Tagged articles
2152 articles
Page 15 of 22
ELab Team
ELab Team
Oct 28, 2021 · Information Security

How to Build a Secure JavaScript Sandbox: Techniques, Code, and Pitfalls

This article explains the concept of JavaScript sandboxing, outlines common use cases, walks through several implementation strategies—from simple eval wrappers to with‑Proxy‑iframe combos—and discusses sandbox escape techniques and how to mitigate them, providing practical code examples throughout.

JavaScriptfrontendiframe
0 likes · 14 min read
How to Build a Secure JavaScript Sandbox: Techniques, Code, and Pitfalls
Java High-Performance Architecture
Java High-Performance Architecture
Oct 20, 2021 · Information Security

How a Misconfigured Kubelet Led to Crypto Mining on Our Kubernetes Node – Lessons Learned

After discovering a suspicious process on one of our self‑built Kubernetes nodes, we traced the intrusion to a misconfigured kubelet that exposed the API, allowing attackers to run a Monero mining script, and we outline the investigation steps and hardening measures to prevent similar breaches.

Kubernetescrypto miningincident response
0 likes · 6 min read
How a Misconfigured Kubelet Led to Crypto Mining on Our Kubernetes Node – Lessons Learned
Programmer DD
Programmer DD
Oct 20, 2021 · Backend Development

Master JWT: Secure Token Authentication with Spring Boot, Angular & JJWT

This guide explains what JWT is, its structure, security best practices, and demonstrates a complete implementation using the JJWT Java library together with Spring Boot and Angular, including Maven setup, filter, controllers, and a front‑end example to authenticate users and enforce role‑based access.

AngularAuthenticationJSON Web Token
0 likes · 14 min read
Master JWT: Secure Token Authentication with Spring Boot, Angular & JJWT
Architects' Tech Alliance
Architects' Tech Alliance
Oct 19, 2021 · Artificial Intelligence

Gartner's 12 Strategic Technology Trends for 2022

Gartner's 2022 report outlines twelve strategic technology trends—ranging from generative AI and data fabric to cloud‑native platforms, autonomous systems, decision intelligence, composable applications, hyper‑automation, privacy‑enhancing computation, cybersecurity mesh, AI engineering, and total experience—highlighting how data and intelligence will drive enterprise transformation over the next decade.

Artificial IntelligenceCloud NativeData Fabric
0 likes · 8 min read
Gartner's 12 Strategic Technology Trends for 2022
php Courses
php Courses
Oct 19, 2021 · Operations

How to Install and Use Baota Panel for Website Deployment on a Linux Server

This tutorial walks through installing the Baota control panel on a Linux cloud server, logging in, setting up a web stack, configuring security, creating websites with IP or domain, managing PHP versions, and customizing panel settings for secure and efficient site deployment.

BaoTaServer SetupWeb Panel
0 likes · 4 min read
How to Install and Use Baota Panel for Website Deployment on a Linux Server
21CTO
21CTO
Oct 18, 2021 · Operations

What Emerging IT Roles Will Shape the Future of Tech?

The article surveys rapidly growing IT positions—from quantum computing engineers and security‑compliance managers to big‑data, analytics, and DataOps engineers—explaining how these roles combine advanced technologies, regulatory expertise, and operational practices to drive business transformation and meet the evolving demands of digital enterprises.

Big DataCloudOpsDataOps
0 likes · 9 min read
What Emerging IT Roles Will Shape the Future of Tech?
Qingyun Technology Community
Qingyun Technology Community
Oct 18, 2021 · Cloud Native

Key Cloud Native Updates: GitLab IPO, LinkedIn China Exit, VS2022 Preview, Service Mesh Survey

This roundup covers GitLab's 35% Nasdaq debut surge, LinkedIn's planned shutdown of its Chinese platform, the release of Visual Studio 2022 Preview 5 and RC, a Delta Lake guide preview, findings from a cloud‑native security micro‑survey, a second‑edition service mesh guide, and a recommended cloud‑native training course.

GitLabLinkedInVisual Studio
0 likes · 11 min read
Key Cloud Native Updates: GitLab IPO, LinkedIn China Exit, VS2022 Preview, Service Mesh Survey
Architects' Tech Alliance
Architects' Tech Alliance
Oct 17, 2021 · Cloud Computing

What Exactly Is a Hybrid Cloud? Definitions, Types, and Design Principles

This article defines hybrid cloud as an IT architecture interconnecting multiple clouds, distinguishes it from multi‑cloud, examines four common hybrid forms, outlines key characteristics such as elasticity, scalability and security, and presents the five‑connectivity design goals that make hybrid cloud the cornerstone of new infrastructure.

