Tagged articles
2152 articles
Page 19 of 22
iQIYI Technical Product Team
iQIYI Technical Product Team
Aug 23, 2019 · Mobile Development

iQIYI One‑Click Android App Health Check: Architecture, Implementation and Key Technologies

iQIYI’s one‑click Android app health check provides a lightweight, universal solution that automatically installs, traverses, and analyzes apps on a 100‑device cloud farm using ATX‑based drivers, OCR‑driven UI interaction, deep‑learning UI anomaly detection, static security analysis, performance metrics, and crash/ANR reporting, seamlessly integrating into CI pipelines.

ATXAndroidApp Inspection
0 likes · 19 min read
iQIYI One‑Click Android App Health Check: Architecture, Implementation and Key Technologies
Efficient Ops
Efficient Ops
Aug 22, 2019 · Operations

Essential Linux Ops Tools: Monitoring, Performance, and Security Utilities

This guide introduces a collection of practical Linux operation tools—including Nethogs, IOZone, IOTop, IPtraf, iftop, HTop, NMON, MultiTail, Fail2ban, Tmux, Agedu, NMap, and Httperf—detailing their purpose, installation commands, and usage examples for system monitoring, performance testing, and security hardening.

LinuxPerformance Testingcommand-line tools
0 likes · 12 min read
Essential Linux Ops Tools: Monitoring, Performance, and Security Utilities
Youku Technology
Youku Technology
Aug 19, 2019 · Artificial Intelligence

Alibaba Showcases AI Innovations in Entertainment and Security at IJCAI 2019

At IJCAI 2019, Alibaba’s MoKu Lab unveiled the Beidou Star platform and an intelligent conversational video search system for end‑to‑end content creation, while its Turing Lab demonstrated security AI such as Green Net, IP Brain, facial‑recognition and Tianyan, complemented by multiple research papers, academic collaborations and new hiring drives.

AlibabaComputer VisionEntertainment
0 likes · 11 min read
Alibaba Showcases AI Innovations in Entertainment and Security at IJCAI 2019
MaGe Linux Operations
MaGe Linux Operations
Aug 14, 2019 · Fundamentals

Mastering Web Cookies: From Basics to Python Manipulation

This article explains the origin, purpose, and inner workings of HTTP cookies, details their attributes and security implications, demonstrates how to create, retrieve, and set cookies with Python's requests library, and compares cookies with server‑side sessions for robust web development.

HTTPSessionsecurity
0 likes · 14 min read
Mastering Web Cookies: From Basics to Python Manipulation
Alibaba Cloud Native
Alibaba Cloud Native
Aug 12, 2019 · Cloud Native

What’s New in Cloud Native: Kubernetes Security Fixes, Project Updates, and Must‑Read Resources

This week’s cloud‑native roundup covers Mesosphere’s rebranding to D2iQ, two critical Kubernetes CVEs with remediation steps, upcoming CNCF Kubernetes summits, the Knative 0.8 release, curated open‑source project recommendations, and a selection of in‑depth reading on multi‑cluster, serverless, and API‑gateway technologies.

CNCFFluxKnative
0 likes · 11 min read
What’s New in Cloud Native: Kubernetes Security Fixes, Project Updates, and Must‑Read Resources
Programmer DD
Programmer DD
Jul 16, 2019 · Information Security

How to Prevent XSS and SQL Injection in Spring: A Practical Guide

This article explains the dangers of XSS and SQL injection attacks, demonstrates realistic attack scenarios, and provides a comprehensive backend solution using Spring AOP, HttpMessageConverter, custom Servlet Filters, request wrappers, and ESAPI to sanitize inputs and protect web applications.

ESAPISQL injectionXSS
0 likes · 17 min read
How to Prevent XSS and SQL Injection in Spring: A Practical Guide
Aikesheng Open Source Community
Aikesheng Open Source Community
Jul 15, 2019 · Databases

Common Causes and Fixes for MySQL Error 1045 (Access Denied)

This article enumerates the typical reasons why MySQL returns error 1045 – such as connecting to the wrong host, using a non‑existent user, host‑based access restrictions, incorrect passwords, special characters in Bash, and missing SSL – and provides step‑by‑step commands to diagnose and resolve each issue.

Access deniedDatabase AuthenticationError 1045
0 likes · 9 min read
Common Causes and Fixes for MySQL Error 1045 (Access Denied)
ITPUB
ITPUB
Jul 9, 2019 · Information Security

How Android Apps, Zoom, and Didi Expose Major Security and Privacy Gaps

Recent reports reveal that many Android apps secretly collect location and identifier data despite denied permissions, a zero‑day Zoom flaw lets any website hijack Mac cameras, and Didi adjusts its pricing, while a man released after splashing water on Baidu's CEO highlights broader tech‑related news.

AndroidDidiZoom
0 likes · 4 min read
How Android Apps, Zoom, and Didi Expose Major Security and Privacy Gaps
360 Tech Engineering
360 Tech Engineering
Jul 3, 2019 · Information Security

File Upload Vulnerabilities and Mitigation Strategies

The article explains how attackers can exploit file upload functionality by uploading malicious files, crafted filenames, SVG payloads, or symlinks to achieve remote code execution, data theft, or server denial‑of‑service, and provides practical defense measures such as whitelist validation, content‑type checks, and upload rate limiting.

