Tagged articles
2149 articles
Page 20 of 22
Big Data and Microservices
Big Data and Microservices
Aug 4, 2018 · Information Security

How CAS Enables Secure Single Sign-On: Architecture and Workflow Explained

CAS (Central Authentication Service) is an open‑source, enterprise‑grade single sign‑on solution that centralizes user authentication across trusted systems, offering reduced login time, improved security, and streamlined user management, with a clear protocol flow involving service tickets, redirects, and encrypted cookies.

AuthenticationCASSSO
0 likes · 5 min read
How CAS Enables Secure Single Sign-On: Architecture and Workflow Explained
Programmer DD
Programmer DD
Aug 2, 2018 · Cloud Native

What’s New in Istio 1.0? A Deep Dive into Features, Gateways, and Security

Istio 1.0, released on August 1, brings the first production‑ready service‑mesh platform with major enhancements in networking, policy & telemetry, out‑of‑process adapters, and security features such as mTLS and JWT, while introducing the IstioGateway to replace the legacy Ingress model.

IstioKubernetesMicroservices
0 likes · 9 min read
What’s New in Istio 1.0? A Deep Dive into Features, Gateways, and Security
Qunar Tech Salon
Qunar Tech Salon
Jul 31, 2018 · Operations

Best Practices for Container Operations: Logging, Monitoring, Security, and Immutability

This article outlines essential container operation best practices—including native logging, JSON log formatting, sidecar aggregators, stateless and immutable design, avoiding privileged containers, effective monitoring, health checks, non‑root execution, and careful image tagging—to help developers build secure, maintainable, and observable workloads on Kubernetes.

ContainersKubernetesSecurity
0 likes · 17 min read
Best Practices for Container Operations: Logging, Monitoring, Security, and Immutability
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jul 30, 2018 · Information Security

Understanding OAuth2.0 Authorization Code Grant Flow

This article explains the OAuth2.0 authorization code grant flow, using a Douban‑QQ login example to illustrate the three-step process from client request to token exchange and user information retrieval, and provides a simple reference implementation on GitHub.

AuthenticationAuthorization CodeOAuth Flow
0 likes · 7 min read
Understanding OAuth2.0 Authorization Code Grant Flow
MaGe Linux Operations
MaGe Linux Operations
Jul 30, 2018 · Information Security

How Tiny Docker Misconfigurations Can Cripple CI Security: A Deep Dive

This article examines how seemingly minor Docker configuration errors in CI/CD pipelines—especially within AWS CodeBuild and Docker‑in‑Docker setups—can expose severe security risks, demonstrates practical attack techniques, and offers concrete mitigation steps to harden the build environment.

AWS CodeBuildContainerDevOps
0 likes · 12 min read
How Tiny Docker Misconfigurations Can Cripple CI Security: A Deep Dive
Qunar Tech Salon
Qunar Tech Salon
Jul 27, 2018 · Information Security

Design and Features of an Anti‑Crawling Platform for Large‑Scale Services

The article describes the goals, architecture, core functions, and key characteristics of a comprehensive anti‑crawling platform that systematizes strategy management, data cleaning, monitoring, and rapid response to protect APIs and improve data reliability for large‑scale online services.

BackendSecurityanti‑crawling
0 likes · 10 min read
Design and Features of an Anti‑Crawling Platform for Large‑Scale Services
Java Captain
Java Captain
Jul 15, 2018 · Fundamentals

Key Concepts of Web and Network Protocols: GET/POST, DNS, Idempotence, Cookies vs Session, TCP Handshake, HTTP, and HTTPS

This article explains the fundamental differences between GET and POST requests, the dual TCP/UDP usage of DNS, the meaning of idempotence, the contrast between cookies and sessions, causes and solutions for TCP packet fragmentation, the three‑way handshake and four‑way termination, the complete HTTP request flow, long‑connection handling, TCP reliability mechanisms, detailed HTTP structure, the distinction between URI and URL, and how HTTPS secures data transmission.

DNSHTTPNetworking
0 likes · 18 min read
Key Concepts of Web and Network Protocols: GET/POST, DNS, Idempotence, Cookies vs Session, TCP Handshake, HTTP, and HTTPS
Java Architect Essentials
Java Architect Essentials
Jul 15, 2018 · Cloud Native

Top 10 Challenges of Microservice Architecture and Their Solutions

The article outlines ten major challenges faced when adopting microservice architecture—such as data synchronization, security, version control, discovery, data expiration, debugging, testing, monitoring, DevOps support, and fault tolerance—and presents practical solutions using cloud‑native tools and patterns.

DevOpsKubernetesMicroservices
0 likes · 5 min read
Top 10 Challenges of Microservice Architecture and Their Solutions
Efficient Ops
Efficient Ops
Jul 9, 2018 · Databases

How YY Scaled Its Database Platform: From Manual Ops to Intelligent Automation

This article details YY's journey in transforming its database operations—from early quality and efficiency challenges to a multi‑stage platform that automates resource pooling, high‑availability proxy, cost control, quality monitoring, and security, outlining future intelligent extensions.

Cost OptimizationDatabase operationsResource Management
0 likes · 16 min read
How YY Scaled Its Database Platform: From Manual Ops to Intelligent Automation
ITPUB
ITPUB
Jul 2, 2018 · Information Security

Top 8 Free Antivirus Solutions for Linux: Features and Comparison

This guide reviews eight free Linux antivirus tools—ClamAV, ClamTk, ChkrootKit, Rootkit Hunter, Comodo, Sophos, BitDefender, and F‑PROT—detailing their key capabilities, platform support, and how they help protect servers and workstations from malware and rootkits.

AntivirusRootkitSecurity
0 likes · 7 min read
Top 8 Free Antivirus Solutions for Linux: Features and Comparison
Efficient Ops
Efficient Ops
Jun 24, 2018 · Databases

Unlocking MySQL: DBA Daily Tasks and Proven Performance Optimization Strategies

This article walks through a DBA’s daily responsibilities, outlines a step‑by‑step MySQL performance‑tuning workflow, highlights key optimization areas such as application access, hardware selection, OS and instance settings, and shares practical automation practices for backup, monitoring, failover, security auditing, and log management.

Database AdministrationSecuritymysql
0 likes · 18 min read
Unlocking MySQL: DBA Daily Tasks and Proven Performance Optimization Strategies
MaGe Linux Operations
MaGe Linux Operations
Jun 24, 2018 · Information Security

Top 10 Python Security Pitfalls and How to Fix Them

Discover the ten most common Python security flaws—from input injection and XML parsing attacks to unsafe assert statements and vulnerable third‑party packages—and learn practical remediation techniques such as using ORM safeguards, defusedxml, safe YAML loading, secrets.compare_digest, and proper dependency management.

Secure CodingSecuritybest practices
0 likes · 10 min read
Top 10 Python Security Pitfalls and How to Fix Them
ITPUB
ITPUB
Jun 3, 2018 · Big Data

Spark vs Hadoop: Which Distributed System Fits Your Data Needs?

An in‑depth comparison of Hadoop and Spark examines their architectures, performance, cost, security, and machine‑learning capabilities, helping readers decide which open‑source distributed processing platform best matches their batch, streaming, and analytical workloads.

Big DataCostHadoop
0 likes · 13 min read
Spark vs Hadoop: Which Distributed System Fits Your Data Needs?
ITPUB
ITPUB
Jun 3, 2018 · Cloud Native

11 Docker Mistakes to Avoid for Reliable Container Deployments

This article outlines eleven common Docker anti‑patterns—ranging from storing data inside containers to using the latest tag—and provides practical guidance on building lightweight, secure, and maintainable images for production environments.

ContainersDevOpsDocker
0 likes · 6 min read
11 Docker Mistakes to Avoid for Reliable Container Deployments
Architects Research Society
Architects Research Society
May 11, 2018 · Information Security

IoT Security and Edge Computing Trends Forecast for 2018

The article examines how the rapid growth of IoT devices in 2018 raises significant security concerns, predicts large‑scale attacks and data challenges, and highlights a shift toward edge computing and tighter IT‑OT collaboration to manage the expanding data and protect networks.

AIData AnalyticsEdge Computing
0 likes · 6 min read
IoT Security and Edge Computing Trends Forecast for 2018
MaGe Linux Operations
MaGe Linux Operations
May 1, 2018 · Fundamentals

Designing Clean Python Library APIs: A Practical Checklist

This article, based on a 2017 PyCon talk, presents a comprehensive checklist for building Python library APIs, covering simplicity, consistency, flexibility, and security with concrete examples and actionable guidelines to help developers create intuitive and reliable interfaces.

ConsistencyLibrarySecurity
0 likes · 11 min read
Designing Clean Python Library APIs: A Practical Checklist
Architects Research Society
Architects Research Society
Apr 30, 2018 · Blockchain

Understanding the Misconceptions and Security Implications of Blockchain Smart Contracts

This article clarifies that blockchain smart contracts are neither traditional contracts nor inherently smart, explains transaction fundamentals, explores how platforms like Ethereum enable programmable conditions, and examines the security, confidentiality, integrity, and availability challenges they introduce.

Securitycryptocurrencydecentralized ledger
0 likes · 10 min read
Understanding the Misconceptions and Security Implications of Blockchain Smart Contracts
Architecture Digest
Architecture Digest
Apr 30, 2018 · Backend Development

Modern Backend Developer Roadmap: A Step‑by‑Step Guide

This article presents a comprehensive, sequential roadmap for aspiring backend developers, covering language selection, practice projects, package managers, standards, security, testing, databases, frameworks, caching, APIs, authentication, messaging, search, Docker, web servers, WebSockets, GraphQL, graph databases, and continuous learning.

BackendRoadmapSecurity
0 likes · 10 min read
Modern Backend Developer Roadmap: A Step‑by‑Step Guide
21CTO
21CTO
Apr 18, 2018 · Information Security

Why Linus Torvalds Rages at Intel, C++, and the Tech Industry

The article explores Linus Torvalds' outspoken criticism of Intel's CPU security flaws, his harsh opinions on C++, GCC, GNOME, Java, Mach, and XML, and how his fiery remarks reflect deep technical frustrations rather than personal vendettas.

Linus TorvaldsSecuritylinux
0 likes · 10 min read
Why Linus Torvalds Rages at Intel, C++, and the Tech Industry
Architecture Digest
Architecture Digest
Apr 13, 2018 · Frontend Development

2018 Frontend Performance Checklist

This article presents a comprehensive 2018 frontend performance checklist that guides teams from establishing a performance culture and selecting metrics to optimizing build processes, static assets, HTTP/2, security, and monitoring, while offering quick‑win actions for immediate impact.

MetricsSecurityWeb
0 likes · 20 min read
2018 Frontend Performance Checklist
Alibaba Cloud Native
Alibaba Cloud Native
Mar 29, 2018 · Information Security

Understanding Meltdown: How Intel CPUs Leak Kernel Data via Side‑Channel Attacks

The article explains the Meltdown vulnerability affecting Intel CPUs, detailing how malicious unprivileged code can exploit out‑of‑order execution and a Flush+Reload side‑channel to read kernel memory, describing the attack path, secret channel construction, page‑fault handling, probe array setup, and code examples.

ExploitIntelMeltdown
0 likes · 9 min read
Understanding Meltdown: How Intel CPUs Leak Kernel Data via Side‑Channel Attacks
ITPUB
ITPUB
Mar 14, 2018 · Databases

Boost MySQL Security: Set Proper datadir Permissions, Secure Socket Placement, and Use login‑path

This guide explains three practical steps to harden MySQL installations: configuring strict datadir permission modes, relocating the MySQL socket file into the datadir with safe permissions, and leveraging the login‑path feature via mysql_config_editor to store credentials securely while simplifying client access.

Database AdministrationSecuritySocket
0 likes · 6 min read
Boost MySQL Security: Set Proper datadir Permissions, Secure Socket Placement, and Use login‑path
21CTO
21CTO
Mar 13, 2018 · Blockchain

How Blockchain Is Revolutionizing IoT—from Smart Homes to Shipping

This article explores how integrating blockchain with the Internet of Things enhances security, enables decentralized value exchange for devices, and drives innovative applications across industries such as manufacturing, smart homes, logistics, digital payments, and transparent voting systems.

BlockchainIoTSecurity
0 likes · 5 min read
How Blockchain Is Revolutionizing IoT—from Smart Homes to Shipping
Architecture Digest
Architecture Digest
Mar 8, 2018 · Blockchain

An Overview of Blockchain Technology: History, Definition, Architecture, Characteristics, and Security

This article provides a comprehensive introduction to blockchain technology, covering its origins, development milestones, formal definition, structural classifications, key characteristics such as decentralization and immutability, as well as security mechanisms and current limitations, supported by references and illustrative diagrams.

BlockchainDecentralizationDefinition
0 likes · 26 min read
An Overview of Blockchain Technology: History, Definition, Architecture, Characteristics, and Security
Java Backend Technology
Java Backend Technology
Feb 27, 2018 · Backend Development

Mastering Large-Scale Website Architecture: 10 Essential Patterns Explained

This article outlines ten fundamental architecture patterns for high‑traffic websites—including layering, partitioning, distribution, clustering, caching, asynchronous processing, redundancy, automation, and security—explaining their goals, benefits, challenges, and best‑practice constraints to help engineers build scalable, reliable, and maintainable systems.

Distributed SystemsScalabilitySecurity
0 likes · 11 min read
Mastering Large-Scale Website Architecture: 10 Essential Patterns Explained
Java Backend Technology
Java Backend Technology
Feb 23, 2018 · Frontend Development

How Chrome Teams and Web Developers Can Co‑Create a Faster, Safer Web

The article explores the collaborative relationship between Chrome teams and the web development community, outlining high‑level goals for accessibility, performance, security, privacy, overall platform openness, and calls for transparent cooperation, best‑practice guides, and shared tools to build a faster, more reliable web for everyone.

ChromeSecurityWeb Development
0 likes · 11 min read
How Chrome Teams and Web Developers Can Co‑Create a Faster, Safer Web
Qunar Tech Salon
Qunar Tech Salon
Jan 25, 2018 · Blockchain

Understanding Blockchain Technology and Its Potential Applications in the Tourism Industry

This article explains the fundamentals of blockchain technology, its key features such as decentralization, smart contracts, and security, examines its advantages and drawbacks, and explores practical applications and challenges of implementing blockchain solutions in the tourism sector, including ticketing, ride‑hailing, and hotel reservations.

Securityfinancial technologysmart contracts
0 likes · 22 min read
Understanding Blockchain Technology and Its Potential Applications in the Tourism Industry
MaGe Linux Operations
MaGe Linux Operations
Jan 22, 2018 · Information Security

Essential Linux Penetration Testing Cheat Sheet for Security Professionals

A comprehensive cheat sheet of Linux commands covering system enumeration, package management, user handling, compression, file operations, Samba access, shell tricks, miscellaneous utilities, bash history clearing, filesystem permissions, and interesting files for effective penetration testing.

Cheat SheetEnumerationSecurity
0 likes · 3 min read
Essential Linux Penetration Testing Cheat Sheet for Security Professionals
21CTO
21CTO
Jan 20, 2018 · Backend Development

Master Nginx Rate Limiting: From Basics to Advanced Configurations

This guide explains how Nginx's rate‑limiting works, covering the leaky‑bucket algorithm, basic directives, burst and nodelay options, whitelist handling, logging, custom error codes, and advanced configuration examples for securing and optimizing HTTP request traffic.

ConfigurationNginxSecurity
0 likes · 13 min read
Master Nginx Rate Limiting: From Basics to Advanced Configurations
WeChat Backend Team
WeChat Backend Team
Jan 18, 2018 · Information Security

How WeChat Detects Anomalous Users at Billion‑Scale: Inside Its Fast, Scalable Framework

This article explains how WeChat’s security team builds a scalable anomaly‑detection framework that partitions billions of user accounts, weights suspicious attributes, computes similarity graphs, and leverages Spark optimizations and graph‑partitioning techniques to efficiently identify malicious user clusters.

Large-Scale GraphSecuritySpark optimization
0 likes · 18 min read
How WeChat Detects Anomalous Users at Billion‑Scale: Inside Its Fast, Scalable Framework
dbaplus Community
dbaplus Community
Jan 11, 2018 · Cloud Native

Essential Docker Ecosystem Tools: A Comprehensive Guide for Developers and Ops

This article provides a detailed, curated list of the most popular Docker‑related tools across categories such as orchestration, CI/CD, monitoring, security, storage, networking and management, including brief descriptions, official links and cost information to help developers, DevOps engineers and platform architects choose the right solutions for every stage of the container lifecycle.

ContainerOrchestrationSecurity
0 likes · 29 min read
Essential Docker Ecosystem Tools: A Comprehensive Guide for Developers and Ops
Programmer DD
Programmer DD
Jan 8, 2018 · Information Security

Essential Linux MySQL/MariaDB Security Practices Every Admin Should Follow

This guide outlines twelve practical steps to harden MySQL and MariaDB on Linux, covering secure installation, network binding, disabling unsafe features, changing defaults, enabling logging, proper permissions, history cleanup, safe credential handling, application‑specific users, security plugins, password rotation, and regular package updates.

Database HardeningMariaDBSecurity
0 likes · 8 min read
Essential Linux MySQL/MariaDB Security Practices Every Admin Should Follow
DevOpsClub
DevOpsClub
Jan 4, 2018 · Operations

How Capital One Revolutionized DevOps: Pipeline Design, Security, and Speed

This article analyzes Capital One's five‑year DevOps transformation, detailing its background, organizational shifts, high‑quality fast delivery goals, pipeline construction principles, measurement practices, security and compliance enhancements, and the impressive performance results achieved.

BankingDevOpsPipeline
0 likes · 12 min read
How Capital One Revolutionized DevOps: Pipeline Design, Security, and Speed
MaGe Linux Operations
MaGe Linux Operations
Dec 23, 2017 · Operations

2017 Ops Tech Landscape: From Microservices to Intelligent Automation

This article surveys the evolution of operations technology, covering microservices, SRE, DevOps, containerization, orchestration, automation, intelligent monitoring, infrastructure, database and big‑data ops, as well as security, game and fintech operational challenges, highlighting current trends and future directions for 2017.

DevOpsMicroservicesOperations
0 likes · 14 min read
2017 Ops Tech Landscape: From Microservices to Intelligent Automation
Architecture Digest
Architecture Digest
Dec 22, 2017 · Big Data

Redesign and Optimization of the WeChat Pay Transaction Record System

This article presents a comprehensive case study of how WeChat Pay rebuilt its transaction record storage system to handle massive data volumes, improve performance, ensure data completeness, support flexible queries, and strengthen security through distributed key‑value storage, data partitioning, and operational safeguards.

Big DataData PartitioningSecurity
0 likes · 11 min read
Redesign and Optimization of the WeChat Pay Transaction Record System
ITPUB
ITPUB
Dec 18, 2017 · Operations

Which Four Essential Skills Must Linux Professionals Master in 2018?

The article outlines four crucial abilities—security awareness, practical DevOps knowledge, programming competence, and strong soft‑communication skills—that every Linux specialist should develop this year to stay effective and adaptable in the evolving IT landscape.

Career DevelopmentDevOpsSecurity
0 likes · 7 min read
Which Four Essential Skills Must Linux Professionals Master in 2018?
Efficient Ops
Efficient Ops
Dec 17, 2017 · Information Security

How Android Security Works: Threats, Models, and Protection Strategies

This article examines the current Android security landscape, outlines the platform's security model, discusses program, data, and system vulnerabilities, analyzes a tampered APK case study, and presents comprehensive protection techniques such as obfuscation, shelling, and integrity verification.

APK protectionAndroidMobile Security
0 likes · 11 min read
How Android Security Works: Threats, Models, and Protection Strategies
Architects Research Society
Architects Research Society
Dec 16, 2017 · Blockchain

Four Enterprise Use Cases for Blockchain Technology

The article outlines four enterprise blockchain applications—autonomous markets, reduced transaction friction, encrypted private records, and product provenance—illustrating how distributed ledger technology can add flexibility, security, and efficiency to B2B processes while hinting at Oracle's blockchain cloud service.

SecurityUse Casesdistributed ledger
0 likes · 7 min read
Four Enterprise Use Cases for Blockchain Technology
JD Retail Technology
JD Retail Technology
Dec 14, 2017 · Information Security

Android Signature Verification and JNI Registration: Security Challenges and Mitigation Strategies

This article explains the background of Android app signing, outlines the core security objectives of confidentiality, integrity and availability, compares static and dynamic JNI registration methods, demonstrates native signature verification and certificate integrity checks, and summarizes common cracking techniques together with practical hardening solutions.

