Tagged articles
2152 articles
Page 17 of 22
Senior Brother's Insights
Senior Brother's Insights
Nov 22, 2020 · Backend Development

Prevent Duplicate Submissions with JWT Tokens in a Java Backend

This article explains how to use JWT tokens in a Java backend to prevent duplicate form submissions, covering the problem of repeated clicks, two mitigation approaches, detailed token generation utilities, session handling methods, and practical code examples for creating, validating, and managing tokens.

BackendJWTToken
0 likes · 12 min read
Prevent Duplicate Submissions with JWT Tokens in a Java Backend
Top Architect
Top Architect
Nov 22, 2020 · Backend Development

Spring vs Spring Boot: Core Differences, Configuration, and Deployment Guide

This article compares Spring and Spring Boot, explaining their fundamental concepts, Maven dependencies, MVC and security configurations, template engine setup, startup mechanisms, and packaging options, while providing practical code examples to help Java developers choose and migrate between the two frameworks.

ConfigurationSpringBootjava
0 likes · 12 min read
Spring vs Spring Boot: Core Differences, Configuration, and Deployment Guide
Ctrip Technology
Ctrip Technology
Nov 19, 2020 · Cloud Native

Deploying Cilium with BGP for Cloud‑Native Networking and Security at Ctrip

This article describes Ctrip's adoption of Cilium with BGP to build a high‑performance, eBPF‑based cloud‑native network, covering the evolution from Neutron+OVS, the BGP peering model, traffic forwarding paths, L4 load‑balancing, security policy implementation, and multi‑cluster integration using ClusterMesh.

BGPCiliumCloud Native Networking
0 likes · 14 min read
Deploying Cilium with BGP for Cloud‑Native Networking and Security at Ctrip
Laiye Technology Team
Laiye Technology Team
Nov 17, 2020 · Information Security

Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology

This article details Laiye Technology's end‑to‑end security strategy—including application hardening, password policies, brute‑force defenses, SQL injection, XSS and CSRF mitigations, privilege controls, secure file uploads, code‑review standards, and infrastructure vulnerability scanning—to protect sensitive data and AI‑driven robot platforms from a wide range of attacks.

CSRFPassword policySQL injection
0 likes · 21 min read
Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology
Xueersi Online School Tech Team
Xueersi Online School Tech Team
Nov 13, 2020 · Backend Development

Building Robust Backend Systems: Architecture, Best Practices, and Operational Guidelines

This article explains why robust systems are essential, outlines key architectural and design principles, presents practical implementation details such as service layering, micro‑service migration, container simulation code, timeout handling, monitoring, security measures, and performance tuning to help engineers build reliable, scalable backend applications.

RobustnessSystem Architectureperformance tuning
0 likes · 22 min read
Building Robust Backend Systems: Architecture, Best Practices, and Operational Guidelines
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 13, 2020 · Information Security

Understanding KASAN: Principles and Usage in the Linux Kernel

KASAN, the Kernel Address Sanitizer, is a built‑in Linux kernel tool that uses shadow memory to mark each 8‑byte block’s accessibility, enabling detection of out‑of‑bounds and use‑after‑free errors while consuming about one‑eighth of RAM and requiring kernel configuration changes to activate.

KASANLinux kernelMemory Debugging
0 likes · 8 min read
Understanding KASAN: Principles and Usage in the Linux Kernel
Ops Development Stories
Ops Development Stories
Nov 13, 2020 · Cloud Native

Mastering Harbor: Efficient, Secure Docker Image Distribution in Cloud‑Native Environments

This article introduces Harbor, an enterprise‑grade Docker image registry designed for cloud‑native environments, detailing its efficient distribution mechanisms, security features such as signing and vulnerability scanning, HA solutions, and step‑by‑step installation methods using offline packages, Docker‑compose, and Helm charts.

Cloud NativeDocker RegistryHarbor
0 likes · 16 min read
Mastering Harbor: Efficient, Secure Docker Image Distribution in Cloud‑Native Environments
Alibaba Terminal Technology
Alibaba Terminal Technology
Nov 11, 2020 · Backend Development

Safely Running Untrusted Code in Node.js: Isolation Strategies & Performance

This article examines reliable and relatively reliable methods for executing untrusted JavaScript code in Node.js, comparing new Function, the VM module, and Worker Threads, discussing their isolation levels, memory and CPU limits, performance overhead, and extending to container and WebAssembly security solutions.

Node.jsWebAssemblyWorker Threads
0 likes · 8 min read
Safely Running Untrusted Code in Node.js: Isolation Strategies & Performance
UCloud Tech
UCloud Tech
Nov 10, 2020 · Cloud Computing

How UCloud’s SDN Architecture Tackles Heterogeneous Cloud Networks

In a detailed interview, UCloud’s virtual network lead Zhou Jian explains how the company’s SDN‑based solutions address heterogeneous network challenges—security isolation, performance, and consistent user experience—through programmable VPCs, hybrid gateways, global traffic cleaning, and multi‑cloud connectivity, illustrating the evolution from VPC 1.0 to today’s global backbone.

SDNUCloudVPC
0 likes · 11 min read
How UCloud’s SDN Architecture Tackles Heterogeneous Cloud Networks
360 Tech Engineering
360 Tech Engineering
Nov 9, 2020 · Information Security

Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth

This article explains the principles and workflows of typical authentication mechanisms—including HTTP Basic authentication, cookie‑based sessions, JSON Web Tokens, and OAuth—detailing their encryption processes, storage strategies, token refresh techniques, and security considerations for modern web applications.