Scalabilitycloud architectureelasticity
0 likes · 19 min read
What Exactly Is a Hybrid Cloud? Definitions, Types, and Design Principles
Baidu Geek Talk
Baidu Geek Talk
Oct 13, 2021 · Mobile Development

Why iOS 15 Rejects Your Enterprise IPA and How Re‑signing Fixes It

The article explains the iOS code‑signing verification mechanism, why enterprise IPAs built for iOS 15 fail with a signature‑version error, and provides a step‑by‑step guide to re‑sign the package using newer signature formats, along with a deep dive into certificates, provisioning profiles, entitlements and the underlying cryptographic concepts.

CertificateCode SigningMobile Development
0 likes · 22 min read
Why iOS 15 Rejects Your Enterprise IPA and How Re‑signing Fixes It
Laravel Tech Community
Laravel Tech Community
Oct 10, 2021 · Information Security

Common PHP Security Vulnerabilities and Mitigation Strategies

This article outlines ten common PHP security threats—including SQL injection, XSS, CSRF, LFI, weak password hashing, MITM, command injection, XXE, improper error reporting, and login rate limiting—explaining how each attack works and providing practical mitigation techniques such as prepared statements, input sanitization, CSRF tokens, and HTTPS.

MitigationPHPWeb
0 likes · 15 min read
Common PHP Security Vulnerabilities and Mitigation Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Oct 9, 2021 · Frontend Development

Cross-Origin Issues and Solutions in Web Development

The article explains cross‑origin restrictions in web development, distinguishes broad and narrow cross‑origin, outlines common scenarios, and compares solutions such as JSONP, CORS, Flash, server proxies, and front‑end techniques like document.domain, hash, window.name, and postMessage, highlighting each method’s pros and cons.

CORSCross-OriginJSONP
0 likes · 20 min read
Cross-Origin Issues and Solutions in Web Development
Java Architect Essentials
Java Architect Essentials
Oct 8, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, details token types such as access and refresh tokens, introduces JWT principles and usage, and discusses security considerations and distributed session‑sharing strategies for modern web applications.

AuthenticationAuthorizationCookie
0 likes · 22 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Python Programming Learning Circle
Python Programming Learning Circle
Oct 8, 2021 · Information Security

Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference

This guide explains how PyArmor encrypts and protects Python scripts through seamless replacement, dynamic encryption, licensing, hardware binding, and packaging, providing step‑by‑step installation, usage commands, project management techniques, and a comprehensive command reference for developers.

Licensingcode protectionencryption
0 likes · 7 min read
Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference
Top Architect
Top Architect
Oct 7, 2021 · Backend Development

Implementation of Image and SMS Captcha Service in .NET Core

This article walks through the design and implementation of a complete captcha solution—including image and SMS verification—using .NET Core, covering background context, code details for generating graphics, unsafe handling, noise lines, caching strategies, rate limiting, validation logic, runtime results, and a link to the full source repository.

BackendCaptchadotnet
0 likes · 14 min read
Implementation of Image and SMS Captcha Service in .NET Core
Programmer DD
Programmer DD
Oct 4, 2021 · Backend Development

Build a Secure SMS Verification Service with .NET – Full Code Walkthrough

This article introduces an open‑source SMS verification module, outlines essential security features such as code expiry, length limits, request throttling, and one‑time use, and provides complete C# implementations for generating, sending, and validating both image and SMS captchas.

ASP.NET CoreCaptchaSMS Verification
0 likes · 9 min read
Build a Secure SMS Verification Service with .NET – Full Code Walkthrough
Senior Brother's Insights
Senior Brother's Insights
Sep 29, 2021 · Information Security

Secure Spring Boot Configurations with Jasypt: A Step‑by‑Step Guide

This tutorial shows how to protect sensitive configuration values such as database passwords in a Spring Boot application by integrating the Jasypt library, configuring encryption keys, generating encrypted strings via unit tests or Maven plugin, and securely passing the secret at runtime.

Configuration EncryptionJasyptSpring Boot
0 likes · 9 min read
Secure Spring Boot Configurations with Jasypt: A Step‑by‑Step Guide
Java High-Performance Architecture
Java High-Performance Architecture
Sep 29, 2021 · Information Security

How Authelia Enables Open‑Source Two‑Factor SSO for Your Apps

This article introduces Authelia, an open‑source authentication and authorization server that provides two‑factor authentication and single sign‑on, explains how it integrates with reverse proxies like Nginx, Traefik or HAProxy, outlines installation options, showcases its UI and key security features, and shares its GitHub statistics and link.

