and Verify Their Strength
Java High-Performance Architecture
Java High-Performance Architecture
Apr 19, 2022 · Fundamentals

What’s New in IntelliJ IDEA 2022.1? Explore the Latest IDE Features

IntelliJ IDEA 2022.1 introduces a Dependency Analyzer for conflict resolution, an enhanced New Project wizard, a dedicated Notifications tool window, extensive language and framework support—including Java 18, Kotlin 1.6.20, Go microservices, Kubernetes, and improved security scanning—plus numerous usability upgrades such as uniform tab splitting, UML export formats, and a Gradle progress bar.

Dependency AnalyzerIDE FeaturesIntelliJ IDEA
0 likes · 9 min read
What’s New in IntelliJ IDEA 2022.1? Explore the Latest IDE Features
Continuous Delivery 2.0
Continuous Delivery 2.0
Apr 19, 2022 · Fundamentals

Fifteen Guidelines for Ensuring a Healthy Software Supply Chain – Dependency Management (Part 2)

This article presents fifteen practical guidelines for managing software dependencies, covering pre‑inclusion checks such as design review, code quality, testing, security, licensing, and transitive dependencies, as well as post‑use practices like encapsulation, isolation, update strategies, and continuous monitoring to maintain a secure and reliable supply chain.

dependency managementrisk assessmentsecurity
0 likes · 19 min read
Fifteen Guidelines for Ensuring a Healthy Software Supply Chain – Dependency Management (Part 2)
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2022 · Cloud Native

How to Secure Kubernetes Secrets with Bitnami Sealed Secrets

Learn how to protect sensitive data in Kubernetes by encrypting secrets, using Bitnami Sealed Secrets or external secret managers, and safely storing encrypted manifests in Git, with step‑by‑step commands for installing kubeseal, creating sealed secrets, and deploying them as Kubernetes Secrets.

KubernetesSealedSecretssecrets
0 likes · 9 min read
How to Secure Kubernetes Secrets with Bitnami Sealed Secrets
Liangxu Linux
Liangxu Linux
Apr 17, 2022 · Artificial Intelligence

Can GitHub Copilot Replace Programmers? A Critical Look at AI Coding Assistants

This article examines GitHub Copilot’s code‑completion, comment‑driven generation, and repetitive‑task automation features, evaluates its accuracy and security concerns, and argues that while it can streamline mundane coding, it will not replace skilled programmers.

AI coding assistantGitHub Copilotcode-generation
0 likes · 8 min read
Can GitHub Copilot Replace Programmers? A Critical Look at AI Coding Assistants
Cloud Native Technology Community
Cloud Native Technology Community
Apr 14, 2022 · Information Security

Navigating Cloud‑Native Security: Six Critical Risks and DevSecOps Solutions

The article examines how rapid cloud‑native adoption reshapes application design and operations while introducing six distinct security risks, and proposes a comprehensive DevSecOps framework that integrates early‑stage security controls across infrastructure, compute, development, and management to protect modern containerized environments.

ContainerDevSecOpsKubernetes
0 likes · 13 min read
Navigating Cloud‑Native Security: Six Critical Risks and DevSecOps Solutions
IT Services Circle
IT Services Circle
Apr 14, 2022 · Frontend Development

Understanding the ShadowRealm API: Isolated JavaScript Execution Environments

This article introduces the ShadowRealm API, a new JavaScript proposal that creates independent, highly isolated realms for executing code, explains its type signatures, demonstrates .evaluate() and .importValue() methods with practical examples, and compares it with eval, Web Workers, iframes, and Node.js vm.

IsolationJavaScriptRuntime
0 likes · 10 min read
Understanding the ShadowRealm API: Isolated JavaScript Execution Environments
Top Architect
Top Architect
Apr 12, 2022 · Databases

Key New Features and Changes in Elasticsearch 8.0 Release

Elasticsearch 8.0 introduces major updates including 7.x REST API compatibility headers, default-enabled security with registration tokens, system index protection, a preview KNN search API using dense_vector, storage‑saving field mappings, faster geo indexing, PyTorch model support, and numerous deprecations and configuration changes across aggregations, allocation, analysis, authentication, and core infrastructure.