Node.jsSVGVulnerability
0 likes · 8 min read
File Upload Vulnerabilities and Mitigation Strategies
iQIYI Technical Product Team
iQIYI Technical Product Team
Jun 28, 2019 · Mobile Development

Background, Technical Options, and Evaluation of Mini‑Program Development

Mini‑programs emerged as a lightweight, containerised solution for large‑scale apps facing rising traffic costs and user fragmentation, using a reduced‑scope, web‑like DSL with separate JavaScript logic and native‑rendered views, delivering high performance, developer ease, and platform‑controlled security while incurring migration, data‑transfer, latency, and approval challenges.

Mini ProgramMobile Developmentcross‑platform
0 likes · 14 min read
Background, Technical Options, and Evaluation of Mini‑Program Development
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jun 22, 2019 · Backend Development

15 Frequently Asked Spring Boot Interview Questions and Answers

This article presents fifteen common Spring Boot interview questions covering its definition, features, starters, configuration files, CORS handling, security choices, session sharing, hot deployment, scheduling, API documentation, data access, XML usage, executable JAR differences, and property file distinctions, providing concise explanations and practical references for Java developers.

ConfigurationSpring Bootinterview-questions
0 likes · 11 min read
15 Frequently Asked Spring Boot Interview Questions and Answers
AntTech
AntTech
Jun 19, 2019 · Artificial Intelligence

How China’s Financial Industry Can Harness Digital‑Era Technologies – Insights from Ant Group CTO Cheng Li

In an interview, Ant Group CTO Cheng Li explains how the digital era demands breakthroughs in blockchain, artificial intelligence, security, IoT and computing to boost China’s financial services, outlines current challenges, and proposes concrete steps for rapid technology adoption and open‑architecture transformation.

BlockchainDigitalFinanceFinTech
0 likes · 11 min read
How China’s Financial Industry Can Harness Digital‑Era Technologies – Insights from Ant Group CTO Cheng Li
Efficient Ops
Efficient Ops
Jun 10, 2019 · Operations

Boost Nginx Security: Essential Configurations You Must Apply

This article outlines practical Nginx security settings—including hiding version info, enabling HTTPS, configuring allow/deny lists, basic authentication, request method restrictions, user‑agent blocking, hotlink protection, connection limits, buffer size tweaks, timeout adjustments, and secure response headers—to help harden your web server against common attacks.

ConfigurationHTTPSNginx
0 likes · 11 min read
Boost Nginx Security: Essential Configurations You Must Apply
Alibaba Cloud Native
Alibaba Cloud Native
Jun 10, 2019 · Information Security

Critical Docker & Kubernetes Vulnerabilities and Key Open‑Source Updates You Must Know

This week’s roundup covers two high‑severity Docker CVEs (CVE‑2019‑5021 privilege escalation in Alpine images and CVE‑2018‑15664 TOCTOU flaw in docker cp), Kubernetes moving to Go modules, new Envoy request‑mirror and route‑debug features, Knative’s stateful‑serverless experiment, Istio 1.0 EOL, Cilium’s BPF‑based network policy, and emerging Service Mesh trends, all with reference links for deeper reading.

CVEDockerKubernetes
0 likes · 10 min read
Critical Docker & Kubernetes Vulnerabilities and Key Open‑Source Updates You Must Know
Liangxu Linux
Liangxu Linux
May 29, 2019 · Fundamentals

Comprehensive Linux Learning Roadmaps and Cheat Sheets

This article compiles a series of Linux mind‑maps and diagrams that outline learning paths, desktop environments, the Filesystem Hierarchy Standard, critical directories, kernel study routes, security coaching visuals, and command reference cheat sheets, each linked to their original sources.

Command Cheat SheetFilesystemLearning Path
0 likes · 7 min read
Comprehensive Linux Learning Roadmaps and Cheat Sheets
MaGe Linux Operations
MaGe Linux Operations
May 29, 2019 · Operations

Essential Linux Ops Tools: Install & Use Nethogs, IOZone, IOTop, and More

This guide introduces a collection of practical Linux operations tools—including Nethogs, IOZone, IOTop, IPtraf, IFTop, HTop, NMON, MultiTail, Fail2ban, Tmux, Agedu, NMap and Httperf—providing concise installation commands, basic usage examples, and key options to help system administrators monitor performance, security and resources efficiently.

LinuxOperationsperformance
0 likes · 11 min read
Essential Linux Ops Tools: Install & Use Nethogs, IOZone, IOTop, and More
Efficient Ops
Efficient Ops
May 21, 2019 · Operations

Essential Linux Ops Tools: Nethogs, IOZone, IOTop, and More

This guide introduces a dozen practical Linux operation tools—including Nethogs, IOZone, IOTop, IPtraf, IFTop, Fail2ban, Tmux, and others—providing concise descriptions, download links, and ready‑to‑run installation commands to help system administrators boost monitoring, performance testing, and security on their servers.

LinuxOperationsmonitoring
0 likes · 12 min read
Essential Linux Ops Tools: Nethogs, IOZone, IOTop, and More
Tencent Cloud Developer
Tencent Cloud Developer
May 21, 2019 · Information Security

Design and Implementation of a Cloud Audit Solution for Tencent Cloud Accounts

The article details a scalable, extensible cloud‑audit architecture for Tencent Cloud accounts that stores API logs in a Shanghai‑region COS bucket, processes them with EMR‑based Hive tables and hourly partition scripts, aggregates results into a hot MySQL store, and enables administrators to monitor all sub‑accounts with a real‑time “god view.”