AutheliaSSOTwo-Factor Authentication
0 likes · 4 min read
How Authelia Enables Open‑Source Two‑Factor SSO for Your Apps
IT Architects Alliance
IT Architects Alliance
Sep 28, 2021 · Backend Development

API Gateway Architecture and Core Functionalities Overview

This article presents a comprehensive overview of an API gateway built on RxNetty, detailing its overall architecture, request routing, conditional routing, API management, rate‑limiting and circuit‑breaking, security policies, monitoring, alerting, tracing, and future improvement considerations within a microservices environment.

security
0 likes · 12 min read
API Gateway Architecture and Core Functionalities Overview
DevOps Cloud Academy
DevOps Cloud Academy
Sep 27, 2021 · Operations

Key Findings from Google DORA 2021 Accelerate State of DevOps Report

The 2021 DORA Accelerate State of DevOps report, based on responses from over 32,000 professionals, reveals new performance metrics, the impact of SRE and security supply‑chain practices, cultural factors affecting burnout, and how cloud adoption continues to drive higher software delivery and organizational performance.

DevOpsSREcloud
0 likes · 8 min read
Key Findings from Google DORA 2021 Accelerate State of DevOps Report
DevOps Cloud Academy
DevOps Cloud Academy
Sep 26, 2021 · Operations

Key Findings from Google DORA 2021 Accelerate State of DevOps Report

Google’s 2021 DORA Accelerate State of DevOps report, based on over 32,000 professionals, reveals that elite teams dramatically outperform low‑performing teams across deployment frequency, lead time, recovery time and failure rates, while highlighting new reliability metrics, the importance of team culture, SRE, cloud adoption, secure software supply chains and documentation.

DevOpsSREcloud computing
0 likes · 7 min read
Key Findings from Google DORA 2021 Accelerate State of DevOps Report
Airbnb Technology Team
Airbnb Technology Team
Sep 22, 2021 · Backend Development

Design and Implementation of Himeji: A Zanzibar‑Based Centralized Authorization System at Airbnb

Airbnb replaced duplicated, latency‑prone authorization checks in its new service‑oriented architecture by moving them into data services and building Himeji, a Zanzibar‑inspired centralized permission store that uses triple‑based policies, configurable unions, sharded caching, and Aurora backing to deliver sub‑10 ms latency for millions of checks per second with 99.999 % availability.

AuthorizationBackendDistributed Systems
0 likes · 12 min read
Design and Implementation of Himeji: A Zanzibar‑Based Centralized Authorization System at Airbnb
DataFunSummit
DataFunSummit
Sep 15, 2021 · Information Security

Intelligent Risk Control in Live Streaming: Algorithm Architecture and Practice at Douyu

This article presents Douyu's intelligent risk‑control system for live streaming, detailing the security challenges, a multi‑layer algorithm architecture covering content, user‑behavior, gang and device risks, the evolution of models for spam detection, risk scoring, gang identification, sequence analysis, and device fingerprinting, and discusses practical solutions and interpretability techniques.

AIfraud detectionlive streaming
0 likes · 12 min read
Intelligent Risk Control in Live Streaming: Algorithm Architecture and Practice at Douyu
IT Architects Alliance
IT Architects Alliance
Sep 14, 2021 · Backend Development

Design and Implementation of a Reactive API Gateway Based on RxNetty

This article details the architecture, core functions, and implementation techniques of a reactive API gateway built with RxNetty, covering request dispatch, conditional routing, API management, rate limiting, security policies, monitoring, and future optimization directions within a microservices environment.

RxNettyrequest-routingsecurity
0 likes · 11 min read
Design and Implementation of a Reactive API Gateway Based on RxNetty
Efficient Ops
Efficient Ops
Sep 14, 2021 · Operations

DevOps Maturity in Chinese Securities: Real‑World Case Studies

This article examines how leading Chinese securities firms adopt the CAICT‑led DevOps Capability Maturity Model, presenting detailed case studies, assessment metrics, and improvements in continuous delivery, technical operation, and security that illustrate the model’s industry impact.

Continuous DeliveryDevOpsMaturity Model
0 likes · 13 min read
DevOps Maturity in Chinese Securities: Real‑World Case Studies
MaGe Linux Operations
MaGe Linux Operations
Sep 7, 2021 · Information Security

How QR Code Login Works: From Scanning to Secure Token Authentication

QR code login lets users authenticate on a PC by scanning a code with a pre‑logged‑in mobile app, using a token‑based system that verifies identity without transmitting passwords, and involves QR generation, status polling, temporary tokens, and final confirmation to securely log in.

AuthenticationMobileQR code
0 likes · 12 min read
How QR Code Login Works: From Scanning to Secure Token Authentication
Top Architect
Top Architect
Sep 1, 2021 · Backend Development

Design and Architecture of a Payment Operation Platform

This article explains the purpose, evolution, business logic, design principles, system architecture, permission model, and technical implementation of a payment operation platform that serves internal staff such as developers, testers, product managers, finance, and customer service within a payment company.