ElasticsearchRelease Notessearch engine
0 likes · 9 min read
Key New Features and Changes in Elasticsearch 8.0 Release
58 Tech
58 Tech
Apr 12, 2022 · Mobile Development

Fair 2.0: Complete Integration and Usage Guide for Flutter Projects

This article provides a step‑by‑step tutorial on integrating the Fair 2.0 dynamic framework into Flutter applications, covering dependency setup, widget conversion, bundle generation, runtime loading, parameter passing, navigation, plugin bridging, performance evaluation, update strategies, security checks, and practical lessons learned from its deployment in the 58 拍客 app.

Hot UpdateMobile Developmentperformance
0 likes · 12 min read
Fair 2.0: Complete Integration and Usage Guide for Flutter Projects
MaGe Linux Operations
MaGe Linux Operations
Apr 11, 2022 · Fundamentals

Mastering DNS: From Basics to Advanced Configuration and Security

This comprehensive guide explains the DNS system, its distributed architecture, protocol nuances, hierarchical naming structure, resolution process, caching, smart routing, BIND configuration, load balancing, subdomain delegation, debugging tools, and security considerations such as amplification attacks.

BINDDNSDomain Name System
0 likes · 19 min read
Mastering DNS: From Basics to Advanced Configuration and Security
IT Services Circle
IT Services Circle
Apr 9, 2022 · Information Security

How to Identify and Avoid Fake Chrome Browser Downloads

The article explains how counterfeit Chrome browsers proliferate in China, how search engine ads and misleading download pages trick users into installing malicious software, and provides a reliable method to obtain the genuine offline Chrome installer to protect against these security threats.

ChromeDownload SafetyFake Browser
0 likes · 6 min read
How to Identify and Avoid Fake Chrome Browser Downloads
Top Architect
Top Architect
Apr 5, 2022 · Information Security

Understanding JSON Web Token (JWT): Structure, Creation, and Signature

This article explains the lightweight JWT specification, demonstrates how to build a token with header, payload, and signature using Base64 encoding and Node.js, and discusses its security properties, verification process, and suitable use cases for web authentication.

AuthenticationBase64JWT
0 likes · 9 min read
Understanding JSON Web Token (JWT): Structure, Creation, and Signature
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2022 · Operations

9 Compelling Reasons Developers Choose Linux Over Other OSes

This article outlines nine key reasons why developers favor Linux—ranging from its powerful command line and strong security to low resource usage, privacy protection, free licensing, and extensive community support—making it a reliable, developer‑friendly operating system for desktops, servers, and embedded devices.

Linuxdeveloper toolsperformance
0 likes · 7 min read
9 Compelling Reasons Developers Choose Linux Over Other OSes
21CTO
21CTO
Mar 28, 2022 · Backend Development

What Java Trends Will Shape 2022? From LTS Migration to Cloud and Security

This article examines the major Java trends for 2022, including the push to migrate from Java 8 to newer LTS releases, improved cloud and container support, multi‑platform advancements, security lessons from Log4Shell, and upcoming features in Java 18.

LTSRISC-Vaarch64
0 likes · 10 min read
What Java Trends Will Shape 2022? From LTS Migration to Cloud and Security
ITPUB
ITPUB
Mar 28, 2022 · Fundamentals

What’s New in Windows 11 Sun Valley 2 (22H2) – Key UI and Security Updates

Microsoft’s upcoming Windows 11 Sun Valley 2 (22H2) update, codenamed SV2, brings a series of refined UI changes such as a revamped Alt+Tab, File Explorer tabs, new personalization options, plus security enhancements like Smart App Control, all rolled out gradually through the Insider preview builds.

WindowsWindows 11build-22579
0 likes · 11 min read
What’s New in Windows 11 Sun Valley 2 (22H2) – Key UI and Security Updates
Python Programming Learning Circle
Python Programming Learning Circle
Mar 26, 2022 · Information Security

Generating Image Captcha in Python Using graphic-verification-code and captcha Libraries

This tutorial demonstrates two Python approaches for creating image verification codes—using the graphic-verification-code library for a quick four‑line solution and the captcha library for customizable random captchas—complete with installation commands, code examples, and sample outputs.

Captchacaptcha-librarycode-example
0 likes · 3 min read
Generating Image Captcha in Python Using graphic-verification-code and captcha Libraries
Top Architect
Top Architect
Mar 26, 2022 · Information Security

Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview

This article explains the necessity of a unified account management system for enterprise applications, defines key authentication terms, outlines the background and goals of token-based security, details the OAuth2 password‑grant flow with JWT, and discusses technical choices, interface design, and token renewal processes.

JWTMicroservicesOAuth2
0 likes · 9 min read
Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview