Tagged articles
2149 articles
Page 22 of 22
21CTO
21CTO
Dec 14, 2015 · Databases

MongoDB Master Russell Smith’s Essential Best‑Practice Checklist

This article compiles Russell Smith’s comprehensive MongoDB best‑practice guide, covering architecture choices, file limits, write safety, schema design, replication, sharding, security, and performance tuning to help engineers avoid common pitfalls and optimize production deployments.

MongoDBReplicationSecurity
0 likes · 16 min read
MongoDB Master Russell Smith’s Essential Best‑Practice Checklist
ITPUB
ITPUB
Dec 10, 2015 · Information Security

How Browsers and Servers Negotiate TLS Cipher Suites: A Deep Dive

This article explains the step‑by‑step process of TLS cipher suite negotiation between browsers and servers, covering browser‑side cipher listing, server‑side configuration, the meaning of cipher names, and how the final suite is selected, with practical Wireshark and PowerShell examples.

Cipher SuiteHTTPSPowerShell
0 likes · 9 min read
How Browsers and Servers Negotiate TLS Cipher Suites: A Deep Dive
dbaplus Community
dbaplus Community
Dec 4, 2015 · Big Data

Big Data Insights from the 2015 Internet+ Summit: Advertising, Finance & Security

The article compiles detailed notes from the 2015 Internet+ Big Data Summit, highlighting how data monetization reshapes advertising, drives financial analytics, improves operational efficiency, and strengthens security, while presenting real‑world case studies, models, and practical recommendations from industry experts.

AdvertisingData GovernanceData Monetization
0 likes · 17 min read
Big Data Insights from the 2015 Internet+ Summit: Advertising, Finance & Security
21CTO
21CTO
Nov 22, 2015 · Backend Development

Boost Your PHP Projects with 30 Essential Best Practices

Learn a comprehensive set of 30 practical PHP best‑practice tips covering file inclusion, path handling, debugging, output buffering, security, performance, database interactions, session management, and code organization to improve maintainability, efficiency, and reliability of your backend applications.

Backend DevelopmentPHPSecurity
0 likes · 26 min read
Boost Your PHP Projects with 30 Essential Best Practices
Efficient Ops
Efficient Ops
Nov 11, 2015 · Information Security

Why Redis Unauthorized Access Is a Critical Threat and How to Fix It

This article explains a high‑severity Redis unauthorized‑access vulnerability that can let attackers write SSH keys to the host, highlights the risk of exposing Redis to the Internet without authentication, and provides guidance on remediation and network protection.

Network ExposureSecurityVulnerability
0 likes · 4 min read
Why Redis Unauthorized Access Is a Critical Threat and How to Fix It
Architect
Architect
Nov 8, 2015 · Backend Development

Design Considerations for a Short URL Service

Designing a short URL service involves choosing appropriate key‑value storage, simple incremental or base‑36 encoding for keys, estimating data capacity and sharding strategies, handling concurrent reads/writes with thread‑safe structures or Redis, selecting network event loops, and addressing security concerns such as abuse prevention.

BackendSecuritySystem Design
0 likes · 6 min read
Design Considerations for a Short URL Service
21CTO
21CTO
Nov 4, 2015 · Information Security

Master PHP Encryption: From MD5 to OpenSSL Asymmetric Techniques

This article explains PHP's various encryption methods, covering one-way hash functions like MD5 and SHA1, symmetric algorithms, the rarely used crypt() function, and detailed implementations of asymmetric encryption with OpenSSL, including key generation, encryption, decryption, and practical code examples.

HashOpenSSLPHP
0 likes · 15 min read
Master PHP Encryption: From MD5 to OpenSSL Asymmetric Techniques
Java High-Performance Architecture
Java High-Performance Architecture
Oct 29, 2015 · Information Security

How OAuth2 Secures Third‑Party Access: A Complete Guide

OAuth2 provides a secure, open standard that lets third‑party applications obtain limited user access without exposing passwords, using a token‑based flow involving resource owners, clients, resource servers, and authorization servers, illustrated through a step‑by‑step authorization process.