AuthenticationHTTPJWT
0 likes · 12 min read
Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth
Node Underground
Node Underground
Nov 9, 2020 · Backend Development

How Node.js Is Evolving to Meet Ryan Dahl’s Deno Criticisms

An interview with Red Hat engineer Bethany Griggs reveals how Node.js 15 addresses security, error handling, and future priorities while responding to Ryan Dahl’s criticisms that inspired the Deno runtime, highlighting the platform’s role in cloud‑native microservices and server‑side JavaScript.

DenoNode.jssecurity
0 likes · 10 min read
How Node.js Is Evolving to Meet Ryan Dahl’s Deno Criticisms
Architects' Tech Alliance
Architects' Tech Alliance
Nov 7, 2020 · Fundamentals

Design Considerations and Architecture of Distributed File Systems

This article examines the evolution, core requirements, architectural models (centralized and decentralized), persistence strategies, scalability, high availability, performance optimization, security mechanisms, and additional design trade‑offs of distributed file systems, providing a comprehensive overview for architects and engineers.

ConsistencyDistributed File SystemScalability
0 likes · 19 min read
Design Considerations and Architecture of Distributed File Systems
php Courses
php Courses
Nov 5, 2020 · Backend Development

Advanced Laravel Authentication Customizations and Tips

This article provides a comprehensive guide to customizing Laravel's built‑in authentication system, covering route parameters, controller generation, password confirmation, device logout, redirect logic, user creation via Tinker and factories, login throttling, and additional credential checks, all with practical code examples.

AuthRoutesAuthenticationBackend
0 likes · 12 min read
Advanced Laravel Authentication Customizations and Tips
Programmer DD
Programmer DD
Nov 3, 2020 · Information Security

WeChat Pay V3: Parse API Certificates & Generate Secure Signatures in Java

This guide walks you through the essential steps for handling WeChat Pay V3 integration, including obtaining and parsing the API certificate with Java's KeyStore, extracting the key pair, constructing the required signature string, performing SHA256withRSA signing, and assembling the Authorization token for secure payment requests.

API CertificatePayment IntegrationWeChat Pay
0 likes · 12 min read
WeChat Pay V3: Parse API Certificates & Generate Secure Signatures in Java
Tencent Cloud Middleware
Tencent Cloud Middleware
Oct 30, 2020 · Cloud Computing

How KonaJDK Powers Tencent Cloud Java, Big Data, and Secure Computing

This article explains how Tencent's self‑developed KonaJDK underpins cloud Java services, enhances micro‑service monitoring, adds national cryptography support, optimizes large‑heap tools like jmap, and delivers performance gains for big‑data workloads, while contributing key features back to the OpenJDK community.

Big DataJVMKonaJDK
0 likes · 11 min read
How KonaJDK Powers Tencent Cloud Java, Big Data, and Secure Computing
Top Architect
Top Architect
Oct 30, 2020 · Backend Development

Implementing Login Authentication with Session and JWT in Spring Boot

This article provides a step‑by‑step guide to implementing login authentication in Spring Boot, covering both session‑based and JWT‑based approaches, including code for controllers, filters, interceptors, context utilities, and best‑practice considerations for secure and scalable backend development.

JWTSessionSpring Boot
0 likes · 22 min read
Implementing Login Authentication with Session and JWT in Spring Boot
Aotu Lab
Aotu Lab
Oct 30, 2020 · Information Security

Can Node.js vm Sandbox Be Escaped? Understanding vm Security and Escape Techniques

This article explains how Node.js's vm module creates isolated execution contexts, demonstrates several sandbox‑escape techniques using prototype chain manipulation, and offers practical solutions such as code scanning, using vm2, or building a custom interpreter to mitigate security risks.

ESCAPEJavaScriptNode.js
0 likes · 7 min read
Can Node.js vm Sandbox Be Escaped? Understanding vm Security and Escape Techniques
ITPUB
ITPUB
Oct 29, 2020 · Fundamentals

Mastering Linux chmod: A Complete Guide to File Permission Management

This tutorial explains Linux file permissions, the chmod command syntax, numeric and symbolic modes, recursive options, and practical examples, enabling readers to confidently view, modify, and troubleshoot permissions for files and directories.

File PermissionsUnixchmod
0 likes · 10 min read
Mastering Linux chmod: A Complete Guide to File Permission Management
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 29, 2020 · Databases

How Deleting Servers and Databases Happens and How to Prevent Accidental Deletion

The article explains various ways programmers and DBAs can permanently delete server files, databases, tables, or data using Linux rm commands and SQL statements like DROP, TRUNCATE, and DELETE, illustrates the risks of accidental or malicious deletions, and offers practical tips for prevention such as careful command review, strict permission control, and regular backups.

BackupLinux rmSQL DROP
0 likes · 5 min read
How Deleting Servers and Databases Happens and How to Prevent Accidental Deletion
IT Architects Alliance
IT Architects Alliance
Oct 27, 2020 · Fundamentals

Understanding Software Architecture: Essence, Classifications, and Evaluation Criteria

This article explains the essence of software architecture, outlines its various classifications—including business, application, technical, code, and deployment architectures—describes when architecture design is needed, and presents metrics and common pitfalls for evaluating a sound, scalable system.

BackendScalabilitySoftware Architecture
0 likes · 14 min read
Understanding Software Architecture: Essence, Classifications, and Evaluation Criteria
Efficient Ops
Efficient Ops
Oct 26, 2020 · Operations

Secure Production ELK Stack with Kafka: Step‑by‑Step Deployment Guide

This guide walks through building a secure, production‑grade logging pipeline by deploying an ELK stack (Elasticsearch, Logstash, Kibana) with X‑Pack security, a Kafka message queue with SASL authentication, and Filebeat agents, covering environment preparation, certificate generation, configuration files, and startup scripts.

DeploymentELKKafka
0 likes · 31 min read
Secure Production ELK Stack with Kafka: Step‑by‑Step Deployment Guide
IT Architects Alliance
IT Architects Alliance
Oct 26, 2020 · R&D Management

What Skills Do You Need to Become a Great Software Architect?

This comprehensive guide outlines the philosophical mindset, core competencies, technical knowledge, architectural principles, and essential tools that aspiring software architects should master to build robust, scalable, and secure systems in modern IT environments.

DevOpsSkill developmentSoftware Architecture
0 likes · 14 min read
What Skills Do You Need to Become a Great Software Architect?
Tencent Cloud Developer
Tencent Cloud Developer
Oct 26, 2020 · Databases

Database Auditing: Concepts, Methods, and TXSQL Implementation

Database auditing records user actions to detect illegal operations, with approaches ranging from application‑layer and transport‑layer monitoring to kernel‑level and plugin solutions; TXSQL’s MySQL‑compatible audit plugin offers both synchronous and asynchronous modes, delivering flexible rule configuration and only 3‑6 % performance overhead, making it a low‑impact, feature‑rich choice for compliance and forensics.

Audit ArchitectureDatabase AuditingTXSQL
0 likes · 12 min read
Database Auditing: Concepts, Methods, and TXSQL Implementation
Xianyu Technology
Xianyu Technology
Oct 20, 2020 · Backend Development

Doraemon Marketing Activity Platform: Architecture, Challenges, and Solutions

The Doraemon Marketing Activity Platform centralizes Xianyu’s user‑rights campaigns—red packets, coupons, vouchers—by providing a three‑layer architecture, reusable components, operator‑friendly configuration, rapid issue detection, and robust security, enabling non‑technical staff to launch, monitor, and reconcile activities efficiently while handling traffic spikes and fraud.

System Architectureactivity managementmarketing platform
0 likes · 10 min read
Doraemon Marketing Activity Platform: Architecture, Challenges, and Solutions
政采云技术
政采云技术
Oct 18, 2020 · Information Security

How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide

In the era of big data and GDPR, front‑end developers must protect personal information beyond HTTPS by using a hybrid AES‑RSA encryption scheme, and this article explains the threats, compares symmetric, asymmetric and hash algorithms, and provides full client‑side and Node.js server implementations with code examples.

AESGDPRJavaScript
0 likes · 16 min read
How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide
ITPUB
ITPUB
Oct 15, 2020 · Operations

Essential Linux Monitoring & Performance Tools Every Sysadmin Should Know

This guide introduces thirteen practical Linux utilities—ranging from network bandwidth monitors and disk I/O testers to security hardening and terminal multiplexing tools—complete with installation commands, usage examples, and key options to help system administrators efficiently monitor, diagnose, and optimize their servers.

LinuxPerformance Testingcommand-line tools
0 likes · 11 min read
Essential Linux Monitoring & Performance Tools Every Sysadmin Should Know
Java Captain
Java Captain
Oct 15, 2020 · Backend Development

Base Admin: A Simple Generic Backend Management System with SpringBoot, Thymeleaf, and Layui

This article introduces Base Admin, a lightweight yet feature‑rich backend management system built with SpringBoot, Thymeleaf, WebSocket, Spring Security, MySQL and a Layui frontend, detailing its architecture, core modules, real‑time logging, monitoring, API encryption, and code‑generation utilities.

Adminapi-encryptioncode-generation
0 likes · 6 min read
Base Admin: A Simple Generic Backend Management System with SpringBoot, Thymeleaf, and Layui
Liangxu Linux
Liangxu Linux
Oct 14, 2020 · Operations

Top 13 Essential Linux Tools for System Monitoring and Performance

This guide introduces thirteen practical Linux utilities—including Nethogs, IOZone, IOTop, IPtraf, IFTop, HTop, NMON, MultiTail, Fail2ban, Tmux, Agedu, NMap, and Httperf—covering their purpose, installation commands, key options, and example usage for effective system monitoring and troubleshooting.

LinuxPerformance Testingcommand-line
0 likes · 11 min read
Top 13 Essential Linux Tools for System Monitoring and Performance
IT Architects Alliance
IT Architects Alliance
Oct 11, 2020 · Cloud Computing

Designing a Secure, Scalable Private Cloud: Principles, Architecture, and Best Practices

This article provides a comprehensive guide to building private cloud infrastructures, covering core principles of stability, scalability and redundancy, storage options, network design, compute resource planning, operating‑system choices, security mechanisms, cloud‑ification techniques, and practical OpenStack deployment examples.

OpenStackarchitecturenetwork
0 likes · 46 min read
Designing a Secure, Scalable Private Cloud: Principles, Architecture, and Best Practices
IT Architects Alliance
IT Architects Alliance
Oct 8, 2020 · Fundamentals

Understanding Software Architecture: Core Concepts, Layers, and Evolution

This comprehensive guide explains what software architecture is, distinguishes systems, subsystems, modules, components, and frameworks, outlines architecture layers and classifications, describes strategic versus tactical design, tracks the evolution from monoliths to micro‑services, and highlights how to evaluate and avoid common architectural pitfalls.