AndroidJNISecurity
0 likes · 16 min read
Android Signature Verification and JNI Registration: Security Challenges and Mitigation Strategies
21CTO
21CTO
Dec 8, 2017 · Backend Development

What PHP 7.2 Brings: Argon2i Hashing, libsodium, and Key Improvements

PHP 7.2 introduces major security upgrades like Argon2i password hashing and built‑in libsodium, removes the outdated mcrypt extension, refines count() behavior, adds object type hints, and fixes hash and array key handling, offering developers a more robust and modern backend language.

7.2Argon2iBackend Development
0 likes · 3 min read
What PHP 7.2 Brings: Argon2i Hashing, libsodium, and Key Improvements
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Dec 7, 2017 · Operations

How 360’s Private Cloud Powers Elasticsearch: Architecture, Security, and Scaling

This article explains how 360’s Hulk private cloud platform deploys Elasticsearch with a dedicated master architecture, load‑balancing, per‑business isolated clusters, SearchGuard security, dynamic tokenization, self‑service user features, and advanced monitoring to achieve high‑performance, scalable search services.

ElasticsearchSecuritymonitoring
0 likes · 6 min read
How 360’s Private Cloud Powers Elasticsearch: Architecture, Security, and Scaling
Java Backend Technology
Java Backend Technology
Dec 2, 2017 · Fundamentals

Why IPv6 Matters: Benefits, Deployment Plans, and How It Works

This article explains China's IPv6 deployment initiative, the technical differences between IPv4 and IPv6, various IPv6 address representation methods, and the numerous advantages of IPv6 over IPv4, highlighting its massive address space, routing efficiency, security improvements, and support for emerging technologies.

IPv6Internet ProtocolSecurity
0 likes · 8 min read
Why IPv6 Matters: Benefits, Deployment Plans, and How It Works
iQIYI Technical Product Team
iQIYI Technical Product Team
Nov 24, 2017 · Information Security

Risk Control System for Live Streaming: Real‑time Interception (Pluto) and Big Data Analysis (Mars)

iQIYI’s live‑stream risk‑control platform combines the real‑time interception engine Pluto with the big‑data analytics system Mars to curb black‑market registration fraud and red‑packet abuse, processing over a billion daily requests through adaptive filters, Kafka‑Spark pipelines, and clustering algorithms that now limit fake popularity to 10‑30 % and red‑packet capture to under 3 %.

Big DataMarsPluto
0 likes · 11 min read
Risk Control System for Live Streaming: Real‑time Interception (Pluto) and Big Data Analysis (Mars)
MaGe Linux Operations
MaGe Linux Operations
Nov 19, 2017 · Information Security

How to Crack Sliding Puzzle Captchas with Simple Python Image Analysis

This article explores the security weaknesses of sliding puzzle captchas by collecting multiple samples, performing qualitative and quantitative image analysis, and presenting a Python script that automatically identifies the puzzle gap using pixel differences and statistical thresholds.

CaptchaImage ProcessingPython
0 likes · 7 min read
How to Crack Sliding Puzzle Captchas with Simple Python Image Analysis
Java Backend Technology
Java Backend Technology
Nov 13, 2017 · Backend Development

Transforming Monolithic Websites to Scalable, High‑Performance Distributed Systems

Learn how early monolithic websites evolve into distributed architectures by splitting applications, services, and data, implementing load balancers, reverse proxies, caching, CDN, database sharding, and security measures, while focusing on performance, high availability, scalability, and extensibility for robust, high‑traffic sites.

Distributed SystemsPerformance OptimizationScalability
0 likes · 11 min read
Transforming Monolithic Websites to Scalable, High‑Performance Distributed Systems
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2017 · Information Security

How to Exploit and Secure Python's eval: Bypass Tricks and Whitelist Defenses

This article explains how Python's eval can execute arbitrary code, demonstrates multiple bypass techniques—including __import__, __builtins__ manipulation, and object subclass exploitation—and shows how to safely restrict eval using whitelist globals or ast.literal_eval to prevent code injection and denial‑of‑service attacks.

Code InjectionPythonSecurity
0 likes · 9 min read
How to Exploit and Secure Python's eval: Bypass Tricks and Whitelist Defenses
ITPUB
ITPUB
Oct 17, 2017 · Information Security

10 Linux Commands That Can Wipe Your System – Handle With Extreme Care

This article lists ten dangerous Linux commands, explains how each can irreversibly destroy data or crash a system—especially when run as root—and provides safety tips such as using rm -i aliases and testing only in virtual machines.

Securitydangerous-commandsrm -rf
0 likes · 8 min read
10 Linux Commands That Can Wipe Your System – Handle With Extreme Care
ITPUB
ITPUB
Oct 7, 2017 · Operations

13 Must‑Have Linux Ops Tools and Quick Installation Guides

This guide introduces thirteen essential Linux operation utilities—including Nethogs, IOZone, IOTop, IPtraf, IFTop, HTop, NMON, MultiTail, Fail2ban, Tmux, Agedu, NMap and Httperf—providing brief descriptions, download links and step‑by‑step commands to install and use each tool for monitoring, performance testing, security and session management.