COSEMRPython
0 likes · 13 min read
Design and Implementation of a Cloud Audit Solution for Tencent Cloud Accounts
Ctrip Technology
Ctrip Technology
May 21, 2019 · Frontend Development

An Introduction to Electron and Its Practical Application in NFES DevTools

This article introduces Electron, explains its architecture, development workflow, performance and security considerations, and demonstrates its practical use in the NFES DevTools platform, providing guidance for developers who want to build cross‑platform desktop applications with web technologies.

Desktop AppDevToolsElectron
0 likes · 13 min read
An Introduction to Electron and Its Practical Application in NFES DevTools
58 Tech
58 Tech
May 16, 2019 · Information Security

Key Takeaways from the 58 Group Technical Salon on Account System Practices and Security

The 58 Group Technical Salon on April 23, 2019 presented a comprehensive overview of account system design, risk control, gateway authentication, multi‑active data synchronization, overseas account handling, cloud account platform capabilities, and security strategies, offering practical insights for building robust and secure user authentication infrastructures.

account systemcloud accountgateway authentication
0 likes · 10 min read
Key Takeaways from the 58 Group Technical Salon on Account System Practices and Security
Architecture Digest
Architecture Digest
Apr 25, 2019 · Artificial Intelligence

Designing High‑Quality Recommendation Services: Principles and Strategies

This article explains how to build high‑performance, highly‑available, scalable, extensible, and secure recommendation services by outlining background concepts, defining quality criteria, discussing design challenges, and presenting concrete architectural principles and practical strategies.

AvailabilityScalabilityarchitecture
0 likes · 29 min read
Designing High‑Quality Recommendation Services: Principles and Strategies
DataFunTalk
DataFunTalk
Apr 24, 2019 · Big Data

Practical Experience with Druid SQL and Security at Meituan: Challenges, Improvements, and Best Practices

This article presents Meituan's real‑world experience with Apache Druid, detailing the platform’s current usage, the usability, security and stability challenges faced, the principles and architecture of Druid SQL, the enhancements made to schema inference, logging, query safety, and the custom security extensions implemented to achieve fine‑grained access control and SSO integration.

DruidOLAPplatform
0 likes · 14 min read
Practical Experience with Druid SQL and Security at Meituan: Challenges, Improvements, and Best Practices
Alibaba Cloud Native
Alibaba Cloud Native
Apr 22, 2019 · Cloud Native

Latest Cloud Native Updates: K8s External Secrets, Performance Gains, and Best Practices

This roundup covers GoDaddy's open‑source Kubernetes External Secrets project, free CNCF cloud‑native courses for Chinese developers, major Kubernetes performance and security enhancements, Knative and Istio updates, containerd improvements, a shift from rich‑container ops to cloud‑native practices, and recommended open‑source and reading resources.

Kubernetesopen‑sourceperformance
0 likes · 11 min read
Latest Cloud Native Updates: K8s External Secrets, Performance Gains, and Best Practices
Java Captain
Java Captain
Apr 22, 2019 · Information Security

Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design

This article analyses various client‑side authentication scenarios, classifies tokens into password, session, and API categories, compares their natural and controllable attributes, and proposes a four‑layer hierarchical token architecture to improve security, usability, and decoupling across multiple platforms.

AuthenticationTokenaccess control
0 likes · 13 min read
Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design
Efficient Ops
Efficient Ops
Apr 17, 2019 · Fundamentals

Mastering Scalable Web Architecture: From Front‑End to Data Center

An in‑depth guide walks through the essential layers of modern website architecture—including front‑end optimization, application frameworks, service distribution, storage solutions, backend processing, monitoring, security, and data‑center design—offering practical strategies for building high‑performance, scalable web systems.

Operationsfrontendsecurity
0 likes · 11 min read
Mastering Scalable Web Architecture: From Front‑End to Data Center
Tencent Cloud Developer
Tencent Cloud Developer
Apr 12, 2019 · Information Security

Comprehensive Overview of Authentication: From Historical Tokens to Modern OAuth 2.0 and WeChat Mini‑Program Practices

The article surveys authentication from ancient token methods to modern password and session techniques, explains OAuth 2.0 flows and their adaptation for WeChat Mini‑Programs—including access‑token retrieval, simplified client‑credentials grants, and cloud‑call automation—while also previewing future trends such as biometrics, blockchain‑based decentralization, and AI‑driven trust models.

AuthenticationOAuth 2.0Token
0 likes · 13 min read
Comprehensive Overview of Authentication: From Historical Tokens to Modern OAuth 2.0 and WeChat Mini‑Program Practices
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2019 · Information Security

How Tiny Docker Misconfigurations Can Compromise CI Build Environments

This article examines how small configuration errors in Docker‑based CI pipelines, especially when using services like AWS CodeBuild and Docker‑in‑Docker, can expose severe security risks, demonstrates real‑world attack steps, and provides practical mitigation strategies to harden the build process.

CodeBuildContainer MisconfigurationDind
0 likes · 12 min read
How Tiny Docker Misconfigurations Can Compromise CI Build Environments
Efficient Ops
Efficient Ops
Apr 1, 2019 · Operations

Beyond Linux: Mastering Modern Operations – From Deployment to Cloud

This article explores the full spectrum of modern operations, covering environment deployment, troubleshooting, backup, high availability, monitoring, security, automation, virtualization, and cloud services, while highlighting essential tools and best practices for both Linux and Windows environments.

