Tagged articles
2152 articles
Page 18 of 22
Java Architecture Diary
Java Architecture Diary
Jun 6, 2020 · Cloud Native

Explore Nacos 1.3.0: Embedded DB, New Raft Protocol, and High‑Availability

Nacos 1.3.0 introduces an embedded relational database, unified cluster management, an upgraded Raft consistency layer, security patches, Snowflake ID configuration, data migration guidance, new cluster addressing modes, and a set of Open‑API operations for Raft administration, all aimed at simplicity, performance, and high availability.

Cluster ManagementEmbedded DatabaseNacos
0 likes · 10 min read
Explore Nacos 1.3.0: Embedded DB, New Raft Protocol, and High‑Availability
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jun 1, 2020 · Databases

Guide to Upgrading MySQL from 5.7 to 8.0

This article provides a comprehensive step‑by‑step guide for DBAs to safely upgrade MySQL from version 5.7 to 8.0, covering motivations, compatibility checks, new features, preparation tasks, upgrade commands, post‑upgrade verification, and rollback considerations.

databasemigrationmysql
0 likes · 7 min read
Guide to Upgrading MySQL from 5.7 to 8.0
Laravel Tech Community
Laravel Tech Community
May 31, 2020 · Information Security

Investigation into WeChat Account Rental Scams and Security Risks

A recent investigation reveals that renting WeChat accounts for advertising, gambling, and fraud is a growing black‑market practice that quickly leads to account bans, exposes users to scams, and highlights the platform's intensified security measures against malicious registration and account abuse.

Account RentalScamsWeChat
0 likes · 10 min read
Investigation into WeChat Account Rental Scams and Security Risks
Big Data Technology & Architecture
Big Data Technology & Architecture
May 26, 2020 · Information Security

Step-by-Step Guide to Integrating Kerberos Authentication with the Cloudera Platform

This article provides a comprehensive tutorial on Kerberos fundamentals, its authentication workflow, and detailed procedures for installing, configuring, and enabling Kerberos security on a Cloudera (Hadoop) cluster running on CentOS, including code snippets, configuration files, and post‑deployment testing steps.

AuthenticationBig DataCloudera
0 likes · 17 min read
Step-by-Step Guide to Integrating Kerberos Authentication with the Cloudera Platform
Liangxu Linux
Liangxu Linux
May 20, 2020 · Fundamentals

Essential Operating System Concepts: From Kernel Mode to Virtualization

This article provides a comprehensive, numbered glossary of core operating‑system concepts—including OS fundamentals, kernel and user modes, memory hierarchy, process management, I/O mechanisms, virtualization, and networking—each defined succinctly and illustrated with diagrams to aid understanding.

NetworkingOperating SystemVirtualization
0 likes · 48 min read
Essential Operating System Concepts: From Kernel Mode to Virtualization
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
May 4, 2020 · Backend Development

Master Tomcat: Memory, Concurrency, Compression & Security Tuning Guide

This guide explains Tomcat’s role as a lightweight web server, details the required runtime environment, and provides step‑by‑step configurations for memory allocation, JVM options, connector concurrency, gzip compression, caching, security hardening, database connection pooling, and additional performance tweaks.

JVMoptimizationperformance
0 likes · 11 min read
Master Tomcat: Memory, Concurrency, Compression & Security Tuning Guide
Laravel Tech Community
Laravel Tech Community
Apr 30, 2020 · Databases

Essential MySQL FAQ: Core Concepts, Features, and Best Practices

This comprehensive MySQL FAQ covers its definition, implementation language, key features, differences from SQL, storage engines, data types, triggers, security tips, performance considerations, and practical queries such as retrieving the N‑th highest salary, providing a solid reference for developers and DBAs.

Storage EngineTriggersdatabase
0 likes · 14 min read
Essential MySQL FAQ: Core Concepts, Features, and Best Practices
Huajiao Technology
Huajiao Technology
Apr 27, 2020 · Mobile Development

Mastering Android Dynamic Permissions: History, Implementation & Best Practices

This article provides a comprehensive overview of Android dynamic (runtime) permissions, tracing their evolution from early Android versions through OEM customizations, and offers step‑by‑step guidance, code samples, and compatibility tips for developers to correctly request and handle dangerous permissions.

AndroidDynamic PermissionsMobile Development
0 likes · 21 min read
Mastering Android Dynamic Permissions: History, Implementation & Best Practices
Ops Development Stories
Ops Development Stories
Apr 26, 2020 · Information Security

Essential Linux & Windows System Hardening Steps for Strong Security

This guide details practical hardening techniques for Linux and Windows servers, covering SSH configuration, password policies, account lockout, su restrictions, ICMP suppression, firewall rules, RDP port changes, security policies, and disabling vulnerable services to significantly improve system security.

LinuxPassword policySSH
0 likes · 10 min read
Essential Linux & Windows System Hardening Steps for Strong Security
AntTech
AntTech
Apr 17, 2020 · Information Security

From Rust Advocate to Confidential Computing Pioneer: Tian Hongliang’s Journey at Ant Group

The article chronicles Tian Hongliang’s evolution from a Rust‑loving coder who excelled in Ant Group’s internal coding competition to a leading researcher in confidential computing, detailing his work on Intel SGX, the open‑source Occlum project, and the team’s recruitment drive for security engineers.

Ant GroupConfidential ComputingEnclave
0 likes · 11 min read
From Rust Advocate to Confidential Computing Pioneer: Tian Hongliang’s Journey at Ant Group
21CTO
21CTO
Apr 16, 2020 · Backend Development

How JD’s API Gateway Handles Tens of Millions of Concurrent Requests

This article explains how JD Retail built a high‑performance, secure, and observable API gateway that supports massive traffic, implements asynchronous processing for high concurrency, provides fine‑grained traffic control, gray‑release capabilities, and automated operations to serve native, web, and mini‑program clients.

api-gatewayautomationgray release
0 likes · 10 min read
How JD’s API Gateway Handles Tens of Millions of Concurrent Requests
Open Source Linux
Open Source Linux
Apr 16, 2020 · Operations

Essential Linux Server Hardening: 10 Steps to Optimize After Installation

This guide walks you through ten practical steps—including switching to local yum mirrors, installing key packages, disabling SELinux and the firewall, trimming startup services, tightening SSH settings, syncing time, raising file descriptor limits, and disabling ping—to boost the performance and security of a freshly installed Linux server.

LinuxOperationssecurity
0 likes · 7 min read
Essential Linux Server Hardening: 10 Steps to Optimize After Installation
JavaScript
JavaScript
Apr 14, 2020 · Frontend Development

Why 97.5% of Websites Still Rely on jQuery and What the Latest Security Fix Brings

Despite the rise of modern frameworks like React, Vue, and Angular, 97.5% of sites still use jQuery, and the newest jQuery release focuses on essential security patches while offering a slimmer build that removes ajax, highlighting the library’s continued stability and relevance for front‑end developers.

JavaScriptfrontendjQuery
0 likes · 1 min read
Why 97.5% of Websites Still Rely on jQuery and What the Latest Security Fix Brings
macrozheng
macrozheng
Apr 9, 2020 · Information Security

How QR Code Login Works: Token‑Based Authentication Explained

This article demystifies QR code login by covering what QR codes are, how mobile token‑based authentication works, and the step‑by‑step flow that enables secure PC login via scanning, confirming, and token exchange.

MobileOAuthQR code
0 likes · 8 min read
How QR Code Login Works: Token‑Based Authentication Explained
Youzan Coder
Youzan Coder
Apr 3, 2020 · Mobile Development

How ZanLogger Revolutionizes Mobile App Debugging with High‑Performance Log Management

The article explains the design and implementation of Youzan’s ZanLogger, a mobile logging platform that streamlines issue diagnosis by providing secure, efficient log collection, retrieval, and analysis features—including active and passive reporting, mmap‑based I/O reduction, dynamic symmetric key encryption, and multi‑dimensional storage—while detailing performance benchmarks and future enhancements.

AndroidLog ManagementSDK
0 likes · 12 min read
How ZanLogger Revolutionizes Mobile App Debugging with High‑Performance Log Management
Manbang Technology Team
Manbang Technology Team
Apr 2, 2020 · Operations

Operational Security and Automation: The “Nuclear Button” Strategy

The article examines the critical challenges of operational security in internet companies, proposes a “nuclear button” permission‑minimization framework, and outlines practical automation solutions such as bastion hosts, Ansible task control, and backup management to balance safety, cost, and efficiency.

AnsibleBackupDevOps
0 likes · 9 min read
Operational Security and Automation: The “Nuclear Button” Strategy
ITPUB
ITPUB
Mar 30, 2020 · Information Security

Why Ubuntu Keeps Asking for Keyring Password and How to Resolve It

If you enable automatic login on Ubuntu or other Linux distributions, you may repeatedly see prompts to unlock the login keyring, especially when using browsers that store passwords, and this guide explains the keyring concept, its security role, and step‑by‑step methods to change or disable its password.

GNOMEKeyringLinux
0 likes · 8 min read
Why Ubuntu Keeps Asking for Keyring Password and How to Resolve It
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 22, 2020 · Backend Development

API Design Specification Guidelines for Backend Development

This article provides comprehensive API design guidelines covering routing naming conventions, request methods, parameter structures, security measures, response formats, signature design, logging platform setup, and idempotency strategies to help backend developers create consistent and reliable interfaces.

BackendIdempotencyapi-design
0 likes · 6 min read
API Design Specification Guidelines for Backend Development
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Mar 20, 2020 · Fundamentals

Avoid Common Architecture Pitfalls and Build Scalable Systems

This article outlines frequent software architecture misconceptions, traces the evolution of large‑scale system designs, presents core architectural patterns and essential elements, and recommends key books to help engineers create high‑performance, reliable, and secure applications.