BackendRBACSystem Design
0 likes · 8 min read
Design and Architecture of a Payment Operation Platform
Laravel Tech Community
Laravel Tech Community
Aug 30, 2021 · Backend Development

PHP 8.0.10 Release: Security Fixes and Bug Fixes Overview

The PHP 8.0.10 update, a security‑focused release, addresses numerous core, BCMath, CGI, Date, GD, MySQLi, Opcache, OpenSSL, PDO_ODBC, Phar, Shmop, SimpleXML, Standard, and Streams bugs, and users are encouraged to upgrade to benefit from these fixes.

BugFixesPHPVersion8.0
0 likes · 4 min read
PHP 8.0.10 Release: Security Fixes and Bug Fixes Overview
Liangxu Linux
Liangxu Linux
Aug 29, 2021 · Information Security

Automating Linux File Timestamp Manipulation to Hide Traces

This guide explains how to use standard Linux utilities and a custom Bash script to view, modify, save, and restore file timestamps, enabling attackers or administrators to conceal or recover evidence of file changes on a server.

ForensicsLinuxTimestamps
0 likes · 10 min read
Automating Linux File Timestamp Manipulation to Hide Traces
Senior Brother's Insights
Senior Brother's Insights
Aug 25, 2021 · Backend Development

Mastering Cookies vs. Sessions: Deep Dive for Web Interviews

This article explains the fundamentals and advanced aspects of cookies and sessions, covering their definitions, use cases, key differences, handling when cookies are disabled, session management in distributed systems, same‑origin policy, cross‑origin requests, and security considerations for interview preparation.

Distributed SystemsHTTPSessions
0 likes · 9 min read
Mastering Cookies vs. Sessions: Deep Dive for Web Interviews
Programmer DD
Programmer DD
Aug 24, 2021 · Information Security

Fastjson RCE Chains: JdbcRowSetImpl, TemplatesImpl, and BasicDataSource Exploits

This article analyzes three Fastjson deserialization exploit chains—JdbcRowSetImpl, TemplatesImpl, and BasicDataSource—detailing how crafted JSON payloads trigger JNDI lookups, load remote malicious bytecode, and ultimately achieve remote code execution without requiring special Fastjson features.

DeserializationJNDIRCE
0 likes · 13 min read
Fastjson RCE Chains: JdbcRowSetImpl, TemplatesImpl, and BasicDataSource Exploits
DataFunTalk
DataFunTalk
Aug 21, 2021 · Information Security

CAPTCHA: History, Development, and Its Role in Cybersecurity and Anti‑Fraud Strategies

This article reviews the origin and evolution of CAPTCHAs, examines early applications and OCR attacks, describes the three generations of reCAPTCHA and emerging verification methods, and discusses how CAPTCHAs are used to raise attack barriers, filter malicious traffic, and support risk assessment in modern anti‑fraud systems.

AICaptchaWeb Security
0 likes · 13 min read
CAPTCHA: History, Development, and Its Role in Cybersecurity and Anti‑Fraud Strategies
Baidu Geek Talk
Baidu Geek Talk
Aug 16, 2021 · Artificial Intelligence

Integrating Paddle Serving with Kong Security Gateway for AI Model Deployment

The article demonstrates how to integrate Paddle Serving’s new security‑gateway feature with the open‑source Kong API gateway and its Konga UI, using Docker‑Compose to create a secure, HTTPS‑encrypted, header‑authenticated AI model serving endpoint that hides internal services while supporting high‑concurrency inference.

AIDockerKong
0 likes · 9 min read
Integrating Paddle Serving with Kong Security Gateway for AI Model Deployment
FunTester
FunTester
Aug 15, 2021 · Mobile Development

Mastering Android Testing: Architecture, ADB Commands, and a Complete Test Checklist

This guide provides a comprehensive overview of Android system architecture, explains the ADB communication mechanism, presents a detailed Android app testing checklist covering UI, compatibility, installation, OTA, interaction, concurrency, database, interface, performance, security, and other tests, and lists essential ADB commands and monitoring principles.

ADBAndroidMobile Development
0 likes · 14 min read
Mastering Android Testing: Architecture, ADB Commands, and a Complete Test Checklist
Wukong Talks Architecture
Wukong Talks Architecture
Aug 7, 2021 · Fundamentals

50 Common Computer Network Interview Questions and Answers

An extensive compilation of 50 essential computer networking interview questions covering HTTP status codes, request methods, network architecture, DNS resolution, TCP/UDP protocols, security concepts like CSRF and XSS, and detailed explanations of TCP handshakes, congestion control, and encryption mechanisms.

Computer NetworksHTTPProtocols
0 likes · 51 min read
50 Common Computer Network Interview Questions and Answers
21CTO
21CTO
Aug 6, 2021 · Operations

Why BC‑Linux V8.2 Is Emerging as the Top CentOS Replacement

The article reports on recent Chinese tech news—from massive travel‑card queries and ByteDance layoffs to Douyin’s remote‑work policy and a new partnership between Taobao and QQ Music—while spotlighting BC‑Linux V8.2, a CentOS‑compatible OS with dual kernels, performance boosts, and enhanced security.