Architecture PatternsMicroservicesScalability
0 likes · 25 min read
Understanding Software Architecture: Core Concepts, Layers, and Evolution
Meituan Technology Team
Meituan Technology Team
Sep 30, 2020 · Information Security

Security Control Algorithms for Cyber‑Physical Systems

Professor Mo Yilin explained that securing cyber‑physical systems—such as autonomous vehicles and smart grids—requires a multi‑layered approach combining control‑theoretic redundancy, active watermark‑based intrusion detection, resilient estimation, and data‑driven design to maintain safe operation despite networked attacks and replay threats, ensuring reliability of critical infrastructure.

Resiliencecontrol algorithmscyber-physical systems
0 likes · 25 min read
Security Control Algorithms for Cyber‑Physical Systems
AntTech
AntTech
Sep 29, 2020 · Information Security

Security Aspect: Extending Aspect‑Oriented Programming to Mobile and IoT Defense

The article explains how Ant Group’s security‑aspect defense model extends aspect‑oriented programming concepts to create a parallel, decoupled security layer for mobile and IoT applications, improving threat visibility, supply‑chain protection, and governance without requiring business code releases.

Aspect Oriented ProgrammingIoTMobile Security
0 likes · 7 min read
Security Aspect: Extending Aspect‑Oriented Programming to Mobile and IoT Defense
JD Cloud Developers
JD Cloud Developers
Sep 25, 2020 · Information Security

Master Malware Analysis: Build a Cuckoo Sandbox with SystemTap Monitoring

This guide explains sandbox fundamentals, compares Windows and Adobe Reader sandboxes, and provides step‑by‑step instructions for installing and configuring a Cuckoo Linux sandbox on Ubuntu, including SystemTap syscall monitoring and signature creation illustrated with a Gonnacry ransomware case study.

CuckooLinuxSystemTap
0 likes · 11 min read
Master Malware Analysis: Build a Cuckoo Sandbox with SystemTap Monitoring
IT Architects Alliance
IT Architects Alliance
Sep 22, 2020 · Cloud Computing

How CDN Can Evolve into a Powerful Edge Computing Platform

This article analyzes how traditional CDN infrastructure can be transformed into a comprehensive edge computing platform, covering CDN fundamentals, edge computing layers, IaaS/PaaS/SaaS models, container and Kubernetes deployment, future trends, and practical Q&A insights.

5GCDNContainers
0 likes · 17 min read
How CDN Can Evolve into a Powerful Edge Computing Platform
Swan Home Tech Team
Swan Home Tech Team
Sep 16, 2020 · Information Security

Understanding Account System Capabilities, Authentication, and Security

This article provides a comprehensive overview of the PASSPORT account system, detailing its registration process, login mechanisms, authentication methods, security challenges, system evolution, and stability considerations to guide developers in building robust and secure user identity services.

AuthenticationAuthorizationPassport
0 likes · 8 min read
Understanding Account System Capabilities, Authentication, and Security
JD Cloud Developers
JD Cloud Developers
Sep 14, 2020 · Artificial Intelligence

This Week’s Tech Highlights: AI Competition Victory, Cloud Growth & New Research

The latest Developer Community Tech Weekly covers JD AI's QuAC competition win, the launch of China's first open‑source foundation, a surge in cloud spending during the pandemic, C++'s TIOBE resurgence, Starlink's sub‑20 ms latency, a teen‑led DDoS incident, and cutting‑edge research on GAN‑based recommendation, image localization, and 3D semantic segmentation datasets.

AIcloud computingresearch
0 likes · 7 min read
This Week’s Tech Highlights: AI Competition Victory, Cloud Growth & New Research
Architecture Digest
Architecture Digest
Sep 13, 2020 · Databases

MySQL 8.0 Version History and New Features

An overview of MySQL 8.0’s release timeline, including major GA versions, and a detailed summary of its new capabilities such as transactional data dictionary, atomic DDL, enhanced security, role support, InnoDB improvements, JSON enhancements, optimizer extensions, backup lock, connection management, and other performance and management features.

8.0InnoDBVersion History
0 likes · 10 min read
MySQL 8.0 Version History and New Features
Aotu Lab
Aotu Lab
Sep 10, 2020 · Frontend Development

Beyond React vs Vue: Exploring Frontend Fundamentals, Security, and Design

This article offers a comprehensive look at modern frontend development, from unbiased React‑Vue comparisons and Lodash security insights to icon workflow evolution, smooth corner techniques in Figma, SOLID principles, code‑effort metrics, AI recommendation system reading, project management tips, and the role of design tokens.

DesignReactVue
0 likes · 7 min read
Beyond React vs Vue: Exploring Frontend Fundamentals, Security, and Design
Java Backend Technology
Java Backend Technology
Sep 6, 2020 · Information Security

How Offline Payment Codes Work: From OTP to Secure Transactions

This article explains the two main mobile payment methods, details the online and offline payment‑code schemes, describes the OTP generation algorithm based on HMAC‑SHA1 and BASE32, and discusses the security trade‑offs and practical considerations of offline payment codes.

OTPmobile paymentsoffline payment
0 likes · 12 min read
How Offline Payment Codes Work: From OTP to Secure Transactions
Python Crawling & Data Mining
Python Crawling & Data Mining
Sep 1, 2020 · Information Security

How to Perform SSH Brute‑Force Attacks with Python and Paramiko

This tutorial explains the concept of password‑brute‑force, introduces the open‑source sshfucker library and a custom multithreaded Python script that uses Paramiko to enumerate SSH credentials from a dictionary, and provides step‑by‑step code examples and usage instructions while warning against illegal use.