ScalabilitySoftware ArchitectureSystem Design
0 likes · 9 min read
Avoid Common Architecture Pitfalls and Build Scalable Systems
Java Architecture Diary
Java Architecture Diary
Mar 18, 2020 · Information Security

How OAuth2 Token Validation, Generation, and Refresh Really Work

This article explains the complete OAuth2 token lifecycle—including how resource servers validate incoming tokens, how the authorization server creates and reuses access tokens, and the mechanisms for passive and active token refresh—complete with Java code examples and practical client‑side strategies.

AuthenticationBackendOAuth2
0 likes · 7 min read
How OAuth2 Token Validation, Generation, and Refresh Really Work
Open Source Linux
Open Source Linux
Mar 17, 2020 · Fundamentals

Unlock Linux Mastery with Essential Mind Maps and Cheat Sheets

This article compiles a set of high‑resolution Linux mind maps covering learning paths, desktop overview, filesystem hierarchy standards, critical directories, kernel roadmap, security coaching, command references, and cheat sheets, providing direct links to the original sources for deeper study.

Command ReferenceLearning PathLinux
0 likes · 3 min read
Unlock Linux Mastery with Essential Mind Maps and Cheat Sheets
ITPUB
ITPUB
Mar 11, 2020 · Operations

Master Linux File Attributes: Using chattr for Immutable and Append‑Only Files

This guide explains the common chattr command flags—such as A, S, a, i, and +a—detailing their effects on file timestamps, immutability, append‑only mode, and other attributes, and provides practical examples for locking, hiding, and restoring files on Linux systems.

LinuxSystem Administrationchattr
0 likes · 4 min read
Master Linux File Attributes: Using chattr for Immutable and Append‑Only Files
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Mar 9, 2020 · Backend Development

Essential API Design Principles: Naming, Security, Versioning & More

This article outlines key API design considerations—including responsibility, single‑purpose endpoints, protocol choices, URL conventions, HTTP methods, domain strategies, cross‑origin handling, versioning, pagination, response formats, security, scalability, error codes, and practical examples—to help developers build robust, maintainable services.

ProtocolsVersioningrest
0 likes · 8 min read
Essential API Design Principles: Naming, Security, Versioning & More
Architects' Tech Alliance
Architects' Tech Alliance
Mar 6, 2020 · Fundamentals

Design Principles and Architecture of Distributed File Systems

This article provides a comprehensive overview of distributed file systems, covering their historical evolution, essential requirements, architectural models with and without a central node, persistence strategies, scalability, high availability, performance optimizations, security mechanisms, and practical considerations for small‑file workloads.

ConsistencyDistributed File SystemScalability
0 likes · 20 min read
Design Principles and Architecture of Distributed File Systems
Programmer DD
Programmer DD
Mar 4, 2020 · Backend Development

Fastjson 1.2.66 Released: Security Hardening and Extensive Bug Fixes

Fastjson 1.2.66, a maintenance release, introduces security hardening, an AutoType blacklist, and a series of bug fixes ranging from BeanToArray errors to Kotlin generic handling, while also adding support for Queue deserialization and enhanced date parsing.

Bug FixesJSONfastjson
0 likes · 3 min read
Fastjson 1.2.66 Released: Security Hardening and Extensive Bug Fixes
dbaplus Community
dbaplus Community
Mar 3, 2020 · Big Data

How MaFengWo Scaled Kafka for Real‑Time Big Data: Lessons and Best Practices

This article details MaFengWo's practical experience with Kafka in its big‑data platform, covering three core usage scenarios, a four‑stage evolution roadmap—including version upgrades, resource isolation, security and monitoring—and future plans such as transaction‑based deduplication and consumer throttling.

Big DataKafkaResource Isolation
0 likes · 17 min read
How MaFengWo Scaled Kafka for Real‑Time Big Data: Lessons and Best Practices
21CTO
21CTO
Mar 2, 2020 · Backend Development

How DingTalk Scales: Architecture, High Availability, and Security Insights

At the 2019 Alibaba tech conference, DingTalk architect DingSu presented a detailed overview of the next‑generation enterprise OA platform built on IM technology, covering its architectural vision, scenario‑driven design, high‑availability strategies, and security implementations across more than 20 slides.

DingTalkIM Technologyenterprise architecture
0 likes · 1 min read
How DingTalk Scales: Architecture, High Availability, and Security Insights
MaGe Linux Operations
MaGe Linux Operations
Feb 24, 2020 · Information Security

Session vs JWT: When to Choose Token‑Based Authentication

This article explains the differences between authentication and authorization, compares session‑based and token‑based (JWT) authentication flows, details JWT structure and signing, and outlines the advantages, disadvantages, and suitable scenarios for each method.

AuthenticationBackendJWT
0 likes · 9 min read
Session vs JWT: When to Choose Token‑Based Authentication
Open Source Linux
Open Source Linux
Feb 22, 2020 · Operations

How to View and Change Windows Remote Desktop Port (3389 → 3388)

This guide explains why the default Windows Remote Desktop port 3389 may be changed for security, and provides step‑by‑step instructions—including command‑line queries to locate the TermService PID, using netstat to view the current port, and editing the registry to set a new port such as 3388, followed by a restart and connection test.

