Tagged articles
2152 articles
Page 14 of 22
Top Architect
Top Architect
Mar 26, 2022 · Information Security

Why NanoID Is Replacing UUID: Features, Advantages, and Limitations

This article explains how NanoID, a compact and faster alternative to UUID, offers better security, smaller size, higher performance, and broad language support, while also discussing its limitations and future prospects for unique identifier generation in software development.

JavaScriptnanoidperformance
0 likes · 8 min read
Why NanoID Is Replacing UUID: Features, Advantages, and Limitations
Programmer DD
Programmer DD
Mar 26, 2022 · Information Security

What’s New in Spring Authorization Server 0.2.3? Explore Key Features and Code

Spring Authorization Server 0.2.3 introduces default client settings for public clients, splits OAuth2 client authentication providers, optimizes the in‑memory authorization service, adds federated‑identity demos, unifies token generation via OAuth2TokenGenerator, and upgrades core dependencies, with code examples illustrating each enhancement.

OAuth2Spring Authorization ServerToken Generation
0 likes · 7 min read
What’s New in Spring Authorization Server 0.2.3? Explore Key Features and Code
DevOps
DevOps
Mar 25, 2022 · Information Security

12 Best Practices for Securing Kubernetes (K8s) Environments

This article outlines twelve essential best‑practice steps—including updating to the latest stable release, enforcing PodSecurityPolicy, using namespaces, applying network policies, and hardening API server, scheduler, controller‑manager, etcd, and kubelet settings—to comprehensively secure a Kubernetes cluster.

Cluster HardeningDevOpsbest practices
0 likes · 11 min read
12 Best Practices for Securing Kubernetes (K8s) Environments
Zhuanzhuan Tech
Zhuanzhuan Tech
Mar 23, 2022 · Information Security

Design and Implementation of the Cleaner Anti‑Crawler System for Real‑Time Threat Mitigation

The article presents a comprehensive design of the Cleaner anti‑crawler system, detailing its background, current challenges, related research, system architecture—including data processing, ban center, and ban store modules built on Flink, MQ, and Redis—implementation details, effectiveness evaluation, and concluding insights on achieving real‑time accuracy in protecting platform data.

BackendReal-Timeanti‑crawler
0 likes · 17 min read
Design and Implementation of the Cleaner Anti‑Crawler System for Real‑Time Threat Mitigation
Architecture Digest
Architecture Digest
Mar 20, 2022 · Information Security

Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices

This guide provides a detailed, step‑by‑step hardening strategy for Linux systems, covering distro selection, kernel choices, extensive sysctl tweaks, boot‑loader parameters, MAC policies, sandboxing, memory allocator hardening, compile‑time mitigations, root account protection, firewall rules, swap configuration, PAM policies, microcode updates, IPv6 privacy, partition mounting options, entropy sources, and physical security measures.

HardeningLinuxboot
0 likes · 51 min read
Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices
Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 15, 2022 · Databases

Using MySQL 8.0.27 Multi‑Factor Authentication with the authentication_policy Variable

This article explains how MySQL 8.0.27 adds multi‑factor authentication (MFA) via the new authentication_policy system variable, demonstrates configuring the variable, creating users with single or multiple authentication plugins, installing external plugins, and verifies MFA behavior with practical Docker‑based examples.

MFAauthentication_policydatabases
0 likes · 10 min read
Using MySQL 8.0.27 Multi‑Factor Authentication with the authentication_policy Variable
Top Architect
Top Architect
Mar 13, 2022 · Information Security

Techniques for Protecting Java Bytecode from Decompilation

This article explains why Java bytecode is easy to decompile and introduces several practical techniques—including isolation, class encryption, native code conversion, and various forms of code obfuscation—to increase the difficulty of reverse‑engineering Java applications.

Obfuscationclassloadercode protection
0 likes · 13 min read
Techniques for Protecting Java Bytecode from Decompilation
MaGe Linux Operations
MaGe Linux Operations
Mar 9, 2022 · Information Security

Why Minix Is the Hidden OS Powering Intel’s Management Engine

The article explains Minix’s origin as a teaching OS, its evolution into MINIX 3, its role inside Intel’s Management Engine, the security risks it introduces, and how it compares to Linux, highlighting why it may be the world’s most widely deployed operating system.

Intel Management EngineLinux ComparisonMINIX
0 likes · 6 min read
Why Minix Is the Hidden OS Powering Intel’s Management Engine
MaGe Linux Operations
MaGe Linux Operations
Mar 6, 2022 · Information Security

How Linux’s Random Number Generator Got a 8450% Speed Boost in 5.18

Under Jason Donenfeld’s leadership, Linux kernel’s random number generator was overhauled in versions 5.17 and 5.18, replacing SHA1 with BLAKE2s and shifting from per‑NUMA to per‑CPU structures, delivering up to a 131% speed increase and an astonishing 8450% boost in getrandom() performance on multi‑core systems.

BLAKE2sLinuxkernel
0 likes · 3 min read
How Linux’s Random Number Generator Got a 8450% Speed Boost in 5.18
360 Quality & Efficiency
360 Quality & Efficiency
Mar 4, 2022 · Information Security

Integrating Apache Shiro with Spring Boot: Core Components, Configuration, and Authentication Flow

This article provides a comprehensive guide on integrating Apache Shiro into a Spring Boot application, covering core components, Maven configuration, bean definitions, security manager setup, custom realms, filter chain configuration, and the complete login authentication flow with code examples.