DeploymentOperationsautomation
0 likes · 8 min read
Beyond Linux: Mastering Modern Operations – From Deployment to Cloud
Java Architecture Diary
Java Architecture Diary
Mar 28, 2019 · Backend Development

How to Customize OAuth2 Tokens with Business Data in Spring Cloud

This article explains how to extend the default OAuth2 token response by adding business-related fields such as tenant, user, and department IDs, and walks through the relevant Spring Cloud source code that generates and enhances tokens for improved performance and security.

BackendOAuth2Spring Cloud
0 likes · 6 min read
How to Customize OAuth2 Tokens with Business Data in Spring Cloud
Sohu Tech Products
Sohu Tech Products
Mar 20, 2019 · Mobile Development

Comprehensive Guide to Android Permissions: Types, Groups, Dynamic Mechanisms and Compatibility Solutions

This article provides an in‑depth overview of Android permission architecture, covering permission categories, permission groups, the evolution of permission handling across API levels, special system permissions, custom permissions, common compatibility pitfalls on various OEM ROMs, and a unified design for dynamic permission requests.

AndroidDynamic PermissionMobile Development
0 likes · 19 min read
Comprehensive Guide to Android Permissions: Types, Groups, Dynamic Mechanisms and Compatibility Solutions
Java Architecture Diary
Java Architecture Diary
Mar 19, 2019 · Information Security

Eliminate OAuth2 Check‑Token Bottleneck with JWT and Custom Token Services

This article explains how the default OAuth2 check‑token flow creates a performance bottleneck, then shows how to extend JWT tokens with user details via a custom TokenEnhancer and replace RemoteTokenServices with a custom ResourceServerTokenServices, including configuration, code examples, and the security trade‑offs of using JWT.

JWTOAuth2Resource Server
0 likes · 7 min read
Eliminate OAuth2 Check‑Token Bottleneck with JWT and Custom Token Services
Continuous Delivery 2.0
Continuous Delivery 2.0
Mar 19, 2019 · Operations

Key Metrics for Agile Teams: From Lead Time to Security Indicators

This article explains how software teams can select, combine, and interpret nine essential metrics—including lead time, cycle time, team velocity, defect rates, MTBF, MTTR, and security incident counts—to drive continuous improvement, align with business goals, and ultimately achieve successful outcomes.

Lead TimeOperationsagile
0 likes · 12 min read
Key Metrics for Agile Teams: From Lead Time to Security Indicators
JD Tech
JD Tech
Mar 15, 2019 · Information Security

Arbitrary URL Redirect Vulnerability and Pitfalls of Java URL.getHost()

The article analyzes an arbitrary URL redirect flaw caused by unchecked returnUrl parameters, demonstrates how Java's URL.getHost() can be misused through backslash and hash bypasses, and provides a robust validation code snippet that works across JDK versions.

JDKURL redirectVulnerability
0 likes · 5 min read
Arbitrary URL Redirect Vulnerability and Pitfalls of Java URL.getHost()
Java Captain
Java Captain
Mar 2, 2019 · Fundamentals

Understanding Forward and Reverse Proxy: Concepts, Uses, and Differences

This article explains the principles of forward and reverse proxy servers, illustrates their roles with everyday analogies, outlines their typical use cases such as bypassing access restrictions, improving speed, hiding IP addresses, load balancing, and enhancing security, and compares the two approaches.

forward proxyreverse proxysecurity
0 likes · 9 min read
Understanding Forward and Reverse Proxy: Concepts, Uses, and Differences
Node Underground
Node Underground
Feb 28, 2019 · Information Security

10 Essential npm Security Practices Every Developer Should Follow

This article outlines ten critical npm security best practices—from avoiding secret leaks and using lockfiles to enabling two‑factor authentication and understanding typosquatting—helping front‑end and back‑end developers safeguard their projects against common package‑related vulnerabilities.

best practicesnpmsecurity
0 likes · 2 min read
10 Essential npm Security Practices Every Developer Should Follow
Tencent Cloud Developer
Tencent Cloud Developer
Feb 19, 2019 · Databases

What Makes a Great Database Management Tool? Key Features and Tencent Cloud DMC Review

This article analyzes the evolving demands of modern databases, outlines essential features for remote management tools, compares open‑source and cloud‑based solutions, and evaluates Tencent Cloud’s console, DMC, and integrated phpMyAdmin, highlighting strengths, shortcomings, and future development directions.

Database ManagementTencent CloudTool comparison
0 likes · 11 min read
What Makes a Great Database Management Tool? Key Features and Tencent Cloud DMC Review
21CTO
21CTO
Feb 8, 2019 · Operations

Baidu’s Secret to Handling 9 Billion Spring Festival Red Envelope Interactions

During the 2019 Chinese New Year Gala, Baidu mobilized a massive technical operation—scaling cloud resources, isolating traffic, and deploying AI‑driven security—to flawlessly process over 9 billion red‑packet interactions despite unprecedented traffic spikes and login surges.