Port ChangeRegistryRemote Desktop
0 likes · 3 min read
How to View and Change Windows Remote Desktop Port (3389 → 3388)
Alibaba Cloud Native
Alibaba Cloud Native
Feb 18, 2020 · Backend Development

How Yuque Scaled from Prototype to Commercial SaaS with a JavaScript Full‑Stack

This article chronicles Yuque's evolution from a 2016 internal prototype to a fully commercialized knowledge‑base platform, detailing its JavaScript full‑stack architecture, migration from BaaS to IaaS, adoption of microservices and serverless functions, and the security and stability practices that support its growth.

Backend ArchitectureJavaScriptServerless
0 likes · 20 min read
How Yuque Scaled from Prototype to Commercial SaaS with a JavaScript Full‑Stack
Architects' Tech Alliance
Architects' Tech Alliance
Feb 16, 2020 · Fundamentals

Design Principles and Architecture of Distributed File Systems

This article provides a comprehensive overview of distributed file systems, covering their historical evolution, essential requirements such as POSIX compliance, persistence, scalability and security, architectural models with and without a central node, replication strategies, load balancing, high availability, performance optimizations, and practical considerations for small‑file handling.

ConsistencyDistributed File SystemScalability
0 likes · 20 min read
Design Principles and Architecture of Distributed File Systems
Efficient Ops
Efficient Ops
Feb 12, 2020 · Information Security

Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection

This guide presents a comprehensive Linux security hardening checklist covering account and login safety, unnecessary service removal, password and key authentication policies, sudo usage, filesystem protection, remote access safeguards, rootkit detection tools, and step‑by‑step incident response for compromised servers.

Account ManagementHardeningLinux
0 likes · 27 min read
Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection
Programmer DD
Programmer DD
Feb 11, 2020 · Backend Development

Preventing SQL Injection in Java: JDBC, MyBatis, JPA & Hibernate Best Practices

This article explains Java persistence technologies—including JDBC, MyBatis, JPA, and Hibernate—highlights common patterns that cause SQL injection, and provides concrete techniques such as parameterized PreparedStatement, MyBatis #{ } binding, dynamic SQL whitelisting, and proper JPA/Hibernate query parameter usage to securely handle user input.

HibernateJDBCMyBatis
0 likes · 10 min read
Preventing SQL Injection in Java: JDBC, MyBatis, JPA & Hibernate Best Practices
iQIYI Technical Product Team
iQIYI Technical Product Team
Feb 7, 2020 · Backend Development

Introduction to Apache Dubbo and iQIYI’s Practical Experience, Optimizations, and Future Outlook

iQIYI has adopted Apache Dubbo since 2019, building a custom SPI‑based plugin system, integrating registration, configuration and metadata centers, enhancing availability with instance‑level health checks and Sentinel circuit‑breaking, implementing region‑aware routing and AK/SK authentication, and contributing extensive optimizations and future‑oriented plans to the open‑source Dubbo ecosystem.

Apache DubboCloud NativeMicroservices
0 likes · 14 min read
Introduction to Apache Dubbo and iQIYI’s Practical Experience, Optimizations, and Future Outlook
Tencent Cloud Developer
Tencent Cloud Developer
Feb 1, 2020 · R&D Management

Remote Work Practices and Toolset for Small Companies

The article recounts a Tencent Cloud TVP entrepreneur’s shift to remote work amid COVID‑19, offering small companies a step‑by‑step daily routine, a comprehensive Tencent‑centric toolset checklist, security and collaboration best practices, cultural tips for distributed teams, and expert TVP insights.

Cloud ServicesTencentcollaboration tools
0 likes · 22 min read
Remote Work Practices and Toolset for Small Companies
Architecture Digest
Architecture Digest
Jan 24, 2020 · Backend Development

JD API Gateway Practice: Architecture, High Concurrency, Security, Gray Release, and Automated Operations

This article details JD's API gateway implementation, covering its background, core features, three‑layer architecture, high‑concurrency techniques using asynchronous processing, fine‑grained security controls, gray‑release strategies, automated deployment, monitoring, and fault‑location mechanisms for large‑scale e‑commerce traffic.

BackendJDapi-gateway
0 likes · 9 min read
JD API Gateway Practice: Architecture, High Concurrency, Security, Gray Release, and Automated Operations
Java Backend Technology
Java Backend Technology
Jan 23, 2020 · Backend Development

Master Spring Boot Actuator: Real‑Time Monitoring, Metrics, and Dynamic Log Levels

This tutorial walks you through using Spring Boot Actuator to monitor microservice applications, covering quick setup, essential endpoints such as health, metrics, loggers, and shutdown, customizing health indicators, dynamically changing log levels at runtime, and securing actuator endpoints with Spring Security.