Apache ShiroAuthenticationAuthorization
0 likes · 12 min read
Integrating Apache Shiro with Spring Boot: Core Components, Configuration, and Authentication Flow
IT Architects Alliance
IT Architects Alliance
Mar 3, 2022 · Information Security

Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT

This article outlines the design rationale, objectives, and technical choices for a unified, token‑based authentication system based on OAuth2 password grant and JWT, detailing terminology, workflow steps, security benefits, and interface specifications to enable cross‑system single sign‑on and secure access control.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT
Laravel Tech Community
Laravel Tech Community
Mar 2, 2022 · Backend Development

Generating a PNG CAPTCHA Image with PHP

This tutorial explains how to create a simple PNG CAPTCHA using PHP by generating a random four‑character code, drawing it with random rotation and position, adding noise lines and dots, and outputting the image for use in form validation.

CaptchaImage Generationsecurity
0 likes · 3 min read
Generating a PNG CAPTCHA Image with PHP
DataFunTalk
DataFunTalk
Mar 1, 2022 · Cloud Native

Alibaba Cloud Native Data Lake with Apache Iceberg: Architecture, Challenges, and Solutions

The presentation outlines Alibaba Cloud's native data lake solution built on Apache Iceberg, covering data lake fundamentals, cloud migration challenges, Iceberg's architecture and features, real‑time ingestion with Flink, unified metadata management, security guarantees, and testing practices to ensure reliable, scalable big‑data analytics.

Apache IcebergBig DataData Lake
0 likes · 16 min read
Alibaba Cloud Native Data Lake with Apache Iceberg: Architecture, Challenges, and Solutions
Top Architect
Top Architect
Feb 25, 2022 · Fundamentals

Understanding DNS Root Servers: Their Role, Operation, and Global Distribution

This article explains what DNS root servers are, how they function in the hierarchical name‑resolution process, why there are only thirteen IPv4 root addresses, where they are located worldwide—including China’s nodes—and lists common public DNS services for both IPv4 and IPv6.

DNSInternet infrastructureNetworking
0 likes · 10 min read
Understanding DNS Root Servers: Their Role, Operation, and Global Distribution
DevOps
DevOps
Feb 22, 2022 · Information Security

From DevOps to DevSecOps: Evolution, Benefits, and Implementation Challenges

This article traces the development of DevOps, explains how its evolution into DevSecOps integrates security early in the software lifecycle, outlines the resulting benefits of faster, cheaper, and safer delivery, and discusses the technical, cultural, and organizational challenges that must be overcome for successful adoption.

DevOpsDevSecOpsautomation
0 likes · 13 min read
From DevOps to DevSecOps: Evolution, Benefits, and Implementation Challenges
Top Architect
Top Architect
Feb 21, 2022 · Databases

Key New Features in Elasticsearch 8.0

Elasticsearch 8.0 introduces major updates including 7.x REST API compatibility headers, default-enabled security with registration tokens, known issues on ARM/macOS, a preview KNN search API using dense_vector, storage reductions for keyword and text fields, faster geo indexing, PyTorch model support, and numerous other enhancements across aggregations, allocation, analysis, authentication, and core infrastructure.

ElasticsearchPyTorchVersion 8
0 likes · 10 min read
Key New Features in Elasticsearch 8.0
Open Source Linux
Open Source Linux
Feb 21, 2022 · Fundamentals

Unlocking ARMv8‑A: How Stage‑2 Translation Powers Secure Virtualization

This article explains ARMv8‑A AArch64 virtualization support, covering Stage 2 page‑table translation, virtual exceptions, traps, hypervisor types, memory management, device emulation, interrupt handling, clock virtualization, VHE, nested virtualization, and the performance overhead of context switches.

ARMStage2Virtualization
0 likes · 33 min read
Unlocking ARMv8‑A: How Stage‑2 Translation Powers Secure Virtualization
21CTO
21CTO
Feb 17, 2022 · Backend Development

10 Essential API Design Rules for Consistent Backend Services

This guide presents a concise set of best‑practice rules for designing consistent, RESTful backend APIs—including naming conventions, URL structures, HTTP methods, versioning, pagination, security, and documentation tools—to help developers create clear, maintainable, and user‑friendly services.

BackendHTTP methodsURL conventions
0 likes · 9 min read
10 Essential API Design Rules for Consistent Backend Services
IT Services Circle
IT Services Circle
Feb 16, 2022 · Information Security

10 Unknown Security Pitfalls for Python

This article outlines ten lesser‑known Python security pitfalls—from optimized‑away asserts and directory permission quirks to path traversal, regex misuse, Unicode normalization attacks, and IP address normalization—illustrating how subtle language features can lead to serious vulnerabilities in real‑world applications.

Code reviewPythonbest practices
0 likes · 16 min read
10 Unknown Security Pitfalls for Python
MaGe Linux Operations
MaGe Linux Operations
Feb 15, 2022 · Backend Development

What’s New in Elasticsearch 8.0? Key Features, Security, and API Changes

Elasticsearch 8.0 introduces major updates including 7.x REST API compatibility headers, default-enabled security with enrollment tokens, protected system indices, a preview KNN search API, storage‑saving field encodings, faster geo indexing, and numerous deprecations and enhancements across aggregations, authentication, cluster coordination, and packaging.

API compatibilityElasticsearchindexing
0 likes · 10 min read
What’s New in Elasticsearch 8.0? Key Features, Security, and API Changes
Java High-Performance Architecture
Java High-Performance Architecture
Feb 15, 2022 · Backend Development

What’s New in Elasticsearch 8.0? Key Features, Security Enhancements, and Performance Boosts

Elasticsearch 8.0 introduces 7.x REST API compatibility headers, default‑on security features with automatic enrollment tokens, tighter protection of system indices, a preview KNN search API, storage‑saving field encodings, faster geo‑point and geo‑shape indexing, PyTorch model support, and a long list of deprecations and internal improvements.