ParamikoPythonSSH
0 likes · 7 min read
How to Perform SSH Brute‑Force Attacks with Python and Paramiko
macrozheng
macrozheng
Sep 1, 2020 · Information Security

Why JWT Is Both Loved and Criticized: A Deep Dive into Token Authentication

This article compares traditional cookie‑session authentication with JWT, explains JWT’s three‑part structure, shows how to generate and verify tokens in Java, and discusses security benefits, pitfalls, and practical considerations for modern web and mobile applications.

JWTTokenjava
0 likes · 14 min read
Why JWT Is Both Loved and Criticized: A Deep Dive into Token Authentication
OPPO Amber Lab
OPPO Amber Lab
Aug 31, 2020 · Information Security

Android Kernel Hooking: Bypassing GKI Limits & Memory Protection

This article examines the security challenges of Android and IoT devices built on ARM/ARM64 platforms, explains how Google's Generic Kernel Image (GKI) restricts kernel modifications, and provides detailed techniques—including memory‑page attribute manipulation, remap_pfn_range, and assembly‑level hook implementations—to safely inject custom functionality into the kernel while addressing write‑protection, concurrency, and module‑unloading issues.

ARMAndroidGKI
0 likes · 15 min read
Android Kernel Hooking: Bypassing GKI Limits & Memory Protection
Liangxu Linux
Liangxu Linux
Aug 29, 2020 · Information Security

How to Hide a Linux Process with a One‑Line SystemTap Script

This guide shows a quick user‑space technique to conceal a Linux process by overwriting its PID with an unused value using a short SystemTap script, includes the exact code, execution steps, detection method, and a brief explanation of why it works.

LinuxSystemTapkernel
0 likes · 4 min read
How to Hide a Linux Process with a One‑Line SystemTap Script
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Aug 28, 2020 · Information Security

Position Independent Code (PIC), Position Independent Executable (PIE), and Address Space Layout Randomization (ASLR) in Linux

The article explains how Position Independent Code (PIC) enables code to run at any address using GOT and PLT tricks, how Position Independent Executables (PIE) extend this to whole binaries, and how Linux’s Address Space Layout Randomization (ASLR) leverages PIE to fully randomize process memory, making exploitation significantly harder.

ASLRLinuxPIC
0 likes · 13 min read
Position Independent Code (PIC), Position Independent Executable (PIE), and Address Space Layout Randomization (ASLR) in Linux
Java Architecture Diary
Java Architecture Diary
Aug 27, 2020 · Information Security

How to Mitigate the Critical Jackson‑databind CVE‑2020‑24616 Vulnerability in Spring Boot

This article explains the high‑severity CVE‑2020‑24616 deserialization flaw in jackson‑databind, identifies affected Jackson and Spring Boot versions, and provides Maven‑based remediation steps such as version pinning, dependency exclusions, and dependencyManagement configuration to prevent remote code execution.

CVE-2020-24616DeserializationJackson
0 likes · 4 min read
How to Mitigate the Critical Jackson‑databind CVE‑2020‑24616 Vulnerability in Spring Boot
Tencent Cloud Developer
Tencent Cloud Developer
Aug 24, 2020 · Databases

Tencent Cloud MySQL 8.0 Enterprise Features and Industry Applications

Tencent Cloud MySQL 8.0 builds on official MySQL improvements with eight enterprise‑grade enhancements—TDE encryption, kernel‑level audit, multi‑queue thread pool, strong consistency, AEP SSD support, lightweight AP mode, hotspot updates, and SQL rate‑limiting—delivering high‑performance, secure, and scalable solutions for e‑commerce, gaming, finance, and new‑retail workloads while paving the way for cloud‑native, AI‑driven database evolution.

Cloud Nativeindustry use casesmysql
0 likes · 30 min read
Tencent Cloud MySQL 8.0 Enterprise Features and Industry Applications
Code Ape Tech Column
Code Ape Tech Column
Aug 23, 2020 · Information Security

MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis

This article explains how improper use of MyBatis in Java web applications can lead to SQL injection vulnerabilities, illustrates three typical injection scenarios with code examples, and provides a step‑by‑step practical workflow for discovering and confirming such flaws in a real CMS project.

Code AuditingMyBatisSQL injection
0 likes · 7 min read
MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis
DevOps
DevOps
Aug 21, 2020 · Backend Development

API Design Principles and Checklist for Microservices

Effective API design in microservices requires platform independence, reliability, appropriate RESTful maturity, avoiding simple wrappers, ensuring separation of concerns, exhaustive and independent endpoints, proper versioning, consistent naming, and security measures, all of which are detailed alongside practical examples and a comprehensive review checklist.

MicroservicesRESTfulVersioning
0 likes · 11 min read
API Design Principles and Checklist for Microservices
Code Ape Tech Column
Code Ape Tech Column
Aug 20, 2020 · Information Security

How to Spot MyBatis SQL Injection Vulnerabilities: A Practical Guide

This article walks through the typical ways MyBatis can introduce SQL injection—through misuse of # and $ in LIKE, IN, and ORDER BY clauses—provides correct code examples, and demonstrates a step‑by‑step reverse‑engineering workflow on an open‑source CMS to locate and confirm the vulnerability.

Code AuditingMyBatisSQL injection
0 likes · 7 min read
How to Spot MyBatis SQL Injection Vulnerabilities: A Practical Guide
Open Source Linux
Open Source Linux
Aug 18, 2020 · Databases

7 Reasons Docker Isn’t Ideal for Database Deployment (And When It Works)

This article examines seven critical drawbacks of running databases inside Docker containers—including data safety, performance, networking, statefulness, resource isolation, cloud platform limitations, and environment requirements—while also suggesting scenarios where containerized databases may still be viable.