CentOS AlternativeLinuxOperating System
0 likes · 9 min read
Why BC‑Linux V8.2 Is Emerging as the Top CentOS Replacement
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Aug 2, 2021 · Operations

5 Essential Skills Every DevOps Engineer Must Master

This article outlines the five core competencies—automation, communication and collaboration, cloud computing, security, and operational support—that aspiring DevOps engineers need to master in order to deliver software quickly, reliably, and securely in today’s competitive market.

DevOpsautomationcloud computing
0 likes · 6 min read
5 Essential Skills Every DevOps Engineer Must Master
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jul 25, 2021 · Backend Development

Design Principles and Core Features of an API Gateway

The article explains the role of an API Gateway as the single entry point for a system, detailing its core modules such as routing, service registration, load balancing, resilience, security, gray‑release, API aggregation and orchestration, and outlines key design, operational, and architectural considerations for building a high‑performance, highly available, and extensible gateway.

BackendDesignScalability
0 likes · 10 min read
Design Principles and Core Features of an API Gateway
Open Source Linux
Open Source Linux
Jul 25, 2021 · Backend Development

Mastering Nginx Rate Limiting: From Basics to Advanced Configurations

This article explains how Nginx implements rate limiting using the leaky‑bucket algorithm, walks through basic and advanced configurations—including zones, burst, nodelay, whitelists, multiple limits, logging, custom status codes, and request denial—while providing complete configuration examples.

Nginxbackend configurationleaky bucket
0 likes · 13 min read
Mastering Nginx Rate Limiting: From Basics to Advanced Configurations
Programmer DD
Programmer DD
Jul 21, 2021 · Information Security

Why OIDC Extends OAuth2: Secure Authentication with Keycloak Explained

This article explains how OpenID Connect (OIDC) builds on OAuth 2.0 to provide authentication, demonstrates a practical Keycloak integration with a Spring Boot app, and walks through a complete authorization flow for a photo‑storage service using client credentials and secure token exchange.

AuthenticationAuthorizationKeycloak
0 likes · 8 min read
Why OIDC Extends OAuth2: Secure Authentication with Keycloak Explained
Architecture Digest
Architecture Digest
Jul 20, 2021 · Information Security

Understanding JSON Web Tokens (JWT) and Their Use in Authentication

This article explains the lightweight JWT specification, its three-part structure (header, payload, signature), how to create and encode tokens with example code, the purpose of signatures, security considerations, suitable use cases, and a step‑by‑step authentication flow comparing JWT with traditional session storage.

AuthenticationJWTWeb Development
0 likes · 11 min read
Understanding JSON Web Tokens (JWT) and Their Use in Authentication
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jul 15, 2021 · Backend Development

How Our Reactive API Gateway Powers Microservices: Architecture & Features

This article details the design and implementation of a reactive API gateway built on RxNetty, covering its overall architecture, request dispatch, conditional routing for gray releases, API management, rate limiting, circuit breaking, security policies, and integrated monitoring and tracing capabilities.

BackendMicroservicesrate limiting
0 likes · 13 min read
How Our Reactive API Gateway Powers Microservices: Architecture & Features
php Courses
php Courses
Jul 12, 2021 · Information Security

Implementing Google Authenticator 2FA in PHP (ThinkPHP 6)

This tutorial explains how to download, configure, and use the PHP GoogleAuthenticator class for two‑factor authentication in a ThinkPHP 6 environment, including code examples for generating secrets, QR‑code URLs, storing them, and verifying user tokens.

2FAAuthenticationGoogle Authenticator
0 likes · 9 min read
Implementing Google Authenticator 2FA in PHP (ThinkPHP 6)
Liangxu Linux
Liangxu Linux
Jul 8, 2021 · Information Security

Discover Real IPs with Fav-up: Shodan‑Powered Favicon Lookup Tool

Fav-up is a Python‑based utility that combines Shodan data and website favicons to help security researchers uncover the true IP addresses of target services, offering flexible command‑line options, module integration, and output formats for comprehensive IP discovery.

Fav-upIP discoveryShodan
0 likes · 5 min read
Discover Real IPs with Fav-up: Shodan‑Powered Favicon Lookup Tool
Top Architect
Top Architect
Jul 7, 2021 · Backend Development

Design and Implementation of a High‑Concurrency API Gateway

This article details the architecture and implementation of a high‑concurrency API gateway built on RxNetty, covering request routing, conditional routing, API management, rate limiting, circuit breaking, security policies, monitoring, tracing, and future enhancements within a microservices environment.