BackendElasticsearchsearch engine
0 likes · 10 min read
What’s New in Elasticsearch 8.0? Key Features, Security Enhancements, and Performance Boosts
21CTO
21CTO
Feb 14, 2022 · Information Security

Why Adobe, JetBrains, and Google Are Racing to Patch Critical Vulnerabilities in 2022

Adobe released an emergency patch for a critical Magento zero‑day (CVE‑2022‑24086), JetBrains removed Log4j from the IntelliJ platform, and Google unveiled Android 13 "Tiramisu" with new privacy and UI enhancements, highlighting the industry's rapid response to security and usability challenges.

AdobeAndroid13Magento
0 likes · 6 min read
Why Adobe, JetBrains, and Google Are Racing to Patch Critical Vulnerabilities in 2022
Laravel Tech Community
Laravel Tech Community
Feb 13, 2022 · Backend Development

Key New Features and Changes in Elasticsearch 8.0 Release

Elasticsearch 8.0 introduces major updates such as 7.x REST API compatibility headers, default‑enabled security with enrollment tokens, protected system indices, a preview KNN search API, storage‑efficient field types, faster geo indexing, PyTorch model support, and numerous deprecations and bug fixes across aggregations, allocation, analysis, authentication, and core engine components.

APISearchsecurity
0 likes · 9 min read
Key New Features and Changes in Elasticsearch 8.0 Release
Big Data Technology & Architecture
Big Data Technology & Architecture
Feb 13, 2022 · Big Data

What's New in Elasticsearch 8.0 – Key Features and Changes

The article provides a comprehensive overview of Elasticsearch 8.0, highlighting major updates such as 7.x REST API compatibility headers, default-enabled security, system‑index protection, a new KNN search API, storage and indexing optimizations, PyTorch model support, and numerous deprecations and feature removals across the stack.

8.0APIBig Data
0 likes · 10 min read
What's New in Elasticsearch 8.0 – Key Features and Changes
Alibaba Terminal Technology
Alibaba Terminal Technology
Feb 11, 2022 · Operations

How to Execute a Multi‑Phase IPv6 Migration for Large‑Scale Services

This guide outlines a comprehensive, three‑stage IPv6 migration roadmap—including network upgrades, DNS/HTTPDNS redesign, security hardening, cloud and CDN adaptation, and mobile/app adjustments—to achieve full IPv6‑only support across infrastructure, services, and end‑users while ensuring seamless performance and security.

IPv6MobileNetwork Migration
0 likes · 22 min read
How to Execute a Multi‑Phase IPv6 Migration for Large‑Scale Services
Efficient Ops
Efficient Ops
Feb 8, 2022 · Information Security

Kubelet Misconfiguration Triggered a Mining Attack – What We Learned

After discovering a compromised node in our self‑built Kubernetes cluster that was being used for Monero mining, we traced the breach to empty iptables rules and a misconfigured kubelet allowing anonymous API access, then outlined firewall hardening, network isolation, and secure kubelet practices to prevent future intrusions.

Mining Attackfirewallkubelet
0 likes · 6 min read
Kubelet Misconfiguration Triggered a Mining Attack – What We Learned
Refining Core Development Skills
Refining Core Development Skills
Feb 8, 2022 · Fundamentals

Comprehensive Overview of DNS: Architecture, Query Process, Caching, and Security

This article provides a thorough introduction to the Domain Name System (DNS), covering its hierarchical design, query workflow, caching mechanisms, message structure, resource record types, and common security threats along with mitigation techniques, offering essential knowledge for networking fundamentals.

DNSDomain Name SystemNetworking
0 likes · 22 min read
Comprehensive Overview of DNS: Architecture, Query Process, Caching, and Security
IT Architects Alliance
IT Architects Alliance
Feb 7, 2022 · Backend Development

Best Practices for Consistent Backend API Design

This guide presents a concise set of best‑practice rules for designing consistent, RESTful backend APIs—including naming conventions, versioning, pagination, security, monitoring, and error handling—to improve developer experience and maintainability across microservice architectures.

HTTP methodsURL conventionsVersioning
0 likes · 10 min read
Best Practices for Consistent Backend API Design
21CTO
21CTO
Jan 29, 2022 · Information Security

How Linus Torvalds Exposed a GitHub Fake‑Commit Vulnerability

The article explains how a seemingly prank README submitted by Linus Torvalds leveraged a GitHub "fake‑commit" flaw, demonstrates the malformed URLs used to hide commits, and discusses related GitHub vulnerabilities that remain unpatched, offering insight for security‑aware developers.

GitHubLinus TorvaldsVulnerability
0 likes · 5 min read
How Linus Torvalds Exposed a GitHub Fake‑Commit Vulnerability
Refining Core Development Skills
Refining Core Development Skills
Jan 28, 2022 · Information Security

Detecting a Hidden Mining Virus in a Linux System: A Narrative

A dramatized Linux security incident shows how administrators use commands like top, ps, netstat, and the unhide tool to discover hidden mining processes, isolate suspicious network connections, and finally terminate the malicious hidden PID, illustrating practical techniques for rootkit detection and response.

LinuxRootkit DetectionSystem Calls
0 likes · 7 min read
Detecting a Hidden Mining Virus in a Linux System: A Narrative
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jan 26, 2022 · Information Security

No Vue Vulnerabilities: SonarQube Issue Is a Backend API Auth Flaw, Not a Front‑end Problem

Recent rumors claimed that foreign hacker groups were exploiting SonarQube and Vue.js to attack government and enterprise systems, but investigation shows the SonarQube flaw is a pure backend API authentication issue unrelated to Vue, and Vue itself has no known security vulnerabilities when standard front‑end safety practices are followed.