Dockercontainerizationsecurity
0 likes · 9 min read
7 Reasons Docker Isn’t Ideal for Database Deployment (And When It Works)
DataFunTalk
DataFunTalk
Aug 16, 2020 · Artificial Intelligence

IFX: Didi’s In‑House AI Inference Engine Platform – Architecture, Productization, and Performance

The article introduces Didi’s IFX platform, describing its background, four‑layer architecture (access, software, engine, compute), productization efforts such as high‑performance optimizations, model and engine compression, unified deployment across hardware, multi‑framework support, automation, and security enhancements, and concludes with future plans.

AI inferenceDidiplatform architecture
0 likes · 8 min read
IFX: Didi’s In‑House AI Inference Engine Platform – Architecture, Productization, and Performance
Architecture Digest
Architecture Digest
Aug 16, 2020 · Information Security

MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis

This article explains how improper use of MyBatis in Java web applications can lead to SQL injection vulnerabilities, illustrates three typical injection patterns with code examples, and provides a step‑by‑step practical methodology for locating and confirming such flaws in an open‑source CMS project.

Code AuditingMyBatisSQL injection
0 likes · 6 min read
MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis
Java Architect Essentials
Java Architect Essentials
Aug 14, 2020 · Industry Insights

Designing High‑Performance, Scalable Architecture for Large‑Scale Websites

This article provides a comprehensive overview of large‑scale website architecture, covering characteristic traits, performance and availability goals, layered design patterns, security measures, scalability and extensibility strategies, evolution stages, capacity estimation, and practical optimization techniques for e‑commerce platforms.

Scalabilitydistributed architecturee‑commerce
0 likes · 25 min read
Designing High‑Performance, Scalable Architecture for Large‑Scale Websites
Programmer DD
Programmer DD
Aug 13, 2020 · Information Security

How Facebook’s Pysa Static Analyzer Secures Millions of Python Lines

Facebook’s open‑source Pysa tool statically scans Python code to detect data‑flow vulnerabilities, XSS and SQL‑injection risks, leveraging Pyre and Zoncolan techniques, achieving rapid analysis of millions of lines and uncovering 44% of Instagram’s security flaws in early 2020.

Code ScanningFacebookPysa
0 likes · 4 min read
How Facebook’s Pysa Static Analyzer Secures Millions of Python Lines
Selected Java Interview Questions
Selected Java Interview Questions
Aug 12, 2020 · Information Security

Integrating Apache Shiro with Spring Boot for Permission Management

This article demonstrates how to integrate the Apache Shiro security framework into a Spring Boot application, covering Maven dependencies, Shiro configuration, custom Realm implementation, login authentication, controller-level access control, and Thymeleaf front‑end button visibility based on roles and permissions.

ShiroSpring BootThymeleaf
0 likes · 13 min read
Integrating Apache Shiro with Spring Boot for Permission Management
Laravel Tech Community
Laravel Tech Community
Aug 11, 2020 · Backend Development

Apache HTTP Server 2.4.46 Released with Security Fixes and Enhancements

Apache HTTP Server 2.4.46 has been released, addressing several security vulnerabilities (including CVE‑2020‑11984 and CVE‑2020‑11993), fixing bugs, and adding enhancements such as improved module compatibility and requirements for APR libraries, while urging users to migrate from the deprecated 2.2 branch.

ApacheCVEHTTP server
0 likes · 3 min read
Apache HTTP Server 2.4.46 Released with Security Fixes and Enhancements
Architects Research Society
Architects Research Society
Aug 11, 2020 · Cloud Computing

Differences Between Cloudflare and CloudFront

This article compares Cloudflare and Amazon CloudFront, outlining their respective CDN architectures, setup processes, feature sets, performance characteristics, security offerings, and ideal use cases to help users choose the most suitable service for their web applications.

CDNCloudFrontCloudflare
0 likes · 8 min read
Differences Between Cloudflare and CloudFront
Java Captain
Java Captain
Aug 11, 2020 · Backend Development

Base Admin: Overview of a Simple General‑Purpose Backend Management System

The article introduces Base Admin, a lightweight, general‑purpose backend management system built with SpringBoot, Thymeleaf, WebSocket, Spring Security, JPA and MySQL, detailing its architecture, core features such as login control, permission management, real‑time logging, monitoring, API encryption, and providing update notes and source code links.

admin panelapi-encryptionsecurity
0 likes · 7 min read
Base Admin: Overview of a Simple General‑Purpose Backend Management System
Cloud Native Technology Community
Cloud Native Technology Community
Aug 6, 2020 · Industry Insights

What the 2020 Cloud Native Development White Paper Reveals About China’s Emerging Ecosystem

The 2020 Cloud Native Development White Paper, released by China Academy of Information and Communications Technology, analyzes the rapid growth, market size, ecosystem landscape, hot technologies and emerging security challenges of China’s cloud‑native industry, providing data‑driven insights for enterprises and policymakers.

Industry AnalysisMarket SizeTechnology Ecosystem
0 likes · 6 min read
What the 2020 Cloud Native Development White Paper Reveals About China’s Emerging Ecosystem
Architecture Digest
Architecture Digest
Aug 4, 2020 · Information Security

Integrating Apache Shiro with Spring Boot for Authentication and Authorization

This guide demonstrates how to integrate Apache Shiro into a Spring Boot application, covering project setup, Maven dependencies, configuration of Redis-backed session and cache management, creation of utility and realm classes, and implementation of role‑based permission controls with example controllers and Postman testing.