Microservicesapi-gatewaybackend-development
0 likes · 11 min read
Design and Implementation of a High‑Concurrency API Gateway
Tencent Cloud Developer
Tencent Cloud Developer
Jul 6, 2021 · Cloud Computing

MicroVMM and Firecracker: Core Technologies Behind Serverless Computing

The talk explains how a purpose‑built microVMM like Firecracker—an ultra‑lightweight, Rust‑based virtual machine monitor running on KVM—delivers the strong isolation, millisecond‑scale startup, and high‑density performance essential for modern serverless platforms, while outlining current benchmarks and future enhancements.

FirecrackerMicroVMMServerless
0 likes · 26 min read
MicroVMM and Firecracker: Core Technologies Behind Serverless Computing
DevOps
DevOps
Jul 6, 2021 · Information Security

Security Chaos Engineering (SCE): Concepts, Challenges, Benefits, and the ChaoSlingr Case Study

The article introduces Security Chaos Engineering (SCE) as a proactive experimental approach to uncover security control failures, discusses the limitations of traditional red/blue/purple team exercises, outlines SCE's advantages, and presents the open‑source ChaoSlingr framework as a practical implementation example.

Red TeamSCEchaos engineering
0 likes · 8 min read
Security Chaos Engineering (SCE): Concepts, Challenges, Benefits, and the ChaoSlingr Case Study
Architects' Tech Alliance
Architects' Tech Alliance
Jul 2, 2021 · Cloud Computing

Hybrid Cloud Architecture: Definitions, Types, and Design Principles

Hybrid cloud combines public, private, and on‑premises IT resources, offering elasticity, scalability, security, and integrated management; this article defines hybrid cloud, distinguishes it from multi‑cloud, outlines common hybrid models, and discusses architectural goals such as five‑connectivity, design considerations, and its role in new infrastructure initiatives.

Digital Infrastructurecloud architecturemulti-cloud
0 likes · 17 min read
Hybrid Cloud Architecture: Definitions, Types, and Design Principles
Programmer DD
Programmer DD
Jun 28, 2021 · Backend Development

Unlocking Spring Boot Actuator: Secure Configuration and Hidden Risks

This article explains what Spring Boot Actuator is, how to quickly add and configure it, details the available endpoints, illustrates common security pitfalls such as exposing sensitive configuration, and provides practical recommendations to safely use Actuator in production environments.

ActuatorConfigurationSpring Boot
0 likes · 8 min read
Unlocking Spring Boot Actuator: Secure Configuration and Hidden Risks
Qunar Tech Salon
Qunar Tech Salon
Jun 24, 2021 · Operations

Qunar DNS System: Architecture, Features, and Operational Practices

This article explains the fundamentals and query process of the Domain Name System (DNS), then details Qunar's evolving DNS architecture—including the initial system, DNSDB management, DNS view, EDNS, HTTPDNS, and intelligent traffic switching—highlighting operational automation and security enhancements.

DNSautomationnetwork
0 likes · 10 min read
Qunar DNS System: Architecture, Features, and Operational Practices
Laravel Tech Community
Laravel Tech Community
Jun 23, 2021 · Information Security

Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation

The article outlines typical ways PHP projects mishandle sensitive data—such as storing passwords in plain text, transmitting credentials without encryption, using weak hashing algorithms, and exposing server details—and provides practical configuration and coding measures to secure data at rest and in transit.

Configurationencryptionsecurity
0 likes · 6 min read
Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation
IT Architects Alliance
IT Architects Alliance
Jun 21, 2021 · Information Security

Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations

This article analyses various client‑side authentication scenarios, classifies token types such as password, session, and API tokens, compares their cost, risk, and controllable attributes, and proposes a layered token architecture to improve security, privacy, and usability across multiple platforms.

AuthenticationSessionToken
0 likes · 13 min read
Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations
Java Captain
Java Captain
Jun 19, 2021 · Information Security

Spring Boot Vulnerability Exploitation Resources (GitHub Project)

This article introduces a GitHub repository that documents 16 Spring Boot vulnerabilities, detailing information leakage and remote code execution cases, providing step‑by‑step exploitation guides, underlying principles, and analysis for security research and authorized testing.

ExploitGitHubVulnerability
0 likes · 1 min read
Spring Boot Vulnerability Exploitation Resources (GitHub Project)
Architects' Tech Alliance
Architects' Tech Alliance
Jun 14, 2021 · Cloud Computing

Hybrid Cloud: Definitions, Architecture, Management, Security, Market Overview and Vendor Landscape

The article provides a comprehensive overview of hybrid cloud, covering its broad and narrow definitions, architectural components, key technologies such as cloud application architecture, management, load migration, security considerations, user demand analysis, vendor classification, and the current Chinese market trends and future outlook.