API authenticationSonarQubeVue.js
0 likes · 6 min read
No Vue Vulnerabilities: SonarQube Issue Is a Backend API Auth Flaw, Not a Front‑end Problem
DevOps
DevOps
Jan 21, 2022 · Information Security

Enterprise DevSecOps: Integrating Security into DevOps

This article provides a comprehensive guide to implementing DevSecOps in enterprises, covering fundamental principles, collaboration between security and development teams, integration of security testing, building a secure toolchain, and practical strategies for scaling security within DevOps pipelines.

DevOpsDevSecOpsSAST
0 likes · 62 min read
Enterprise DevSecOps: Integrating Security into DevOps
Architects' Tech Alliance
Architects' Tech Alliance
Jan 20, 2022 · Industry Insights

Why NVIDIA’s BlueField DPU Is Redefining Modern Data Center Architecture

The 2021 China DPU Industry Whitepaper outlines how NVIDIA’s BlueField DPU series—BlueField‑2, the upcoming 400 Gb/s BlueField‑3, and future BlueField‑4—offload and accelerate networking, storage, security, and AI workloads, offering programmable ARM cores, high‑performance NICs, and a rich DOCA ecosystem that reshapes data‑center infrastructure.

BlueFieldDOCADPU
0 likes · 14 min read
Why NVIDIA’s BlueField DPU Is Redefining Modern Data Center Architecture
Architecture Digest
Architecture Digest
Jan 17, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation

This article explains the principles and workflow of Single Sign-On (SSO) using OAuth2.0, illustrates the process with a real‑life scenario, compares multi‑point and single‑point login, and provides a complete Spring Boot example for building an authorization server, client, and role‑based access control in micro‑service architectures.

AuthenticationAuthorizationMicroservices
0 likes · 10 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation
Programmer DD
Programmer DD
Jan 15, 2022 · Information Security

Why Did a Developer Sabotage Popular npm Packages Colors and Faker?

A wave of developers discovered their applications spewing garbled output after a malicious update to the widely used npm libraries colors and faker, revealing a deliberate sabotage by maintainer Marak Squires that sparked heated debate over open‑source ethics, corporate exploitation, and security responsibilities.

Fakercolorsnpm
0 likes · 9 min read
Why Did a Developer Sabotage Popular npm Packages Colors and Faker?
DevOps Engineer
DevOps Engineer
Jan 14, 2022 · Operations

Dockerfile and Docker Image Best Practices for Python Developers

This article presents a comprehensive set of Dockerfile and Docker image best‑practice recommendations—including multi‑stage builds, command ordering, minimal base images, layer reduction, unprivileged containers, proper use of COPY versus ADD, caching strategies, health checks, image signing, and resource limits—to help Python developers create smaller, more secure, and maintainable container images.

Dockerfilebest-practicescontainerization
0 likes · 29 min read
Dockerfile and Docker Image Best Practices for Python Developers
Open Source Linux
Open Source Linux
Jan 11, 2022 · Cloud Native

Why Bare‑Metal Kubernetes Beats Virtual Machines: 6 Compelling Advantages

This article explains why deploying Kubernetes on bare‑metal servers offers six key benefits—simpler networking, better cost efficiency for demanding workloads, superior performance, stronger security, workload‑specific optimization, and freedom from vendor lock‑in—making it a smarter choice than virtual‑machine‑based solutions.

Bare MetalCloud NativeKubernetes
0 likes · 7 min read
Why Bare‑Metal Kubernetes Beats Virtual Machines: 6 Compelling Advantages
IT Architects Alliance
IT Architects Alliance
Jan 11, 2022 · Cloud Computing

Understanding SaaS Architecture: Layers, Multi‑Tenant Design, and Core Components

This article explains SaaS as a software‑delivery model, outlines its presentation, scheduling, business, and data layers, describes essential components such as security, data isolation, configurability, scalability, zero‑downtime upgrades, and multi‑tenant support, and details maturity levels, storage options, tenant identification, and performance optimizations.

SaaSScalabilityarchitecture
0 likes · 14 min read
Understanding SaaS Architecture: Layers, Multi‑Tenant Design, and Core Components
Top Architect
Top Architect
Jan 9, 2022 · Backend Development

Designing a Multi‑Account Unified Login System: Schemas, Flows, and Optimizations

This article explains how to design a scalable multi‑account login system by describing self‑built phone‑number authentication, optimized password‑less registration, third‑party OAuth integration, database schema separation, and one‑click carrier‑based login, while highlighting advantages, drawbacks, and implementation details.

AuthenticationBackendDatabase design
0 likes · 16 min read
Designing a Multi‑Account Unified Login System: Schemas, Flows, and Optimizations
DataFunSummit
DataFunSummit
Jan 9, 2022 · Artificial Intelligence

Applying Graph Neural Networks to Fraud Detection: Background, Research Progress, Methods, and Resources

This article reviews the fundamentals of fraud, surveys the evolution of graph neural network research for fraud detection, outlines practical application steps, discusses key challenges such as disguise, scalability, and label scarcity, and provides representative papers, new research directions, industrial case studies, and open-source resources.

AIGNNfraud detection
0 likes · 23 min read
Applying Graph Neural Networks to Fraud Detection: Background, Research Progress, Methods, and Resources
Architect
Architect
Jan 5, 2022 · Cloud Native

Introduction to Service Mesh and Istio: Concepts, Architecture, and Hands‑On Guide

This tutorial explains the fundamentals of service mesh, outlines Istio’s architecture and core components, demonstrates how to install Istio on Kubernetes, and walks through practical examples such as traffic routing, security policies, observability, and common use‑cases, while also comparing alternative solutions.