ActuatorMetricsMicroservices
0 likes · 14 min read
Master Spring Boot Actuator: Real‑Time Monitoring, Metrics, and Dynamic Log Levels
JD Retail Technology
JD Retail Technology
Jan 15, 2020 · Backend Development

Design and Implementation of a High‑Concurrency, Secure API Gateway at JD.com

This article outlines the background, architecture, high‑concurrency techniques, security mechanisms, gray‑release strategy, automated operations, monitoring, and fault‑diagnosis capabilities of JD.com's API gateway, demonstrating how it efficiently handles millions of concurrent requests during large‑scale shopping events.

api-gatewaygray releasehigh concurrency
0 likes · 9 min read
Design and Implementation of a High‑Concurrency, Secure API Gateway at JD.com
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 14, 2020 · Databases

MySQL 8.0.19 Maintenance Release – New Features and Improvements

MySQL 8.0.19 introduces InnoDB ReplicaSet, Router enhancements, numerous SQL syntax additions, optimizer improvements, new Information Schema role views, security features, replication options, X Protocol compression, and a range of deprecations and bug fixes, providing a comprehensive update for database administrators and developers.

InnoDBReplicationX Protocol
0 likes · 12 min read
MySQL 8.0.19 Maintenance Release – New Features and Improvements
Alibaba Cloud Native
Alibaba Cloud Native
Jan 10, 2020 · Cloud Native

How to Secure Multi‑Tenant Kubernetes Clusters: Practical Isolation Strategies

This article explains the concept of multi‑tenant Kubernetes clusters, distinguishes soft and hard isolation, describes common enterprise and SaaS/KaaS scenarios, and provides step‑by‑step guidance on using native Kubernetes features such as RBAC, NetworkPolicy, PSP, OPA, resource quotas, pod priority, node taints, and secret encryption to achieve robust security isolation.

KubernetesNamespaceNetworkPolicy
0 likes · 14 min read
How to Secure Multi‑Tenant Kubernetes Clusters: Practical Isolation Strategies
Programmer DD
Programmer DD
Jan 7, 2020 · Backend Development

Designing Secure and User‑Friendly SMS Verification Systems

This article explores common pitfalls and best‑practice design patterns for SMS verification, covering cross‑origin issues, rate‑limiting, captcha integration, IP/Cookie restrictions, and alert mechanisms to balance security and user experience across web and mobile platforms.

MobileSMS Verificationrate limiting
0 likes · 9 min read
Designing Secure and User‑Friendly SMS Verification Systems
Java High-Performance Architecture
Java High-Performance Architecture
Dec 27, 2019 · Information Security

Why Basic Auth Fails and How OAuth2+JWT Secures Modern REST APIs

An overview of three RESTful web service security approaches—Basic authentication, OAuth 2.0, and OAuth 2.0 combined with JWT—examining their mechanisms, scalability drawbacks, and why JWT‑based solutions offer superior extensibility for micro‑service architectures, illustrated with Amazon’s token‑signing method.

JWTOAuth2rest
0 likes · 5 min read
Why Basic Auth Fails and How OAuth2+JWT Secures Modern REST APIs
Continuous Delivery 2.0
Continuous Delivery 2.0
Dec 27, 2019 · Backend Development

Server‑Side vs Client‑Side Feature Flag Decision: Performance, Latency, Security, and Complexity Considerations

Choosing whether to evaluate feature flags on the server or the client impacts performance, configuration latency, security, and implementation complexity, with server‑side decisions generally offering better speed, reduced cache‑invalidation risks, protected data handling, and simpler architecture, especially for web and mobile applications.

Client-Server Architecturefeature flagssecurity
0 likes · 5 min read
Server‑Side vs Client‑Side Feature Flag Decision: Performance, Latency, Security, and Complexity Considerations
macrozheng
macrozheng
Dec 17, 2019 · Backend Development

Mastering Flash‑Sale Systems: Overcoming the Hidden Backend Challenges

This article explores the technical difficulties of flash‑sale (秒杀) systems—such as traffic spikes, resource conflicts, and security concerns—and outlines a three‑stage business flow, data warm‑up, request handling, caching, and isolation strategies to build a resilient backend.

Scalabilityflash saleload balancing
0 likes · 13 min read
Mastering Flash‑Sale Systems: Overcoming the Hidden Backend Challenges
360 Tech Engineering
360 Tech Engineering
Dec 16, 2019 · Information Security

Understanding Random Number Generation for Lottery Programs and Cryptographic Security in JavaScript

This article explains the differences between true and pseudo‑random numbers, why JavaScript's Math.random is unsuitable for secure lottery draws, and how to use the Web Crypto API's Crypto.getRandomValues with a provided code example to achieve cryptographically strong randomness.

Crypto.getRandomValuesMath.randomalgorithm
0 likes · 8 min read
Understanding Random Number Generation for Lottery Programs and Cryptographic Security in JavaScript
Node Underground
Node Underground
Dec 15, 2019 · Information Security

How NPM’s Binary Planting Bug Lets Attackers Access Any File

The article explains two critical npm vulnerabilities—arbitrary file access via a crafted bin field and binary planting that lets globally installed packages replace executables—detailing their impact, how they can be exploited, and urging users to upgrade promptly.