Operationslarge-scale trafficsecurity
0 likes · 9 min read
Baidu’s Secret to Handling 9 Billion Spring Festival Red Envelope Interactions
Meituan Technology Team
Meituan Technology Team
Jan 17, 2019 · Information Security

Design and Architecture of a Scalable Host‑Based Intrusion Detection System (HIDS)

The paper presents a highly scalable, low‑overhead Host‑based Intrusion Detection System architecture designed for hundreds of thousands of servers, emphasizing cluster high‑availability, strong consistency via a CP‑oriented etcd backend, Go‑based agents with efficient resource management, modular sandboxing, and robust process monitoring to ensure reliable, secure operation at massive scale.

CAP theoremDistributed SystemsHIDS
0 likes · 26 min read
Design and Architecture of a Scalable Host‑Based Intrusion Detection System (HIDS)
Architects Research Society
Architects Research Society
Jan 9, 2019 · Operations

Enterprise Azure Governance Framework: Scaffolding, Policies, Security, Cost Management, and Automation

This guide explains how enterprises can build a comprehensive Azure governance scaffold—covering hierarchy, naming standards, policies, initiatives, identity and access management, security, monitoring, cost control, automation, and DevOps—to balance agility with control and risk mitigation across cloud workloads.

AzureCost Managementautomation
0 likes · 29 min read
Enterprise Azure Governance Framework: Scaffolding, Policies, Security, Cost Management, and Automation
DevOps
DevOps
Jan 6, 2019 · Fundamentals

Insights from Huawei’s Letter on Elevating Software Engineering Capability and Building Trustworthy High‑Quality Products

The article reflects on Huawei’s public letter urging a comprehensive upgrade of software‑engineering practices, explaining concepts such as IPD, the project‑management triple constraint, architecture, technical debt, security, and cultural change, while emphasizing the need for trustworthy, high‑quality software development.

Technical Debtarchitectureprocess improvement
0 likes · 18 min read
Insights from Huawei’s Letter on Elevating Software Engineering Capability and Building Trustworthy High‑Quality Products
Efficient Ops
Efficient Ops
Jan 2, 2019 · Operations

Essential Ops Practices: Prevent Disasters with Backups, Security, and Monitoring

This guide outlines critical operational practices for Linux server management, emphasizing thorough testing, cautious command execution, regular backups, strict access controls, comprehensive monitoring, performance tuning, and a disciplined mindset to avoid costly incidents and ensure system stability.

Operationsmonitoringsecurity
0 likes · 12 min read
Essential Ops Practices: Prevent Disasters with Backups, Security, and Monitoring
MaGe Linux Operations
MaGe Linux Operations
Dec 23, 2018 · Information Security

How to Install and Configure JumpServer 3.0 for Secure SSH Access

This guide walks you through installing JumpServer 3.0 on CentOS, configuring its dependencies, setting up users, assets, and permissions, and accessing the bastion host via web and SSH, providing a complete, step‑by‑step tutorial for a secure jump‑server deployment.

Bastion HostInstallationJumpServer
0 likes · 10 min read
How to Install and Configure JumpServer 3.0 for Secure SSH Access
Liangxu Linux
Liangxu Linux
Dec 20, 2018 · Operations

10 Linux Commands That Can Wipe Your System – What Not to Run

This article warns about ten extremely dangerous Linux commands—such as rm -rf, fork bombs, and direct writes to /dev/sda—explaining how they work, the potential damage they can cause, and safety measures to avoid catastrophic system failures.

System Administrationdangerous-commandssecurity
0 likes · 8 min read
10 Linux Commands That Can Wipe Your System – What Not to Run
MaGe Linux Operations
MaGe Linux Operations
Dec 18, 2018 · Information Security

Essential Linux Penetration Testing Cheat Sheet for Security Professionals

This cheat sheet compiles essential Linux commands for penetration testing, covering system enumeration, package management, user handling, compression, file operations, Samba access, shell tricks, Python tips, miscellaneous utilities, bash history clearing, filesystem permissions, and notable files for privilege escalation.

EnumerationLinuxpenetration testing
0 likes · 3 min read
Essential Linux Penetration Testing Cheat Sheet for Security Professionals
21CTO
21CTO
Dec 15, 2018 · Information Security

When Deleting Databases Becomes Revenge: Real‑World Cases and What You Must Do

This article recounts several real incidents where disgruntled engineers or admins deleted critical databases as retaliation, highlighting the severe consequences and stressing that proper backups and cautious use of destructive commands are essential for any organization.

IncidentOperationsrm
0 likes · 5 min read
When Deleting Databases Becomes Revenge: Real‑World Cases and What You Must Do
iQIYI Technical Product Team
iQIYI Technical Product Team
Dec 14, 2018 · Artificial Intelligence

AI Applications in Modern Technology and Society

The podcast examines AI’s rapid integration into entertainment, security and personalization, highlighting its use in automated video editing, facial-recognition tagging of celebrities and non-celebrities, while debating ethical concerns such as echo-chambers, emotional nuance, and the technology’s transformative yet limited role across industries.

Entertainmentaidata analysis
0 likes · 7 min read
AI Applications in Modern Technology and Society
DevOps
DevOps
Dec 10, 2018 · Cloud Native

A Historical Look at Containers vs Virtual Machines and Their Evolution

The article revisits the early days of physical server deployments and virtualization, explains how containers emerged as a lightweight alternative to VMs, discusses their security trade‑offs, and promotes a DevOpsLIVE event on Windows‑Linux containers and Azure Kubernetes.