IstioKubernetesMicroservices
0 likes · 20 min read
Introduction to Service Mesh and Istio: Concepts, Architecture, and Hands‑On Guide
NiuNiu MaTe
NiuNiu MaTe
Jan 2, 2022 · Fundamentals

Why Receiving a TCP RST Doesn’t Always Close the Connection

This article explains the purpose of the TCP RST flag, how the kernel and application layers detect it, the various scenarios that trigger RST, why an RST may not terminate a connection, and the security implications of RST attacks.

Linux kernelRSTTCP
0 likes · 15 min read
Why Receiving a TCP RST Doesn’t Always Close the Connection
HomeTech
HomeTech
Dec 29, 2021 · Information Security

2021 npm Year‑End Review: Major Releases, Supply‑Chain Attacks, and Future Outlook

The article reviews npm’s 2021 milestones—including the official release of npm 7.0 with performance gains and new features—while highlighting a wave of supply‑chain attacks on popular packages, discussing the rise of Corepack, and offering a forward‑looking perspective on the ecosystem’s challenges and opportunities.

CorepackNode.jsSupply Chain
0 likes · 9 min read
2021 npm Year‑End Review: Major Releases, Supply‑Chain Attacks, and Future Outlook
DevOps Cloud Academy
DevOps Cloud Academy
Dec 28, 2021 · Cloud Native

Using Traefik Log4Shell Plugin to Mitigate the Log4J Vulnerability

This article explains how to deploy Traefik's Log4Shell plugin—a middleware that mitigates the Log4J (CVE‑2021‑44228) vulnerability—by configuring it via Pilot token, static files, Kubernetes CRDs, Ingress annotations, or Docker labels, with example code snippets for each method.

DockerKubernetesLog4Shell
0 likes · 4 min read
Using Traefik Log4Shell Plugin to Mitigate the Log4J Vulnerability
Efficient Ops
Efficient Ops
Dec 27, 2021 · Information Security

Zhongtai Securities’ Path to Advanced DevSecOps Maturity – Key Takeaways

The 2021 GOLF+ IT Governance Forum highlighted Zhongtai Securities’ successful DevSecOps assessment, revealing how the company’s online business system met the second‑level security and risk management standards, and sharing detailed insights on cultural, procedural, and technical practices that drove their advanced security maturity.

DevOpsDevSecOpsMaturity Assessment
0 likes · 10 min read
Zhongtai Securities’ Path to Advanced DevSecOps Maturity – Key Takeaways
Efficient Ops
Efficient Ops
Dec 27, 2021 · Information Security

How GuoXin Securities Achieved Advanced DevSecOps Maturity in Its GoldSun App

GuoXin Securities' GoldSun platform passed the CAICT DevSecOps Level‑2 security and risk management assessment, showcasing how standardization, tool empowerment, and a collaborative DevOps culture can elevate a financial app's security posture to an advanced domestic level.

DevOpsDevSecOpsMaturity Assessment
0 likes · 10 min read
How GuoXin Securities Achieved Advanced DevSecOps Maturity in Its GoldSun App
Efficient Ops
Efficient Ops
Dec 27, 2021 · Operations

How Zhongyuan Bank Achieved Advanced DevSecOps Maturity: A Success Story

Zhongyuan Bank’s personal mobile banking project passed the national DevSecOps security and risk management assessment, showcasing how standardized DevOps practices, a dedicated security platform, and cultural, procedural, and technical integration can elevate a financial institution’s development lifecycle to an advanced, industry‑leading level.

BankingDevOpsDevSecOps
0 likes · 13 min read
How Zhongyuan Bank Achieved Advanced DevSecOps Maturity: A Success Story
Senior Brother's Insights
Senior Brother's Insights
Dec 25, 2021 · Information Security

Why Logback 1.2.7 Is Vulnerable and How to Safely Upgrade

This article explains the Logback CVE‑2021‑42550 vulnerability affecting versions before 1.2.9, outlines the three conditions required for exploitation, compares its severity to Log4j, and provides concrete steps—including upgrading to 1.2.9 and setting the configuration file read‑only—to protect Java applications.

CVE-2021-42550Vulnerabilityjava
0 likes · 5 min read
Why Logback 1.2.7 Is Vulnerable and How to Safely Upgrade
OPPO Amber Lab
OPPO Amber Lab
Dec 23, 2021 · Information Security

How Java Deserialization Vulnerabilities Enable Remote Code Execution

This article explains Java's reflection mechanism, details how deserialization flaws in libraries like Apache Commons Collections and Fastjson allow attackers to craft malicious objects that trigger arbitrary command execution, and provides practical proof‑of‑concept steps and mitigation recommendations.

DeserializationExploitReflection
0 likes · 7 min read
How Java Deserialization Vulnerabilities Enable Remote Code Execution
Selected Java Interview Questions
Selected Java Interview Questions
Dec 22, 2021 · Backend Development

User Login Flow, Token Management, and Anonymous Access Implementation in a Java Backend

This article explains the complete user login process, token generation and validation, token expiration policies, logout handling, and two approaches for anonymous requests—authorized tokens with rate limiting and path‑based regex rules—illustrated with diagrams and Java/Redis code examples.

AuthenticationTokengateway
0 likes · 9 min read
User Login Flow, Token Management, and Anonymous Access Implementation in a Java Backend
Laravel Tech Community
Laravel Tech Community
Dec 19, 2021 · Information Security

Apache Log4j 2.17.0 Release Fixes CVE‑2021‑45105 and Other Vulnerabilities

Apache Log4j 2.17.0 has been released, addressing CVE‑2021‑45105 and fixing recursive string‑replacement vulnerabilities that could cause StackOverflowError DoS attacks, while also tightening JNDI usage and correcting several configuration and appender issues, with recommended mitigation steps for earlier versions.