SecuritySysadminlinux
0 likes · 12 min read
13 Must‑Have Linux Ops Tools and Quick Installation Guides
21CTO
21CTO
Sep 29, 2017 · Backend Development

How to Survive Flash‑Sale Traffic: Backend Strategies for 100k QPS

This article examines the technical challenges of handling massive concurrent requests during flash‑sale and ticket‑buying events, offering practical backend design, performance tuning, anti‑cheat measures, and data‑safety techniques to keep web systems stable under extreme load.

Securitybackend optimizationflash sale
0 likes · 16 min read
How to Survive Flash‑Sale Traffic: Backend Strategies for 100k QPS
21CTO
21CTO
Sep 26, 2017 · Operations

Why You Should Never Trust Any Component in Your System—and How to Protect It

In programming and operations, every element—from services and dependencies to requests, machines, data centers, power, networks, and humans—can fail unexpectedly, so you must assume distrust and implement defensive measures such as monitoring, redundancy, rate limiting, fallback strategies, backups, and automated deployment.

OperationsReliabilitySecurity
0 likes · 9 min read
Why You Should Never Trust Any Component in Your System—and How to Protect It
Meituan Technology Team
Meituan Technology Team
Sep 14, 2017 · Information Security

Android Binder Vulnerabilities and Exploitation Techniques Using Drozer

The article reviews real‑world Android Binder vulnerabilities—including lock‑screen bypasses, Samsung shutdown eavesdropping, theme escalation, and system DoS—explains the Binder IPC architecture, and demonstrates how the drozer framework can be used for automated fuzzing, AIDL‑based, reflection‑based, and shell‑script exploitation of high‑privilege services.

AndroidBinderDrozer
0 likes · 14 min read
Android Binder Vulnerabilities and Exploitation Techniques Using Drozer
Programmer DD
Programmer DD
Sep 11, 2017 · Backend Development

Understanding Java Session and Cookie: A Hands‑On Spring Boot Demo

This article explains the fundamentals of HTTP Session and Cookie mechanisms in Java web applications, provides a minimal Spring Boot controller example that stores and retrieves a browser identifier via session, demonstrates behavior across Chrome and 360 browsers, and highlights the security risk of tampering with the JSESSIONID cookie.

CookieJavaSecurity
0 likes · 8 min read
Understanding Java Session and Cookie: A Hands‑On Spring Boot Demo
BiCaiJia Technology Team
BiCaiJia Technology Team
Sep 9, 2017 · Information Security

Top 12 Tomcat Hardening Steps to Secure Your Java Web Server

Learn how to harden Apache Tomcat by disabling default users, removing unnecessary webapps, preventing directory listings, enforcing HttpOnly cookies, securing shutdown ports, hiding version info, disabling auto‑deployment, setting proper file permissions, enabling access logs, customizing error pages, and configuring custom application paths.

ConfigurationHardeningSecurity
0 likes · 10 min read
Top 12 Tomcat Hardening Steps to Secure Your Java Web Server
ITPUB
ITPUB
Sep 8, 2017 · Fundamentals

7 Common Linux Misconceptions Debunked – What You Need to Know

This article dispels seven widespread myths about Linux, covering its user base, origins, usability, security, aesthetics, gaming support, and cost, while highlighting real-world adoption, community initiatives, and practical ways to experience the operating system.

DesktopOperating SystemSecurity
0 likes · 11 min read
7 Common Linux Misconceptions Debunked – What You Need to Know
DevOps
DevOps
Sep 7, 2017 · Cloud Computing

Understanding Cloud Computing, ALM, and DevOps Best Practices

The article explains how cloud computing supports Application Lifecycle Management, outlines the benefits and risks of various cloud service models, and describes DevOps practices such as Infrastructure as Code, automated provisioning, continuous integration, and knowledge sharing that help mitigate cloud‑related challenges.

ALMDevOpsInfrastructure as Code
0 likes · 13 min read
Understanding Cloud Computing, ALM, and DevOps Best Practices
ITPUB
ITPUB
Sep 7, 2017 · Operations

Essential Command-Line Tools Every Linux Sysadmin Should Know

Sysadmins need reliable command-line utilities to keep services running 24/7, and this guide compiles the most commonly used networking, security, storage, logging, backup, performance, efficiency, package-management, and hardware inspection tools on Linux, explaining each command’s purpose and typical use cases.

CLI toolsSecuritySysadmin
0 likes · 15 min read
Essential Command-Line Tools Every Linux Sysadmin Should Know
Hujiang Technology
Hujiang Technology
Sep 5, 2017 · Information Security

Understanding Android O seccomp Filters and Illegal System Calls

The article explains how Android O uses seccomp filters in the zygote process to block unused or dangerous system calls, how developers can detect and avoid illegal calls that cause crashes, and how to test or disable the filter on development builds.

AndroidSecuritykernel
0 likes · 6 min read
Understanding Android O seccomp Filters and Illegal System Calls
Architecture Digest
Architecture Digest
Sep 5, 2017 · Information Security

Security Authentication and Authorization Strategies for Microservice Architecture

This article examines the challenges of securing microservice architectures and compares various authentication and authorization approaches—including SSO, distributed sessions, client‑token schemes, JWT, and OAuth 2.0—to help developers choose suitable solutions for efficient and fine‑grained access control.