ContainersDockerKubernetes
0 likes · 8 min read
A Historical Look at Containers vs Virtual Machines and Their Evolution
Efficient Ops
Efficient Ops
Dec 6, 2018 · Information Security

What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?

The draft "Internet Personal Information Security Protection Guideline" issued by China's Ministry of Public Security outlines comprehensive management mechanisms, technical safeguards, and business processes to help internet enterprises protect personal data throughout its lifecycle, and invites public feedback via the national security platform.

ChinaData ProtectionGuidelines
0 likes · 27 min read
What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2018 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This comprehensive guide presents 25 practical Linux hardening techniques—from BIOS protection and disk partitioning to SELinux configuration, firewall rules, and user account management—helping system administrators strengthen server security and defend against potential attacks.

HardeningLinuxSELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Secure Your Servers
ITPUB
ITPUB
Dec 5, 2018 · Cloud Native

Essential Dockerizing Tips: From Base Image to Log Rotation

This guide presents practical Dockerizing techniques—including choosing lightweight base images, installing only necessary packages, handling file permissions, defining user privileges, exposing ports, configuring entrypoints, externalizing data, and managing logs—to help developers build secure, efficient container images.

AlpineDockerDockerfile
0 likes · 8 min read
Essential Dockerizing Tips: From Base Image to Log Rotation
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Dec 4, 2018 · Information Security

How to Secure Microservices: From SSO to JWT and OAuth2 Explained

This article explores the evolution of authentication and authorization from monolithic to microservice architectures, comparing traditional session-based methods with modern token solutions like JWT and OAuth2, and provides practical guidance on implementing secure, scalable access control across dozens of services.

AuthorizationJWTMicroservices
0 likes · 18 min read
How to Secure Microservices: From SSO to JWT and OAuth2 Explained
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2018 · Information Security

Essential Linux Security Hardening: 12 Practical Commands to Protect Your System

This article walks through twelve essential Linux security techniques—including console access restrictions, password aging, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, SELinux reporting, and sealert usage—providing commands and configuration tips to fortify a system.

HardeningLinuxSELinux
0 likes · 15 min read
Essential Linux Security Hardening: 12 Practical Commands to Protect Your System
MaGe Linux Operations
MaGe Linux Operations
Nov 29, 2018 · Information Security

Master Python for Exploit Development: Setup, Libraries, and Network Tricks

This guide walks you through configuring a Python environment, installing essential packages such as virtualenv, IPython, requests, BeautifulSoup, and pwntools, and demonstrates how to perform network communication, binary manipulation, encoding, and C library integration, empowering you to develop security exploits efficiently.

Binaryexploit developmentpwntools
0 likes · 9 min read
Master Python for Exploit Development: Setup, Libraries, and Network Tricks
21CTO
21CTO
Nov 27, 2018 · Information Security

event-stream NPM Trojan: How a Bitcoin‑Mining Backdoor Sneaked In

The article explains how the popular Node.js package event-stream was transferred to a new maintainer who injected a malicious flatmap-stream module that steals Bitcoin, outlines the timeline of the supply‑chain attack, and provides steps for developers to detect and remediate the infection.

Event Streammalwarenpm
0 likes · 6 min read
event-stream NPM Trojan: How a Bitcoin‑Mining Backdoor Sneaked In
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Nov 27, 2018 · Operations

Alibaba’s IPv6 Deployment for Double 11: Architecture, Optimization, and Business Impact

The article explains how Alibaba leveraged large‑scale IPv6 deployment during the 2018 Double 11 shopping festival, detailing the end‑to‑end network architecture, big‑data‑driven optimization, security measures, and the strategic reasons behind moving from IPv4 to IPv6 across cloud, mobile, and IoT ecosystems.

Alibaba CloudIPv6security
0 likes · 9 min read
Alibaba’s IPv6 Deployment for Double 11: Architecture, Optimization, and Business Impact
Alibaba Cloud Developer
Alibaba Cloud Developer
Nov 27, 2018 · Artificial Intelligence

How Alibaba Optimizes Campus‑Scale Face Recognition for 200K Daily Scans

Alibaba’s campus face‑recognition system, handling over 200,000 daily scans, combines hardware upgrades, software image‑quality management, algorithmic grouping, and database‑photo enhancements to cut mis‑recognition to 0.1%, illustrating large‑scale AI deployment in security and payment scenarios.

AI OptimizationAlibabaface recognition
0 likes · 7 min read
How Alibaba Optimizes Campus‑Scale Face Recognition for 200K Daily Scans
Efficient Ops
Efficient Ops
Nov 25, 2018 · Operations

Top 13 Essential Linux Tools for System Monitoring and Security

This article introduces thirteen practical Linux operation tools—including Nethogs, IOZone, IOTop, IPtraf, IFTop, Fail2ban, and more—providing concise descriptions, download links, and step‑by‑step installation commands to help system administrators monitor performance, network traffic, and protect against attacks.

LinuxOperationsPerformance Testing
0 likes · 11 min read
Top 13 Essential Linux Tools for System Monitoring and Security
MaGe Linux Operations
MaGe Linux Operations
Nov 17, 2018 · Information Security

Hardening Linux: Practical Commands to Boost System Security

This article presents a comprehensive guide on strengthening Linux systems by applying console restrictions, password policies, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, and SELinux tools such as aureport and sealert.