AuthenticationAuthorizationShiro
0 likes · 22 min read
Integrating Apache Shiro with Spring Boot for Authentication and Authorization
21CTO
21CTO
Aug 3, 2020 · Databases

Transparent Data Encryption: How It Secures Databases, Pros & Cons

This article explains how Transparent Data Encryption (TDE) protects sensitive data in databases by encrypting pages with keys stored in a secure vault, outlines its advantages and drawbacks, and compares page-level encryption with column-level approaches.

Key VaultTransparent Data Encryptiondatabase encryption
0 likes · 6 min read
Transparent Data Encryption: How It Secures Databases, Pros & Cons
IT Architects Alliance
IT Architects Alliance
Aug 2, 2020 · Industry Insights

What the 2020 China Cloud‑Native Whitepaper Reveals About Industry Trends and Challenges

The 2020 Cloud‑Native Development Whitepaper, compiled by the China Academy of Information and Communications Technology, offers a data‑driven overview of China’s cloud‑native market size, ecosystem, hot technologies, security frameworks, and emerging industry applications, highlighting four key future trends shaping the sector.

ChinaCloud NativeIndustry Analysis
0 likes · 7 min read
What the 2020 China Cloud‑Native Whitepaper Reveals About Industry Trends and Challenges
ITPUB
ITPUB
Jul 31, 2020 · Backend Development

What Java Developers Can Learn from Top StackOverflow Questions: Branch Prediction, Security, Exceptions, and More

This article reviews several of the most popular Java questions on StackOverflow, explaining branch prediction for sorted arrays, why char[] is safer than String for passwords, handling NullPointerException, deterministic random strings, historic timezone quirks, creating an uncatchable exception, and the differences between HashMap, TreeMap and LinkedHashMap, highlighting practical lessons for developers.

Exception HandlingHashMapStackOverflow
0 likes · 10 min read
What Java Developers Can Learn from Top StackOverflow Questions: Branch Prediction, Security, Exceptions, and More
IT Architects Alliance
IT Architects Alliance
Jul 25, 2020 · Fundamentals

What Makes Distributed File Systems Tick? Design Principles and Trade‑offs

This article examines the core concepts, architectural models, scalability, persistence, high availability, performance optimization, and security considerations of distributed file systems, comparing centralized and decentralized designs such as GFS and Ceph to guide future system design decisions.

ConsistencyDistributed File SystemScalability
0 likes · 21 min read
What Makes Distributed File Systems Tick? Design Principles and Trade‑offs
FunTester
FunTester
Jul 23, 2020 · Industry Insights

How to Ensure Seamless End‑to‑End Testing for Mega Sales Events like Double 11

This guide outlines essential end‑to‑end testing, data monitoring, third‑party verification, security measures, and error‑reporting practices that teams should implement before high‑traffic sales events such as Double 11 and 618 to guarantee smooth operations.

big sales eventsdata monitoringend-to-end testing
0 likes · 6 min read
How to Ensure Seamless End‑to‑End Testing for Mega Sales Events like Double 11
Open Source Linux
Open Source Linux
Jul 21, 2020 · Information Security

Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide

This article explains why traditional password and key logins are vulnerable, introduces SSH certificate authentication using a Certificate Authority, and provides detailed commands and procedures for generating CA keys, issuing server and user certificates, configuring both server and client, and revoking certificates when needed.

Certificate AuthenticationCertificate AuthorityLinux
0 likes · 12 min read
Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide
MaGe Linux Operations
MaGe Linux Operations
Jul 18, 2020 · Backend Development

Master Nginx Rate Limiting: From Basics to Advanced Configurations

This article explains Nginx rate‑limiting fundamentals and advanced configurations, covering the leaky‑bucket algorithm, basic directives, burst and nodelay handling, whitelisting with geo/map, multiple limit rules, logging details, and custom error responses to protect servers and mitigate attacks.

ConfigurationNginxWeb server
0 likes · 11 min read
Master Nginx Rate Limiting: From Basics to Advanced Configurations
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 16, 2020 · Information Security

Unraveling Kernel Crashes: A Deep Dive into Memory Dump Analysis

This article explains why operating system and driver defects cause system hangs and reboots, introduces the methodology of memory dump analysis—including deadlock and exception techniques—and walks through a real Linux kernel panic case to illustrate how to trace, diagnose, and remediate such crashes.

Kernel PanicLinuxSystem Call
0 likes · 14 min read
Unraveling Kernel Crashes: A Deep Dive into Memory Dump Analysis
Architects' Tech Alliance
Architects' Tech Alliance
Jul 15, 2020 · Fundamentals

Design Considerations and Architecture of Distributed File Systems

This article provides a comprehensive overview of distributed file systems, covering their historical evolution, essential requirements such as POSIX compliance, persistence, scalability, and security, and compares centralized (e.g., GFS) and decentralized (e.g., Ceph) architectures, along with strategies for high availability, performance optimization, and handling small files.

ConsistencyDistributed File SystemScalability
0 likes · 21 min read
Design Considerations and Architecture of Distributed File Systems
macrozheng
macrozheng
Jul 13, 2020 · Information Security

Why Fastjson’s AutoType Is a Security Nightmare—and How to Fix It

This article examines Fastjson’s AutoType feature, explains how its design leads to serious deserialization vulnerabilities across multiple versions, demonstrates exploit techniques using crafted @type payloads, and provides practical mitigation steps such as enabling safeMode and upgrading to the latest release.