CVE-2021-45105DoSjava
0 likes · 4 min read
Apache Log4j 2.17.0 Release Fixes CVE‑2021‑45105 and Other Vulnerabilities
Java Captain
Java Captain
Dec 17, 2021 · Backend Development

Jeepay: Open‑Source Payment System Overview and Architecture

Jeepay is an open‑source, Spring Boot‑based payment platform that supports multiple channels such as WeChat Pay, Alipay, and UnionPay, offering distributed deployment, high concurrency, secure signing, and a modular front‑back separation with comprehensive management and merchant interfaces.

Microservicesopen-sourcepayment
0 likes · 6 min read
Jeepay: Open‑Source Payment System Overview and Architecture
Sohu Tech Products
Sohu Tech Products
Dec 15, 2021 · Mobile Development

iOS Virtual Location Techniques and Detection Methods

This article explains the various ways to simulate GPS location on iOS devices—including Xcode GPX files, iTools, external Bluetooth accessories, and jailbreak hooks—while also detailing practical detection strategies such as altitude checks, type inspection, callback analysis, and method‑swizzling to identify fake positioning.

iOSlocation simulationsecurity
0 likes · 16 min read
iOS Virtual Location Techniques and Detection Methods
Architects' Tech Alliance
Architects' Tech Alliance
Dec 15, 2021 · Fundamentals

Understanding the Metaverse from a Network Access Perspective and Its Implications for Network Technology

The article examines the concept of the Metaverse as an evolution of internet access terminals, analyzes how VR/AR headsets reshape communication‑type devices, and discusses the resulting new security, ultra‑low‑latency, and deterministic quality‑of‑service challenges for network infrastructure.

LatencyMetaverseQoS
0 likes · 16 min read
Understanding the Metaverse from a Network Access Perspective and Its Implications for Network Technology
Architects' Tech Alliance
Architects' Tech Alliance
Dec 14, 2021 · Industry Insights

Why NVIDIA’s BlueField DPU Is Redefining Data‑Center Architecture

The article provides an in‑depth analysis of NVIDIA’s BlueField DPU series—detailing the roadmap from BlueField‑2 to BlueField‑4, the technical capabilities of BlueField‑3 across networking, security, and storage, and the DOCA ecosystem that enables programmable, hardware‑accelerated data‑center services, positioning DPUs as a core pillar of modern cloud infrastructure.

BlueFieldDPUNetworking
0 likes · 14 min read
Why NVIDIA’s BlueField DPU Is Redefining Data‑Center Architecture
Laravel Tech Community
Laravel Tech Community
Dec 13, 2021 · Information Security

Apache Log4j2 Remote Code Execution Vulnerability: Description, Impact, and Mitigation Steps

On December 10, a critical remote code execution vulnerability in Apache Log4j 2.x (≤ 2.14.1) was disclosed, allowing attackers to execute arbitrary code via JNDI injection; the article explains the flaw, affected components, detection methods, and urgent remediation measures such as disabling lookups and upgrading to safe versions.

JNDI injectionMitigationRemote Code Execution
0 likes · 5 min read
Apache Log4j2 Remote Code Execution Vulnerability: Description, Impact, and Mitigation Steps
Alibaba Cloud Native
Alibaba Cloud Native
Dec 13, 2021 · Information Security

How to Block Log4j2 RCE Attacks in Four Simple Steps with Alibaba Cloud ARMS

The article explains the massive impact of the Log4j2 remote code execution vulnerability, details why its JNDI lookup is easily exploitable, lists affected software, and provides a concise four‑step guide using Alibaba Cloud ARMS RASP to detect, monitor, and block attacks while offering remediation recommendations.

ARMSCloud NativeRASP
0 likes · 6 min read
How to Block Log4j2 RCE Attacks in Four Simple Steps with Alibaba Cloud ARMS
Programmer DD
Programmer DD
Dec 10, 2021 · Backend Development

How to Quickly Fix the Log4j2 Vulnerability in Spring Boot

This article explains the recent Log4j2 critical vulnerability, shows the official patch, and provides the simplest Spring Boot configuration change—adding a property in pom.xml—to upgrade Log4j2 safely while highlighting why the default logging component is Logback and offering advice on avoiding unnecessary third‑party replacements.

securityspring-boot
0 likes · 4 min read
How to Quickly Fix the Log4j2 Vulnerability in Spring Boot
21CTO
21CTO
Dec 9, 2021 · Fundamentals

Top 5 Linux Distros Every Developer Should Try

This article introduces five popular Linux distributions—Ubuntu, Linux Mint, Kali Linux, Parrot OS, and Fedora—explaining their features, target audiences, and why they are well‑suited for programmers and developers seeking open‑source, customizable development environments.

DevelopmentLinuxlinux distributions
0 likes · 7 min read
Top 5 Linux Distros Every Developer Should Try
Architects Research Society
Architects Research Society
Dec 9, 2021 · Fundamentals

Key Challenges in Designing Distributed Systems

Designing a distributed system involves overcoming major challenges such as heterogeneity, transparency, openness, concurrency, security, scalability, and fault tolerance, each of which must be addressed to build a reliable, extensible, and performant system.

Distributed SystemsScalabilityconcurrency
0 likes · 7 min read
Key Challenges in Designing Distributed Systems
IT Architects Alliance
IT Architects Alliance
Dec 9, 2021 · Backend Development

How to Build a Billion‑User Scalable User Center: Architecture, APIs, Token Fallback, and Security

This article presents a comprehensive, practical design for an ultra‑large‑scale user center, covering microservice architecture, API separation, token generation with graceful degradation, data‑sharding strategies, password encryption, asynchronous processing, and detailed monitoring to ensure high availability, performance, and security.