HardeningLinuxSELinux
0 likes · 15 min read
Hardening Linux: Practical Commands to Boost System Security
UC Tech Team
UC Tech Team
Nov 16, 2018 · Information Security

Understanding OAuth Authorization Flow and Grant Types

This article explains the OAuth protocol, its role in providing secure third‑party access to user resources, describes the overall authorization architecture, outlines the involved parties and step‑by‑step flow, and details the four main grant types along with token refresh mechanisms.

APIAuthorizationGrant Types
0 likes · 6 min read
Understanding OAuth Authorization Flow and Grant Types
21CTO
21CTO
Nov 13, 2018 · Backend Development

What Makes Deno the Next‑Generation Alternative to Node.js?

This article explores Deno—a runtime created by Node.js co‑founder Ryan Dahl—covering its recent releases, TypeScript support, security roadmap, and how it aims to replace Node.js as a modern, secure backend platform.

BackendDenoNode.js alternative
0 likes · 3 min read
What Makes Deno the Next‑Generation Alternative to Node.js?
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2018 · Information Security

Essential Linux Security Practices Every Ops Engineer Should Know

This article outlines comprehensive Linux security measures—including account hardening, remote access protection, file system safeguards, rootkit detection tools, and step‑by‑step post‑attack response—to help system administrators strengthen server defenses and quickly recover from compromises.

HardeningLinuxOperations
0 likes · 23 min read
Essential Linux Security Practices Every Ops Engineer Should Know
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Oct 30, 2018 · Backend Development

Building an Open API Platform: Core Functions and Design Essentials

This article explains why open platforms emerged, outlines their essential functional modules such as service gateways, management, proxy, security, OAuth, registration, sandbox, and developer portals, and discusses future trends and technology evolution for open API platforms.

MicroservicesOAuthOpen Platform
0 likes · 16 min read
Building an Open API Platform: Core Functions and Design Essentials
Python Programming Learning Circle
Python Programming Learning Circle
Oct 29, 2018 · Backend Development

Essential PHP Backend Best Practices for Clean, Secure, and High‑Performance Code

This guide outlines key PHP backend practices—including abandoning deprecated mysql_ functions, avoiding unnecessary reference passing, writing efficient queries, validating user input, and embracing modern tools and languages—to help developers produce clean, secure, and high‑performance applications.

Backendbest practicescode quality
0 likes · 6 min read
Essential PHP Backend Best Practices for Clean, Secure, and High‑Performance Code
Efficient Ops
Efficient Ops
Oct 25, 2018 · Backend Development

Designing Scalable Web Architecture: From Front‑End to Data Center

This article outlines a comprehensive, multi‑layer web architecture covering front‑end optimization, application‑level frameworks, service‑oriented components, storage solutions, backend analytics, monitoring, security measures, and data‑center design for building highly scalable and reliable websites.

Scalable Designfrontendload balancing
0 likes · 12 min read
Designing Scalable Web Architecture: From Front‑End to Data Center
JD Tech
JD Tech
Oct 11, 2018 · Information Security

Multi‑Architecture Fuzzing Technique Presented by JD Security Lab at BRUCON

JD Security researchers attended the BRUCON conference to unveil a new fuzz‑testing operation that extends AFL with custom instrumentation, enabling faster testing across multiple CPU architectures and overcoming the limitations of existing fuzzers for closed‑source and non‑x86 systems.

BRUCONJD SecurityMulti-Architecture
0 likes · 5 min read
Multi‑Architecture Fuzzing Technique Presented by JD Security Lab at BRUCON
58 Tech
58 Tech
Oct 10, 2018 · Information Security

Account Integration Solutions for 58 Group: Merging, Linking, and Cloud Account Platform

This article examines the challenges of unifying multiple independent account systems within 58 Group and presents three technical approaches—full account merging, account linking with single sign‑on, and a unified cloud account platform—detailing their benefits, difficulties, and implementation considerations.

AuthenticationSingle Sign-Onaccount-integration
0 likes · 11 min read
Account Integration Solutions for 58 Group: Merging, Linking, and Cloud Account Platform
Efficient Ops
Efficient Ops
Oct 9, 2018 · Operations

How Tencent Scales Automated Operations for Massive Services

Tencent’s architecture platform team explains how they monitor, automate, and secure billions of daily operations across storage, CDN, and live services, using multi‑dimensional metrics, real‑time and instant computation, AI‑driven anomaly detection, and a custom control platform for safe changes.

Operationsaiopsautomation
0 likes · 23 min read
How Tencent Scales Automated Operations for Massive Services
Tencent Cloud Developer
Tencent Cloud Developer
Oct 9, 2018 · Cloud Native

A Comprehensive List of 50+ Useful Docker Tools

This guide catalogs over fifty essential Docker‑related tools—including orchestration platforms like Kubernetes and Swarm, CI/CD services such as Jenkins and GitLab, monitoring solutions like Prometheus, logging utilities, security scanners, storage plugins, and networking options—helping developers, DevOps, SREs, and architects select the right solution for each stage of container development.