Vulnerabilitybinary plantingnodejs
0 likes · 4 min read
How NPM’s Binary Planting Bug Lets Attackers Access Any File
Youzan Coder
Youzan Coder
Dec 13, 2019 · Information Security

Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation

Boundary defense—protective measures at business and IT entry points such as firewalls, WAFs, and secure development lifecycles—provides early‑stage enterprises a clear perimeter through detection, response, protection, and policy, as illustrated by Youzan’s web‑gate WAF, SDL checkpoints, DNS monitoring, and automated security‑ticket processes, enabling a shift toward deeper, defense‑in‑depth strategies.

SDLWAFboundary defense
0 likes · 18 min read
Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation
ITPUB
ITPUB
Dec 11, 2019 · Operations

Master Linux Runlevels and Systemd Targets: How to View, Change, and Secure Them

This guide explains the purpose of Linux runlevels, maps them to systemd targets, shows how to check the current runlevel, change it temporarily or permanently, list services per level, create custom levels, and improve system security through fine‑grained service control.

LinuxRunlevelSystem Administration
0 likes · 13 min read
Master Linux Runlevels and Systemd Targets: How to View, Change, and Secure Them
Programmer DD
Programmer DD
Dec 11, 2019 · Information Security

Renew Expired GPG Keys for Maven Deployments with Spring Boot

This guide walks through diagnosing GPG signing failures caused by expired keys during a swagger‑spring‑boot‑starter release, shows how to inspect the current keyring, edit the key, extend its validity, and finally re‑run Maven deploy to publish artifacts.

GPGKey ExpirationSpring Boot
0 likes · 5 min read
Renew Expired GPG Keys for Maven Deployments with Spring Boot
Liangxu Linux
Liangxu Linux
Dec 10, 2019 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step

This guide walks you through a complete Linux incident‑response workflow—identifying suspicious behavior, terminating malicious processes, eradicating virus files, closing persistence mechanisms, and hardening the system—while providing concrete shell commands and practical tips for each stage.

Malware RemovalSystem Hardeningincident response
0 likes · 10 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step
Java Captain
Java Captain
Dec 9, 2019 · Information Security

Understanding the Principles and Security of HTTPS

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, describes the role of Certificate Authorities, outlines the handshake process, discusses man‑in‑the‑middle attacks, and clarifies the limits of HTTPS against packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security of HTTPS
DevOps Engineer
DevOps Engineer
Dec 9, 2019 · Operations

Integrating Black Duck Source Code Scanning into Jenkins Pipelines

This guide explains why source‑code scanning is essential for security and compliance, describes manual Black Duck scanning steps, outlines integration goals, details required parameters, shows Jenkins configuration, and provides a complete Jenkinsfile pipeline script to automate Black Duck scans on each build.

Black DuckJenkinsci/cd
0 likes · 7 min read
Integrating Black Duck Source Code Scanning into Jenkins Pipelines
DevOps Cloud Academy
DevOps Cloud Academy
Dec 6, 2019 · Information Security

Jenkins Security Threats: Attack Vectors, Exploitation Techniques, and Mitigation Strategies

This article examines how adversaries target Jenkins automation servers, detailing common discovery methods, exploitation techniques such as Java deserialization and mis‑configured authentication, and practical red‑team demonstrations of credential extraction, script‑console abuse, and malicious job creation to illustrate mitigation recommendations.

Credential TheftDevOpsJenkins
0 likes · 14 min read
Jenkins Security Threats: Attack Vectors, Exploitation Techniques, and Mitigation Strategies
Efficient Ops
Efficient Ops
Dec 5, 2019 · Information Security

Master Linux Incident Response: Step‑by‑Step Virus Detection and Removal

This guide walks you through a complete Linux emergency response workflow—identifying suspicious behavior, terminating malicious processes, removing infected files, eliminating persistence mechanisms, hardening the system, and adding command auditing—using practical shell commands and examples.

LinuxMalware RemovalShell Commands
0 likes · 9 min read
Master Linux Incident Response: Step‑by‑Step Virus Detection and Removal
Qunar Tech Salon
Qunar Tech Salon
Nov 28, 2019 · Databases

Qunar Redis High‑Availability Architecture Design, Security Mechanisms, and Automated Operations

This article details the design principles, components, client implementation, data sharding, security mechanisms, high‑risk command blocking, configuration optimizations, and automated operational workflows of Qunar's Redis high‑availability cluster, including code modifications, deployment scripts, and platform‑based management for large‑scale production environments.

Database Architectureautomationhigh availability
0 likes · 18 min read
Qunar Redis High‑Availability Architecture Design, Security Mechanisms, and Automated Operations
58 Tech
58 Tech
Nov 27, 2019 · Information Security

Evolution and Architecture of a Big Data‑Driven Security Portrait System at 58.com

The article details the design, multi‑stage evolution, and operational impact of a big‑data‑based security portrait platform built by 58.com, describing its data pipelines, real‑time risk tagging, strategy scheduling, configuration management, and overall architecture that enable large‑scale threat detection and mitigation.