AutoTypeDeserializationfastjson
0 likes · 17 min read
Why Fastjson’s AutoType Is a Security Nightmare—and How to Fix It
High Availability Architecture
High Availability Architecture
Jul 10, 2020 · Frontend Development

Understanding WebRTC: Architecture, Protocols, APIs, and Security

WebRTC is a Google‑originated technology that enables real‑time audio, video, and data transmission across browsers, mobile platforms, and IoT devices, and this article explains its popularity, P2P connection process, signaling, NAT/ICE mechanisms, STUN/TURN servers, VP9 codec, JavaScript APIs, and security measures.

MediaStreamP2PSTUN
0 likes · 12 min read
Understanding WebRTC: Architecture, Protocols, APIs, and Security
Ctrip Technology
Ctrip Technology
Jul 9, 2020 · Information Security

Ctrip's DevSecOps Practices and Challenges

The article details Ctrip's DevSecOps challenges and solutions, covering security team structuring, threat modeling, SCA and SAST integration, IAST/DAST architecture, vulnerability management, and the resulting improvements in automated security testing within a high‑frequency CI/CD environment.

DevSecOpsIASTSAST
0 likes · 12 min read
Ctrip's DevSecOps Practices and Challenges
Laravel Tech Community
Laravel Tech Community
Jul 5, 2020 · Information Security

RuoYi Management System v4.3.1 Release Notes and Security Vulnerability Fixes

RuoYi Management System v4.3.1 introduces multiple functional enhancements and critical security patches, including fixes for Shiro remember‑Me command execution, SQL injection via PageHelper, Shiro permission‑bypass, and Fastjson deserialization vulnerabilities, along with code examples and configuration guidance.

RuoYiShiroVulnerability
0 likes · 8 min read
RuoYi Management System v4.3.1 Release Notes and Security Vulnerability Fixes
ITPUB
ITPUB
Jun 29, 2020 · Databases

How Tencent CloudBase Powers Mini‑Program Development with a High‑Performance Distributed NoSQL Database

This article explains the background, competitive landscape, requirements, and architectural design of Tencent CloudBase's cloud database for mini‑programs, detailing its security, ease of use, low‑cost, high‑performance, and flexible solutions, including access control, data safety, elastic scaling, hot migration, and intelligent DBA features.

NoSQLServerlessdatabases
0 likes · 23 min read
How Tencent CloudBase Powers Mini‑Program Development with a High‑Performance Distributed NoSQL Database
58 Tech
58 Tech
Jun 29, 2020 · Backend Development

Design and Evolution of an Intelligent Lending API Platform

This article details the end‑to‑end design, iterative evolution, and technical architecture of an intelligent lending API platform, covering workflow abstraction, service decomposition, security mechanisms, monitoring, and performance optimizations that enable scalable, reliable integration with multiple financial institutions.

MicroservicesService Architectureapi-design
0 likes · 14 min read
Design and Evolution of an Intelligent Lending API Platform
Alibaba Cloud Native
Alibaba Cloud Native
Jun 28, 2020 · Cloud Native

What’s New in Cloud Native? Harbor Graduation, Kubernetes CVE, CloneSet & More

This roundup covers the CNCF Harbor graduation, a delayed Kubernetes 1.19 release, a critical kube‑controller‑manager SSRF vulnerability, the introduction of the CloneSet CRD, fixes for managed fields, packet‑unmarking in kubelet/kube‑proxy, topology‑aware scheduling, new accelerator metrics, plus highlights on Cilium and OpenYurt.

DevOpscloud-nativeopen-source
0 likes · 5 min read
What’s New in Cloud Native? Harbor Graduation, Kubernetes CVE, CloneSet & More
Programmer DD
Programmer DD
Jun 24, 2020 · Information Security

How Google’s BeyondProd Redefines Cloud‑Native Security

This article translates Google’s 2019 BeyondProd whitepaper, explaining the shift from perimeter‑based to zero‑trust cloud‑native security, the key terminology, design motivations, core security principles, internal tools such as ALTS, Binary Authorization, gVisor, and concrete examples of data‑access and code‑change flows.

GoogleZero Trustcloud-native
0 likes · 33 min read
How Google’s BeyondProd Redefines Cloud‑Native Security
Selected Java Interview Questions
Selected Java Interview Questions
Jun 20, 2020 · Fundamentals

Comprehensive Guide to TCP: Differences with UDP, Handshakes, Termination, SYN Flood, Fast Open, Timestamps, RTO, Flow & Congestion Control, Nagle, Delayed ACK and Keep‑Alive

This article provides an in‑depth overview of TCP, explaining its core differences from UDP, the three‑way handshake and four‑way termination processes, half‑open queues and SYN‑Flood attacks, Fast Open, timestamp usage, retransmission timeout calculation, flow and congestion control mechanisms, as well as Nagle’s algorithm, delayed acknowledgments and TCP keep‑alive.

HandshakeNetworkingTCP
0 likes · 28 min read
Comprehensive Guide to TCP: Differences with UDP, Handshakes, Termination, SYN Flood, Fast Open, Timestamps, RTO, Flow & Congestion Control, Nagle, Delayed ACK and Keep‑Alive
21CTO
21CTO
Jun 11, 2020 · Information Security

Understanding OAuth2: How Access Tokens Secure User Data

This guide walks developers through the OAuth2 workflow, illustrating how users, client applications, resource servers, and authorization servers interact via access tokens to securely protect and grant access to user data, and highlights the critical steps of token issuance and validation.

Authorization ServerOAuth2Resource Server
0 likes · 8 min read
Understanding OAuth2: How Access Tokens Secure User Data