DevOpsDockerOrchestration
0 likes · 27 min read
A Comprehensive List of 50+ Useful Docker Tools
Tencent Cloud Developer
Tencent Cloud Developer
Oct 8, 2018 · Artificial Intelligence

How Blockchain Can Transform Artificial Intelligence

Blockchain’s decentralized, secure ledger can empower AI by enabling open data sharing, trustworthy model licensing, and auditable provenance, while AI contributes decision‑making and pattern recognition, together creating a decentralized operating system that enhances security, transparency, and scalability across sectors such as healthcare, finance, and beyond.

Artificial IntelligenceBlockchainDecentralization
0 likes · 8 min read
How Blockchain Can Transform Artificial Intelligence
MaGe Linux Operations
MaGe Linux Operations
Oct 5, 2018 · Cloud Native

How Does Kubernetes Power Secure, Scalable Microservices in Financial Cloud?

This article provides a comprehensive technical guide on using Kubernetes and OpenShift for container‑cloud deployment, covering architecture, multi‑tenant isolation, security, load balancing, logging, monitoring, CI/CD, storage options, and best practices especially for financial‑industry microservice workloads.

KubernetesMicroservicesOpenShift
0 likes · 38 min read
How Does Kubernetes Power Secure, Scalable Microservices in Financial Cloud?
Architects Research Society
Architects Research Society
Sep 30, 2018 · Backend Development

Microservice Architecture: Benefits, Challenges, and Trade‑offs

The article examines the advantages and disadvantages of microservice architectures, discussing flexibility, scalability, autonomy, monitoring, build and release complexity, security, and data replication, while highlighting practical trade‑offs and lessons learned from real‑world implementations.

Microservicesautonomydata replication
0 likes · 8 min read
Microservice Architecture: Benefits, Challenges, and Trade‑offs
Efficient Ops
Efficient Ops
Sep 18, 2018 · Operations

Mastering Internet Operations: Roles, Responsibilities, and Evolution

This article provides a comprehensive overview of internet operations, detailing how service‑centric stability, security, and efficiency are achieved through infrastructure management, monitoring, risk mitigation, and continuous optimization, while outlining the various operational roles, their duties, and the evolution of ops practices.

DevOpsInfrastructureOperations
0 likes · 21 min read
Mastering Internet Operations: Roles, Responsibilities, and Evolution
Tencent Cloud Developer
Tencent Cloud Developer
Sep 18, 2018 · Backend Development

MQTT: The Nervous System of IoT – Overview and Key Features

MQTT is a lightweight, open‑source publish/subscribe protocol that powers the IoT’s global nervous system by delivering small‑header messages over TCP/IP with configurable QoS, low bandwidth, and optional TLS security, making it ideal for battery‑constrained devices, scalable deployments, and real‑time applications such as home monitoring.

IoTMQTTMessaging Protocol
0 likes · 10 min read
MQTT: The Nervous System of IoT – Overview and Key Features
360 Quality & Efficiency
360 Quality & Efficiency
Sep 12, 2018 · Fundamentals

Generic Architecture and Key Differentiators of IoT Platforms

The article translates and explains a typical IoT platform architecture, outlining its core Gather‑Analyze‑Act functions, common building blocks such as device interfaces, messaging brokers, storage and analytics layers, and highlights key differentiators like multi‑tenancy, protocol support, security, and extensible rule engines.

AnalyticsDevice onboardingIoT
0 likes · 7 min read
Generic Architecture and Key Differentiators of IoT Platforms
Java Captain
Java Captain
Sep 8, 2018 · Information Security

Understanding Single Sign-On (SSO) Mechanism and Its Java Implementation

This article explains the fundamentals of HTTP's stateless nature, session handling, and login state, then introduces the challenges of multi‑system environments and presents a detailed overview of Single Sign‑On (SSO) concepts, flow, deployment, and step‑by‑step Java code examples for both client and server sides.

BackendSSOSession Management
0 likes · 15 min read
Understanding Single Sign-On (SSO) Mechanism and Its Java Implementation
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2018 · Information Security

Essential Linux Hardening: 12 Practical Commands to Secure Your System

This article walks through twelve essential Linux security techniques—from console access restrictions and password aging to SSH hardening, Tripwire intrusion detection, firewalld and iptables configuration, compiler restrictions, immutable files, SELinux auditing, and more—providing concrete commands to fortify a system against evolving threats.

HardeningLinuxSSH
0 likes · 16 min read
Essential Linux Hardening: 12 Practical Commands to Secure Your System
Big Data and Microservices
Big Data and Microservices
Aug 27, 2018 · Industry Insights

What Makes Large‑Scale Websites Tick? Architecture Principles and Best Practices

This article outlines the key characteristics of large‑scale websites and presents a comprehensive set of architectural goals, patterns, and techniques—including performance tuning, high availability, scalability, extensibility, security, and agile operations—to guide the design of robust, user‑centric online platforms.

Scalabilityagilearchitecture
0 likes · 10 min read
What Makes Large‑Scale Websites Tick? Architecture Principles and Best Practices
Didi Tech
Didi Tech
Aug 20, 2018 · Information Security

How Kemon Reinvents macOS Kernel Monitoring and Bypasses Built‑in Limitations

This article examines the shortcomings of macOS's native kernel monitoring subsystems, details the design and implementation of the open‑source Kemon framework with inline hooks and pre/post callbacks, and showcases its practical applications and vulnerability discoveries presented at major security conferences.

Kemoninline hookkernel monitoring
0 likes · 9 min read
How Kemon Reinvents macOS Kernel Monitoring and Bypasses Built‑in Limitations