Big Datarisk managementsecurity
0 likes · 15 min read
Evolution and Architecture of a Big Data‑Driven Security Portrait System at 58.com
Senior Brother's Insights
Senior Brother's Insights
Nov 21, 2019 · Information Security

Is JWT the Silver Bullet? Understanding Its Mechanics, Benefits, and Pitfalls

JWT (JSON Web Token) is a compact, URL‑safe means of representing claims between parties, widely adopted for stateless authentication, but it has limitations; this article explains JWT fundamentals, creation and verification in Java, compares its advantages over sessions, and outlines security risks and mitigation strategies.

JWTTokenjava
0 likes · 16 min read
Is JWT the Silver Bullet? Understanding Its Mechanics, Benefits, and Pitfalls
Python Programming Learning Circle
Python Programming Learning Circle
Nov 10, 2019 · Cloud Computing

Tech Highlights: GitLab Exit, Microsoft’s $10B DoD Cloud Deal, Spring Boot 2.1.10

From a GitLab director’s resignation over alleged hiring bans to Microsoft securing a $10 billion Department of Defense cloud contract, plus releases of Spring Boot 2.1.10, IntelliJ IDEA 2019.3 beta, Gradle 6.0, an Apple macOS Mail encryption flaw, and China leading blockchain patent filings, this roundup covers the week’s key tech developments.

cloud computingopen‑sourcesecurity
0 likes · 5 min read
Tech Highlights: GitLab Exit, Microsoft’s $10B DoD Cloud Deal, Spring Boot 2.1.10
DevOps Cloud Academy
DevOps Cloud Academy
Nov 10, 2019 · Operations

DevOps as a Service: Overcoming Talent Shortage, Organizational Silos, and Security Challenges

The article explains how large organizations, especially U.S. government agencies, can adopt DevOps as a service by addressing cultural resistance, talent shortages, functional silos, authority‑to‑operate hurdles, and securing the toolchain and software supply chain through automation, training, and integrated security practices.

DevOpsSupply Chaincontinuous integration
0 likes · 5 min read
DevOps as a Service: Overcoming Talent Shortage, Organizational Silos, and Security Challenges
Sohu Tech Products
Sohu Tech Products
Nov 6, 2019 · Information Security

Evolution of Web Authentication: From Passwords to WebAuthn

This article reviews the historical development, current practices, and future direction of web authentication, covering traditional password login, third‑party protocols like OpenID and OAuth2.0, two‑factor authentication methods, and the emerging password‑less WebAuthn standard.

2FAOAuth2.0OpenID
0 likes · 12 min read
Evolution of Web Authentication: From Passwords to WebAuthn
YooTech Youzu Tech Team
YooTech Youzu Tech Team
Oct 28, 2019 · Information Security

Key Takeaways from YOOZOO’s First Innovation Security Developer Salon

The first YOOZOO Innovation Security Developer Salon gathered five expert engineers who shared practical solutions on enterprise data security, osquery host monitoring, cloud DDoS defense, black‑box payload generation, and Linux kernel‑mode HIDS, offering deep technical insights for modern security practitioners.

HIDScloud securitydata security
0 likes · 8 min read
Key Takeaways from YOOZOO’s First Innovation Security Developer Salon
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 23, 2019 · Artificial Intelligence

Why Machine Intelligence Struggles in Cybersecurity: Core Paradigms

The article examines the fundamental nature of machine intelligence, its historical development, the shift from data‑driven to intelligence‑driven approaches, and why current AI techniques still fall short in cybersecurity, proposing a four‑component paradigm and a six‑level maturity model for truly intelligent security systems.

Artificial IntelligenceGeneral Purpose Technologiescybersecurity
0 likes · 23 min read
Why Machine Intelligence Struggles in Cybersecurity: Core Paradigms
21CTO
21CTO
Oct 20, 2019 · Artificial Intelligence

Tech Titans Forecast AI, 5G, and Digital Economy Trends at Wuzhen 2019

At the 6th World Internet Conference in Wuzhen, industry leaders including Jack Ma, Li Yanhong, Ding Lei, Zhou Hongyi, and others shared their visions on AI-driven smart economy, 5G’s role, digital transformation, security challenges, and future tech opportunities, highlighting key trends shaping the global digital landscape.

5GAIDigital Economy
0 likes · 16 min read
Tech Titans Forecast AI, 5G, and Digital Economy Trends at Wuzhen 2019
dbaplus Community
dbaplus Community
Oct 20, 2019 · Big Data

Mastering Kafka: Concepts, Installation, Optimization, and Security

This comprehensive guide covers Kafka's core concepts, design principles, installation steps, configuration tweaks, performance optimizations, permission management, common operational commands, cluster scaling, log retention settings, and monitoring scripts to help you build and maintain a robust Kafka ecosystem.

Big DataConfigurationInstallation
0 likes · 20 min read
Mastering Kafka: Concepts, Installation, Optimization, and Security
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 18, 2019 · Databases

Enabling Privilege Checks for MySQL Replication Threads

This article explains how MySQL 8.0.18 introduced privilege checking for replication applier threads, outlines the three-step process to create a restricted‑privilege user, assign necessary permissions or roles, associate the user with the CHANGE MASTER TO statement, and discusses observability and important considerations.