MicroservicesScalabilityToken
0 likes · 16 min read
How to Build a Billion‑User Scalable User Center: Architecture, APIs, Token Fallback, and Security
Cloud Native Technology Community
Cloud Native Technology Community
Dec 1, 2021 · Cloud Native

Introduction to Service Mesh and Istio: Concepts, Architecture, and Hands‑On Deployment

This tutorial explains the fundamentals of service mesh, details Istio's architecture and core components, and provides step‑by‑step instructions for installing Istio on Kubernetes, deploying a sample microservice application, and using common features such as traffic management, security, observability, and advanced use cases.

IstioKubernetesMicroservices
0 likes · 19 min read
Introduction to Service Mesh and Istio: Concepts, Architecture, and Hands‑On Deployment
Open Source Linux
Open Source Linux
Nov 30, 2021 · Operations

Essential Sysadmin Toolkit: LDAP, Automation, DNS, Load Testing & Security

This guide surveys a range of open‑source tools for unified account management, automated server deployment, DNS services, performance testing, and host security, including LDAP, JumpServer, NIS, Fabric, Ansible, dnsmasq, pdnsd, ApacheBench, TCPcopy, PortSentry, fail2ban, and Google Authenticator, helping administrators streamline operations across Linux environments.

DNSLDAPLoad Testing
0 likes · 7 min read
Essential Sysadmin Toolkit: LDAP, Automation, DNS, Load Testing & Security
Software Development Quality
Software Development Quality
Nov 29, 2021 · Backend Development

Designing Scalable, High‑Performance Architecture for Large‑Scale Websites

Large‑scale website architecture must balance massive user traffic, data volume, security threats, and rapid feature changes by adopting layered, distributed designs that emphasize high performance, high availability, scalability, extensibility, and agility, employing techniques such as caching, load balancing, clustering, sharding, and service‑oriented components.

MicroservicesScalabilitycaching
0 likes · 22 min read
Designing Scalable, High‑Performance Architecture for Large‑Scale Websites
Open Source Linux
Open Source Linux
Nov 28, 2021 · Operations

Boost Linux Server Performance: 20 Proven Optimization Techniques

This guide presents twenty practical Linux server optimization methods—from kernel elevator tuning and daemon reduction to TCP tweaks, secure backups, and effective monitoring commands—helping administrators enhance reliability, speed, and security while reducing resource consumption.

Linuxkernelperformance tuning
0 likes · 14 min read
Boost Linux Server Performance: 20 Proven Optimization Techniques
21CTO
21CTO
Nov 28, 2021 · Cloud Computing

Tencent Cloud Opens Brazil Data Center as Alpine Linux Ends MIPS64 Support

The article reports on Tencent Cloud’s new Brazil data center launch amid rumors of database leaks and Chinese state directives to limit WeChat use, details recent U.S. trade bans on Chinese tech firms, and announces Alpine Linux 3.15’s discontinuation of MIPS64 support.

Alpine LinuxMIPS64Tencent Cloud
0 likes · 6 min read
Tencent Cloud Opens Brazil Data Center as Alpine Linux Ends MIPS64 Support
Meituan Technology Team
Meituan Technology Team
Nov 25, 2021 · Information Security

Analysis of Apple FairPlay DRM: Architecture, Obfuscation Techniques, and Weaknesses

The article dissects Apple’s FairPlay DRM, detailing its kernel‑driver and daemon decryption workflow, the LC_ENCRYPTION_INFO metadata, per‑user licensing files, LLVM‑level obfuscation techniques such as opaque predicates and control‑flow flattening, and the identified weaknesses that enable reverse‑engineering and key extraction.

DRMFairPlayObfuscation
0 likes · 18 min read
Analysis of Apple FairPlay DRM: Architecture, Obfuscation Techniques, and Weaknesses
Alibaba Terminal Technology
Alibaba Terminal Technology
Nov 22, 2021 · Frontend Development

How Native Image Snapshots Eliminate White Screens and Enable Instant Interaction in Mini‑Programs

This article explains a native image‑snapshot technique for mini‑programs that removes white‑screen delays, makes the first screen appear instantly, supports user interaction, and outlines the implementation steps, suitable scenarios, timing, storage security, accuracy measurement, and performance impact.

interactivemini-programsecurity
0 likes · 15 min read
How Native Image Snapshots Eliminate White Screens and Enable Instant Interaction in Mini‑Programs
Liangxu Linux
Liangxu Linux
Nov 20, 2021 · Fundamentals

15 Essential Open‑Source Linux Projects Every Developer Should Explore

A curated collection of high‑quality open‑source Linux projects—including command‑line tools, security guides, tutorials, and web‑based shells—provides clear descriptions, key features, and direct GitHub links to help beginners and seasoned professionals quickly enhance their Linux expertise.

LinuxTutorialcommand-line
0 likes · 7 min read
15 Essential Open‑Source Linux Projects Every Developer Should Explore
Programmer DD
Programmer DD
Nov 20, 2021 · Information Security

Why Firefox Blocked the ‘Bypass’ Add‑Ons and How to Protect Your Browser

Mozilla’s security team has disabled the malicious ‘Bypass’ and ‘Bypass XM’ Firefox extensions that abused the proxy API, affecting hundreds of thousands of users, and provides steps to identify and remove them while highlighting recent Firefox updates and new security features.