Managementcloud architecturecloud computing
0 likes · 12 min read
Hybrid Cloud: Definitions, Architecture, Management, Security, Market Overview and Vendor Landscape
21CTO
21CTO
Jun 14, 2021 · Backend Development

4 Must‑Have Non‑Functional Requirements for Secure, Documented APIs

Creating a robust API involves more than just making it work; developers must address four critical non‑functional aspects—security (HTTPS, CORS, JWT authentication, scopes), comprehensive documentation, thorough validation, and systematic testing—to ensure reliability, safety, and maintainability in production environments.

APIDocumentationsecurity
0 likes · 12 min read
4 Must‑Have Non‑Functional Requirements for Secure, Documented APIs
Top Architect
Top Architect
Jun 14, 2021 · Fundamentals

Understanding DNS: Architecture, Configuration, and Security

This article provides a comprehensive overview of the Domain Name System (DNS), covering its fundamentals, protocol choices, hierarchical structure, delegation, configuration with BIND, load balancing, debugging tools, and security considerations such as amplification attacks.

BINDDNSDomain Name System
0 likes · 17 min read
Understanding DNS: Architecture, Configuration, and Security
IT Architects Alliance
IT Architects Alliance
Jun 9, 2021 · Fundamentals

Essential Networking Q&A: From OSI Layers to IP Addressing Explained

This article provides concise explanations of core networking concepts, covering links, OSI model layers, backbone networks, LANs, nodes, routers, point‑to‑point links, FTP, subnet masks, UTP cable limits, data encapsulation, network topologies, VPN, NAT, routing protocols, firewalls, DNS, IPv6, RSA, and many other fundamental topics essential for anyone studying computer networks.

LANNetworkingOSI model
0 likes · 29 min read
Essential Networking Q&A: From OSI Layers to IP Addressing Explained
IT Architects Alliance
IT Architects Alliance
Jun 6, 2021 · Fundamentals

Design Principles and Architecture of Distributed File Systems

This article provides a comprehensive overview of distributed file systems, covering their historical evolution, essential requirements, architectural models with and without central nodes, persistence strategies, scalability, high availability, performance optimization, security mechanisms, and additional considerations such as space allocation, file deletion, small‑file handling, and deduplication.

ConsistencyDistributed File SystemScalability
0 likes · 21 min read
Design Principles and Architecture of Distributed File Systems
Laravel Tech Community
Laravel Tech Community
Jun 1, 2021 · Backend Development

mcrypt_module_close() – Close Encryption Module (PHP)

The PHP function mcrypt_module_close() releases an opened encryption module by taking a resource descriptor as its argument and returns TRUE on success or FALSE on failure, providing a simple way to clean up cryptographic resources in backend applications.

encryptionmcryptsecurity
0 likes · 1 min read
mcrypt_module_close() – Close Encryption Module (PHP)
Liangxu Linux
Liangxu Linux
May 31, 2021 · Fundamentals

Mastering DNS: Architecture, Configuration, and Security Essentials

This comprehensive guide explains DNS fundamentals, its hierarchical distributed database design, TCP/UDP usage, recursive versus authoritative servers, configuration with BIND, load‑balancing techniques, sub‑domain delegation, and common security concerns such as amplification attacks.

BINDDNSDomain Delegation
0 likes · 18 min read
Mastering DNS: Architecture, Configuration, and Security Essentials
21CTO
21CTO
May 31, 2021 · Fundamentals

Mastering DNS: Core Concepts, Configuration, and Security Insights

This comprehensive guide explains DNS fundamentals, its distributed hierarchical database, TCP/UDP usage, top‑level domains, resolution workflow, recursive versus authoritative servers, caching, smart routing, bind configuration, load balancing, sub‑domain delegation, debugging tools, and DNS amplification attacks.

BINDDNSDomain Name System
0 likes · 18 min read
Mastering DNS: Core Concepts, Configuration, and Security Insights
Laravel Tech Community
Laravel Tech Community
May 28, 2021 · Backend Development

PHP mcrypt_generic() Function for Data Encryption

The article explains PHP's mcrypt_generic() function, detailing its purpose for encrypting data, required parameters ($td as the encryption descriptor and $data as the plaintext), the need for block-size-aligned input, initialization and cleanup steps, and the nature of its returned encrypted output.

PHPencryptionmcrypt
0 likes · 2 min read
PHP mcrypt_generic() Function for Data Encryption
Volcano Engine Developer Services
Volcano Engine Developer Services
May 27, 2021 · Cloud Native

How Service Mesh Powers TikTok’s Spring Festival Red Packet Traffic Surge

This article, based on a Volcano Engine developer community meetup, explains how a self‑developed Service Mesh provides unified traffic management for TikTok’s massive Spring Festival Red Packet event, covering architecture, stability, security, and efficiency strategies across multi‑language microservices in complex environments.