AuthenticationAuthorizationJWT
0 likes · 15 min read
Security Authentication and Authorization Strategies for Microservice Architecture
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2017 · Operations

Top 19 Linux & DevOps Interview Questions You Must Master

This article compiles a comprehensive set of 19 Linux, security, networking, and Python interview questions covering basic commands, file handling, process management, load balancing, HTTP headers, cookies vs sessions, TCP handshakes, and common security vulnerabilities, providing a solid study guide for system administrators and DevOps engineers.

NetworkingPythonSecurity
0 likes · 6 min read
Top 19 Linux & DevOps Interview Questions You Must Master
Hujiang Technology
Hujiang Technology
Aug 30, 2017 · Information Security

Design Principles and Security Considerations for User Account Systems

This article shares practical insights on building robust user account systems, covering the shift from usernames to phone numbers as unique identifiers, the drawbacks of passwords, the limited value of periodic password changes, the pitfalls of security questions, and best practices for token management, SMS/voice verification, captcha usage, and multi‑layered future security strategies.

AuthenticationPasswordlessSMS Verification
0 likes · 14 min read
Design Principles and Security Considerations for User Account Systems
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 28, 2017 · Information Security

7 Surprising JavaScript Tricks to Bypass XSS Filters

This article reveals a collection of unconventional JavaScript techniques—including regex replacement, Unicode escapes, eval tricks, unusual operator combinations, custom getters/setters, and URL‑encoded payloads—that can evade common XSS filters and strengthen your understanding of web security.

BypassSecurityUnicode
0 likes · 10 min read
7 Surprising JavaScript Tricks to Bypass XSS Filters
Architecture Digest
Architecture Digest
Aug 28, 2017 · Backend Development

Key Considerations for Software Architecture: Functionality, Variability, Performance, Capacity, Ecosystem, Modularity, Buildability, Productization, and Security

The article outlines essential software architecture concerns—including functionality, variability, performance, capacity, ecosystem integration, modularity, buildability, productization, and security—while also discussing evaluation methods and scaling strategies for large‑scale systems such as MMOs.

Backend DevelopmentGame DevelopmentScalability
0 likes · 6 min read
Key Considerations for Software Architecture: Functionality, Variability, Performance, Capacity, Ecosystem, Modularity, Buildability, Productization, and Security
MaGe Linux Operations
MaGe Linux Operations
Aug 21, 2017 · Information Security

Essential Linux Security Practices: Account Management, Network Hardening, and More

This article examines Linux security mechanisms—covering system account and password management, network protection, filesystem safeguards, log preservation, and kernel patching—using Red Hat Enterprise Linux 6.7 as a concrete example, and provides actionable strategies to mitigate common vulnerabilities.

Password policyRed HatSecurity
0 likes · 18 min read
Essential Linux Security Practices: Account Management, Network Hardening, and More
21CTO
21CTO
Aug 17, 2017 · Backend Development

10 Proven PHP Best Practices Every Developer Should Follow

This article presents ten expert‑backed PHP best‑practice guidelines—from choosing the right use cases and scaling with multi‑table storage to security, caching, IDE tricks, filtering, framework choices, batch processing, and error reporting—to help developers write more efficient, maintainable, and secure code.

PHPSecuritybest practices
0 likes · 11 min read
10 Proven PHP Best Practices Every Developer Should Follow
Meituan Technology Team
Meituan Technology Team
Aug 17, 2017 · Mobile Development

Real‑time Android Studio Source Code Security Scanning with FindBugs Extension (Code Arbiter)

Code Arbiter extends the FindBugs plugin to provide real‑time Android Studio source‑code security scanning, implementing line‑by‑line API misuse detection, empty TrustManager checks, taint‑analysis of sources and sinks, and custom bytecode checks for unprotected Intent/Bundle reads, all packaged as a JAR for instant developer feedback.

AndroidCode ArbiterIDE plugin
0 likes · 20 min read
Real‑time Android Studio Source Code Security Scanning with FindBugs Extension (Code Arbiter)
MaGe Linux Operations
MaGe Linux Operations
Aug 11, 2017 · Operations

Why Operations Matters: Beyond Automation to Real Business Value

In this reflective piece, Zhao Cheng (aka Qianyi) shares his experience managing the operations team at Mogujie, argues that operations value extends beyond automation to efficiency, stability, security, cost, and user experience, and offers practical guidance for shifting mindsets and aligning ops with business goals.

Cost ManagementDevOpsOperations
0 likes · 12 min read
Why Operations Matters: Beyond Automation to Real Business Value
Architecture Digest
Architecture Digest
Aug 5, 2017 · Fundamentals

Key Architectural Concerns for Large-Scale Websites: Performance, Availability, Scalability, Extensibility, and Security

The article explains the fundamental architectural factors of large‑scale web systems—performance, availability, scalability, extensibility, and security—detailing practical optimization techniques, measurement metrics, and design principles that guide robust software architecture decisions.

AvailabilityScalabilitySecurity
0 likes · 7 min read
Key Architectural Concerns for Large-Scale Websites: Performance, Availability, Scalability, Extensibility, and Security
Efficient Ops
Efficient Ops
Aug 2, 2017 · Operations

Essential Ops Playbook: 6 Key Practices to Prevent Disasters

Drawing from a year‑and‑a‑half of ops experience, this guide outlines six practical categories—online operation standards, data handling, security, daily monitoring, performance tuning, and mindset—to help engineers avoid costly mistakes and maintain stable, secure systems.