Database AdministrationPrivilege ChecksReplication
0 likes · 11 min read
Enabling Privilege Checks for MySQL Replication Threads
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Oct 8, 2019 · Cloud Computing

How OceanConnect DMP Boosts IoT Device Integration, Security, and Power Savings

The article outlines OceanConnect’s DMP capabilities, including three device access methods, northbound API exposure, NB‑IoT power‑saving services, and the optimized DTLS+ security protocol, explaining their principles, value, and application scenarios for efficient, secure, and low‑power IoT deployments.

Device IntegrationIoTNB-IoT
0 likes · 11 min read
How OceanConnect DMP Boosts IoT Device Integration, Security, and Power Savings
Programmer DD
Programmer DD
Oct 2, 2019 · Backend Development

How to Build a Reliable, Secure, and Scalable IM Server from Scratch

This article walks through constructing a lightweight instant‑messaging backend, covering version 1.0.0 features, reliability guarantees, application‑level ACK handling, security encryption, database schema for users, relations and offline messages, and storage strategies to prevent duplicate delivery.

Backend ArchitectureInstant MessagingMessage Queue
0 likes · 12 min read
How to Build a Reliable, Secure, and Scalable IM Server from Scratch
MaGe Linux Operations
MaGe Linux Operations
Sep 17, 2019 · Fundamentals

Essential Checklist for Designing Clean Python Library APIs

This article distills the key recommendations from the 2017 PyCon talk “How to make a good library API”, offering a concise checklist that covers simplicity, consistency, flexibility, and security to help Python developers create intuitive, maintainable, and robust library interfaces.

ConsistencyLibrary DevelopmentPython
0 likes · 11 min read
Essential Checklist for Designing Clean Python Library APIs
System Architect Go
System Architect Go
Sep 17, 2019 · Information Security

Sequelize ORM SQL Injection Vulnerabilities and Affected Versions

The article outlines several SQL injection vulnerabilities discovered in various Sequelize ORM versions, explains the underlying causes related to improper JSON path key handling for MySQL, MariaDB, Postgres, and SQLite, provides reproduction screenshots, and strongly advises upgrading to patched releases.

Node.jsORMSQL injection
0 likes · 3 min read
Sequelize ORM SQL Injection Vulnerabilities and Affected Versions
Architecture Digest
Architecture Digest
Sep 16, 2019 · Backend Development

Designing a Unified Multi-Account Login System: Schemas, Flows, and One-Click Authentication

This article outlines the design of a unified multi‑account login system, covering self‑built phone‑number authentication, optimized password‑less login, third‑party integrations, database schema separation, and a one‑click carrier‑based login to improve user experience and scalability.

Authenticationaccount‑designdatabase
0 likes · 16 min read
Designing a Unified Multi-Account Login System: Schemas, Flows, and One-Click Authentication
DevOps Cloud Academy
DevOps Cloud Academy
Sep 4, 2019 · Cloud Native

Comprehensive Guide to Docker‑to‑Kubernetes Logging, Kubernetes Security Mechanisms, and Kong Microservice Gateway Practices

This article provides an in‑depth overview of logging strategies from Docker to Kubernetes, explains the security architecture of Kubernetes clusters, and outlines best‑practice deployment of the Kong microservice gateway within a Kubernetes environment, offering practical insights for cloud‑native DevOps engineers.

Cloud NativeDevOpsKong
0 likes · 3 min read
Comprehensive Guide to Docker‑to‑Kubernetes Logging, Kubernetes Security Mechanisms, and Kong Microservice Gateway Practices
Java Captain
Java Captain
Sep 1, 2019 · Information Security

Integrating Apache Shiro with Spring Boot: Configuration, Session Management, and Permission Control

This tutorial demonstrates how to integrate the lightweight Apache Shiro security framework into a Spring Boot 2.1.5 project, covering environment setup, Maven dependencies, Redis session storage, custom utilities, Shiro configuration, permission annotations, test controllers, and Postman verification.

AuthenticationAuthorizationShiro
0 likes · 27 min read
Integrating Apache Shiro with Spring Boot: Configuration, Session Management, and Permission Control
MaGe Linux Operations
MaGe Linux Operations
Aug 31, 2019 · Information Security

Essential Linux Hardening: 14 Steps to Secure Your Servers

This guide explains why Linux dominates modern IT, then walks through fourteen practical hardening measures—including physical security, updates, minimal installations, login restrictions, user and file management, firewall configuration, package handling, disabling Ctrl‑Alt‑Del, monitoring, log centralization, backups, security tools, and management policies—to build a robust and attack‑resistant Linux server.

BackupServer Administrationfirewall
0 likes · 14 min read
Essential Linux Hardening: 14 Steps to Secure Your Servers
Efficient Ops
Efficient Ops
Aug 28, 2019 · Operations

How to Harden Linux Server Security: Account, Login, and Boot Controls

This guide details practical Linux server hardening techniques—including account cleanup, password policies, su/sudo restrictions, login controls, and BIOS/GRUB protection—while providing exact command examples for operations teams to quickly improve system security.

Account ManagementLinuxOperations
0 likes · 12 min read
How to Harden Linux Server Security: Account, Login, and Boot Controls