Cloud NativeMicroservicesService Mesh
0 likes · 19 min read
How Service Mesh Powers TikTok’s Spring Festival Red Packet Traffic Surge
php Courses
php Courses
May 26, 2021 · Backend Development

PHP Interview Questions: Array Merging, Integer Validation, Unicode Case Conversion, File Writability, Permission Handling, Upload Validation, and URL Encoding Differences

This article presents a series of PHP interview questions covering array merging methods, integer validation, Unicode‑compatible case conversion, reliable file‑writability checks, permission‑setting functions, secure image upload verification, and differences between PHP and JavaScript URL encoding, each accompanied by code examples.

ArrayFile I/Ointerview
0 likes · 8 min read
PHP Interview Questions: Array Merging, Integer Validation, Unicode Case Conversion, File Writability, Permission Handling, Upload Validation, and URL Encoding Differences
Sohu Tech Products
Sohu Tech Products
May 19, 2021 · Mobile Development

Design and Implementation of an iOS Mobile Log System Using WCDB

This article describes the requirements, architecture, API design, database selection, retention policies, security measures, and performance optimizations of a new iOS log system that records business, network, and player logs, uses WCDB for storage, and employs active pull and encrypted chunked uploads to improve issue diagnosis.

WCDBiOSlog system
0 likes · 16 min read
Design and Implementation of an iOS Mobile Log System Using WCDB
MaGe Linux Operations
MaGe Linux Operations
May 18, 2021 · Fundamentals

Understanding DNS: From Basics to Advanced Configuration and Security

This article explains the DNS system, its distributed architecture, protocol details, hierarchical database structure, resolution process, server types, configuration with BIND, load balancing, subdomain delegation, and security considerations such as amplification attacks, providing a comprehensive guide for operations and networking professionals.

BINDDNSDomain Name System
0 likes · 18 min read
Understanding DNS: From Basics to Advanced Configuration and Security
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 18, 2021 · Backend Development

Troubleshooting Spring Boot OAuth2 Integration: Session Issues and Fixes

This guide walks through configuring Spring Boot 2.3.10 with OAuth2 client support, detailing required dependencies, application and security settings, common session‑related errors, step‑by‑step debugging of OAuth2LoginAuthenticationFilter and OAuth2AuthorizationRequestRedirectFilter, and the final solution of aligning hostnames to preserve cookies.

OAuth2SessionSpring Boot
0 likes · 9 min read
Troubleshooting Spring Boot OAuth2 Integration: Session Issues and Fixes
Laravel Tech Community
Laravel Tech Community
May 17, 2021 · Backend Development

hash_update() – Adding Data to an Active Hash Context

hash_update() is a PHP function that appends a string of data to an active hash computation context created by hash_init(), takes a resource context and a string data as parameters, and returns TRUE upon successful update of the hash digest.

HashPHPhash_update
0 likes · 1 min read
hash_update() – Adding Data to an Active Hash Context
MaGe Linux Operations
MaGe Linux Operations
May 17, 2021 · Information Security

How to Harden Linux: Essential Security Settings and Best Practices

This comprehensive guide walks you through selecting a secure Linux distribution, configuring kernel and sysctl parameters, applying boot‑time hardening, managing network and firewall rules, restricting root access, enabling MAC policies, sandboxing applications, and employing advanced memory and entropy techniques to dramatically improve system privacy and resilience against attacks.

$rootHardeningLinux
0 likes · 55 min read
How to Harden Linux: Essential Security Settings and Best Practices
Laravel Tech Community
Laravel Tech Community
May 15, 2021 · Backend Development

PHP hash_pbkdf2() Function: Generating PBKDF2 Key Derivation

This article explains the PHP hash_pbkdf2() function, detailing its parameters, return values, and usage with a complete example that demonstrates how to derive a PBKDF2 key using a chosen hash algorithm, password, salt, iteration count, and output format.

PBKDF2encryptionhash_pbkdf2
0 likes · 3 min read
PHP hash_pbkdf2() Function: Generating PBKDF2 Key Derivation
政采云技术
政采云技术
May 11, 2021 · Backend Development

An Introduction to Deno: Architecture, Features, and Hands‑On Usage

This article explains what Deno is, its origins and motivations, compares it with Node.js, describes its Rust‑based architecture, security model, built‑in tools, TypeScript and WebAssembly support, and provides step‑by‑step examples for installation, HTTP requests, remote imports, and building simple services.

DenoJavaScript runtimeNode.js alternative
0 likes · 19 min read
An Introduction to Deno: Architecture, Features, and Hands‑On Usage
php Courses
php Courses
May 11, 2021 · Information Security

Implementing a Simple CAPTCHA Generator and Recognizer in PHP

This article demonstrates how to create a basic CAPTCHA image with PHP, convert it to a binary matrix, segment characters, extract feature patterns, and recognize the code by matching against stored templates, providing full source code and a sample execution result.

Image Processingpattern-matchingsecurity
0 likes · 11 min read
Implementing a Simple CAPTCHA Generator and Recognizer in PHP