FirefoxInformation Securitybrowser extensions
0 likes · 5 min read
Why Firefox Blocked the ‘Bypass’ Add‑Ons and How to Protect Your Browser
OPPO Amber Lab
OPPO Amber Lab
Nov 19, 2021 · Information Security

How Android 11’s New Features Opened Up Three Critical Security Holes

This article examines three Android 11 security vulnerabilities—CVE‑2021‑0485’s picture‑in‑picture resizing flaw, CVE‑2021‑0521’s unprotected package‑visibility API, and CVE‑2021‑0645’s storage‑access bypass—detailing their causes, code examples, and the patches Google released to mitigate them in practice.

AndroidAndroid 11CVE
0 likes · 7 min read
How Android 11’s New Features Opened Up Three Critical Security Holes
Java Architecture Diary
Java Architecture Diary
Nov 19, 2021 · Backend Development

What’s New in Spring Boot 2.6? Key Features and Configuration Changes

Spring Boot 2.6 introduces Cookie SameSite support, reactive session timeout, custom data‑masking rules, automatic Redis pool configuration, richer runtime Java metrics, build‑info personalization, new startup and disk metrics, enhanced Docker image building, and many deprecated properties removed or renamed, improving security and performance.

ConfigurationDockerMetrics
0 likes · 7 min read
What’s New in Spring Boot 2.6? Key Features and Configuration Changes
Tencent Cloud Developer
Tencent Cloud Developer
Nov 16, 2021 · Artificial Intelligence

TencentOS AIoT: Overview of TencentOS Tiny and Edge Platforms and Core Technologies

TencentOS AIoT comprises the ultra‑lightweight Tiny RTOS for resource‑constrained devices and the Linux‑based Edge platform for gateways, offering modular kernels, low‑power management, OTA updates, robust security, unified AT communication, ELF loading, containerized AI workloads via TinyKube, extensive protocol bridges, and a thriving open‑source developer ecosystem.

AIoTEdge ComputingEmbedded OS
0 likes · 20 min read
TencentOS AIoT: Overview of TencentOS Tiny and Edge Platforms and Core Technologies
Architect
Architect
Nov 14, 2021 · Backend Development

Designing a Billion‑User User Center: Architecture, Interface Design, Token Degradation, Data Security, and Monitoring

This article presents a comprehensive engineering guide for building a high‑availability, high‑performance, and secure user‑center system that can serve hundreds of millions of users, covering service architecture, API design, sharding, token fallback, data protection, asynchronous processing, and observability.

MicroservicesScalabilitysecurity
0 likes · 16 min read
Designing a Billion‑User User Center: Architecture, Interface Design, Token Degradation, Data Security, and Monitoring
JavaScript
JavaScript
Nov 10, 2021 · Information Security

Critical npm Package Hijack: How coa and rc Were Compromised and What to Do

A recent security breach compromised the popular npm packages coa and rc, injecting ransomware‑capable code that can steal browser passwords, record keystrokes and screenshots, prompting developers to lock specific versions and enable two‑factor authentication to protect their projects.

RCcoadependency management
0 likes · 3 min read
Critical npm Package Hijack: How coa and rc Were Compromised and What to Do
Open Source Linux
Open Source Linux
Nov 8, 2021 · Information Security

Essential Linux Incident Response Commands for Quick Security Investigations

This guide outlines the typical Linux and Windows environments encountered in security incidents, common threats such as mining and ransomware, and provides a step‑by‑step workflow with essential commands for process, user, network, and file investigation to identify and remediate compromises.

File AnalysisLinuxincident response
0 likes · 8 min read
Essential Linux Incident Response Commands for Quick Security Investigations
Architects' Tech Alliance
Architects' Tech Alliance
Nov 2, 2021 · Fundamentals

Analysis of China's Domestic CPU Landscape: Architecture, Security, and Market Challenges

The article provides a comprehensive analysis of China's domestic CPU ecosystem, examining the technical distinctions between architectures and instruction sets, the security implications of relying on foreign designs, and the strategic balance needed between indigenous development and imported technologies to advance the nation's semiconductor industry.

CPUChinaDomestic Chips
0 likes · 9 min read
Analysis of China's Domestic CPU Landscape: Architecture, Security, and Market Challenges
Alibaba Cloud Native
Alibaba Cloud Native
Oct 29, 2021 · Cloud Native

Unified Management & Secure Governance for Alibaba Cloud ACK and On-Prem Kubernetes

This article explains how cloud‑native technologies enable a unified control plane for Alibaba Cloud ACK clusters and self‑built Kubernetes clusters, detailing the ACK registered‑cluster architecture, one‑way registration, non‑managed security mechanisms, step‑by‑step cluster onboarding, and consistent security governance across environments.

ACKCloud NativeCluster Management
0 likes · 11 min read
Unified Management & Secure Governance for Alibaba Cloud ACK and On-Prem Kubernetes
Architect's Tech Stack
Architect's Tech Stack
Oct 29, 2021 · Backend Development

Spring nohttp Project: Blocking HTTP URLs and Enhancing Security

The article introduces Spring’s open‑source nohttp project, which scans, replaces, and blocks HTTP URLs to prevent man‑in‑the‑middle attacks, outlines its modules and usage with an XML configuration example, and also advertises a free Alibaba Cloud server giveaway and a large interview‑question PDF collection.

XMLbackend-developmentjava
0 likes · 4 min read
Spring nohttp Project: Blocking HTTP URLs and Enhancing Security
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Oct 29, 2021 · Information Security

Understanding Single Sign-On (SSO): Why It Is Needed and How It Works

This article explains the necessity of Single Sign-On (SSO) in multi‑system environments, traces its origins from monolithic web applications to distributed clusters, and describes common implementation approaches for same‑domain and cross‑domain scenarios, including the use of a central authentication center such as CAS.

AuthenticationSSOSession
0 likes · 6 min read
Understanding Single Sign-On (SSO): Why It Is Needed and How It Works