BackupOperationsSecurity
0 likes · 12 min read
Essential Ops Playbook: 6 Key Practices to Prevent Disasters
Beike Product & Technology
Beike Product & Technology
Jul 28, 2017 · Backend Development

Design and Implementation of an E‑Commerce System: Business, Efficiency, Security, and Optimization Insights

This article shares the end‑to‑end design and development experience of a startup e‑commerce platform, covering business requirement analysis, efficient development practices, security measures, performance and architecture optimizations, as well as team‑building lessons learned.

BackendSecuritye‑commerce
0 likes · 20 min read
Design and Implementation of an E‑Commerce System: Business, Efficiency, Security, and Optimization Insights
MaGe Linux Operations
MaGe Linux Operations
Jul 22, 2017 · Information Security

8 Proven Ways to Harden Linux System Security

This article outlines eight practical techniques—including using shadow passwords, disabling unnecessary services, keeping the kernel up‑to‑date, enforcing strong login passwords, managing user privileges, limiting root access, employing SSH, and removing risky r‑commands—to significantly improve the security of a Linux system.

Root AccessSecuritySystem Hardening
0 likes · 11 min read
8 Proven Ways to Harden Linux System Security
MaGe Linux Operations
MaGe Linux Operations
Jul 21, 2017 · Information Security

Detecting Python Injection Vulnerabilities with AST Analysis

This article explains how Python injection flaws—such as OS command, code, SQL, and arbitrary file download attacks—can be identified by analyzing abstract syntax trees, tracking controllable parameters, and implementing static checks to flag dangerous function calls.

ASTPythonSecurity
0 likes · 10 min read
Detecting Python Injection Vulnerabilities with AST Analysis
Efficient Ops
Efficient Ops
Jul 2, 2017 · Operations

How to Build a Multi‑Layered Security Defense: Practical Ops Strategies

This article outlines a comprehensive, multi‑layered security framework for operations teams, covering policy design, dual‑account permission separation, grid‑based vulnerability management, topology and network safeguards, OS and database hardening, common misconceptions, and actionable principles for maintaining robust protection.

OperationsSecuritySystem Hardening
0 likes · 31 min read
How to Build a Multi‑Layered Security Defense: Practical Ops Strategies
Efficient Ops
Efficient Ops
Jun 25, 2017 · Operations

Comprehensive Guide to Modern IT Operations: Roles, Responsibilities, and Evolution

This article outlines the service‑centric principles of internet operations, details the various categories of work such as system, application, database, and security operations, and traces the evolution of operational practices from manual management to automated, platform‑driven workflows.

OperationsSecuritySystem Administration
0 likes · 19 min read
Comprehensive Guide to Modern IT Operations: Roles, Responsibilities, and Evolution
Qunar Tech Salon
Qunar Tech Salon
Jun 7, 2017 · Frontend Development

Cross‑Origin Communication Techniques: JSONP, window.name, document.domain, CORS, postMessage, and WebSocket with Code Samples

This article demonstrates several cross‑origin communication methods—including JSONP, window.name, document.domain, CORS, postMessage, and WebSocket—by providing step‑by‑step code examples, host file configuration, and instructions for testing each technique in a local environment development.

CORSCross-OriginJSONP
0 likes · 12 min read
Cross‑Origin Communication Techniques: JSONP, window.name, document.domain, CORS, postMessage, and WebSocket with Code Samples
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
May 28, 2017 · Artificial Intelligence

This Week’s Tech Highlights: AlphaGo’s Farewell, AI Advances & Git Security

The weekly roundup covers AlphaGo’s retirement and release of self‑play games, Tencent’s surge as Asia’s top startup investor, Microsoft’s migration of Windows code to Git, WeChat mini‑program enhancements, Alibaba’s retail partnership, AI insights from Siri’s co‑founder and Facebook’s new NMT model, Xamarin Live Player’s impact, and Git 2.13 security improvements.

Securitymachine learningsoftware development
0 likes · 10 min read
This Week’s Tech Highlights: AlphaGo’s Farewell, AI Advances & Git Security
Efficient Ops
Efficient Ops
May 23, 2017 · Information Security

What’s New in Jumpserver? A Deep Dive into the Latest Open‑Source Bastion Host

This article introduces Jumpserver, an open‑source bastion host built with Python and Django, and details its major new version updates—including a full code refactor, component separation, Docker support, internationalization, RESTful APIs, and enhanced UI—highlighting how these changes improve security, extensibility, and deployment flexibility for enterprises.

Bastion HostDjangoDocker
0 likes · 7 min read
What’s New in Jumpserver? A Deep Dive into the Latest Open‑Source Bastion Host
MaGe Linux Operations
MaGe Linux Operations
May 18, 2017 · Operations

Why Linux Really Boosts Programmer Productivity Beyond the Hype

While many claim Linux automatically makes developers more efficient, this article explains that true excellence comes from attitude and deep thinking, and outlines Linux’s concrete benefits such as open‑source nature, multi‑user support, stability, security features like SELinux, and performance advantages that together empower programmers.

Operating SystemSecuritySystem Administration
0 likes · 5 min read
Why Linux Really Boosts Programmer Productivity Beyond the Hype