APIAuthorizationOAuth2
0 likes · 4 min read
How OAuth2 Secures Third‑Party Access: A Complete Guide
Suning Design
Suning Design
Oct 12, 2015 · Product Management

15 Ways to Manage Unexpected Requirement Changes

This article outlines fifteen common hidden requirement types—from detail tweaks and cross‑platform adaptations to scalability, security, and content‑operation needs—and offers practical strategies for developers and product teams to anticipate, design for flexibility, and reduce costly changes during development.

ScalabilitySecurityproduct operations
0 likes · 12 min read
15 Ways to Manage Unexpected Requirement Changes
21CTO
21CTO
Oct 11, 2015 · Information Security

How Single Sign-On (SSO) Works: Storing and Validating Trust

This article explains the concept of Single Sign-On (SSO), why it’s essential for large websites, outlines the core challenges of storing and validating trust, compares client‑side cookie approaches with server‑side solutions, and discusses practical techniques such as encrypted cookies, digital signatures, distributed caches, and whitelist‑based trust management.

SSOSecurity
0 likes · 5 min read
How Single Sign-On (SSO) Works: Storing and Validating Trust
Tencent TDS Service
Tencent TDS Service
Sep 10, 2015 · Mobile Development

Master iOS 9: Secure Your App with ATS and Shrink It with App Thinning

This article explains iOS 9's App Transport Security and App Thinning features, detailing how to configure ATS, use nscurl for diagnostics, and apply App Thinning mechanisms such as Slicing, On‑Demand Resources, and Bitcode to improve security and reduce app size.

App ThinningApp Transport SecuritySecurity
0 likes · 9 min read
Master iOS 9: Secure Your App with ATS and Shrink It with App Thinning
21CTO
21CTO
Aug 29, 2015 · Fundamentals

30 Years of Programming: 16 Hard‑Earned Lessons Every Developer Should Know

Drawing on three decades of software development, this article shares sixteen practical lessons about client interaction, security, code simplicity, continuous learning, and evaluation that can help programmers and teams make better decisions and avoid common pitfalls.

Securitybest practicescareer advice
0 likes · 10 min read
30 Years of Programming: 16 Hard‑Earned Lessons Every Developer Should Know
ITPUB
ITPUB
Aug 12, 2015 · Operations

Master Splunk: Install, Configure, and Search Logs on Linux and Windows

This guide walks you through installing Splunk on Linux or Windows, configuring automatic startup, indexing diverse log sources, and using Splunk’s powerful search, Boolean operators, and timeline features to troubleshoot and analyze system and network logs efficiently.

InstallationOperationsSearch
0 likes · 15 min read
Master Splunk: Install, Configure, and Search Logs on Linux and Windows
21CTO
21CTO
Aug 10, 2015 · Backend Development

Designing Practical RESTful APIs: Best Practices for Real‑World Apps

This article presents practical guidelines for designing, versioning, securing, and documenting RESTful APIs, covering resource modeling, URL conventions, filtering, sorting, pagination, authentication, rate limiting, error handling, and response formats to help developers build flexible and user‑friendly public APIs.

BackendHTTPRESTful API
0 likes · 22 min read
Designing Practical RESTful APIs: Best Practices for Real‑World Apps
21CTO
21CTO
Aug 8, 2015 · Backend Development

9 Essential PHP Practices Every Developer Should Master

This article shares nine practical PHP tips—from security fundamentals like input filtering and output escaping, to efficient coding tricks such as using ternary operators, caching, and modern frameworks—aimed at helping developers write safer, cleaner, and faster backend code.

BackendSecuritybest practices
0 likes · 7 min read
9 Essential PHP Practices Every Developer Should Master
High Availability Architecture
High Availability Architecture
Aug 8, 2015 · Information Security

Managing HTTPS Certificates When Using Third‑Party CDN Services

The article explains how HTTPS works, why traditional CDN architectures based on CNAME aliases can conflict with HTTPS certificate validation, and compares two common approaches—custom certificates and shared certificates—highlighting their security implications and performance considerations for web operators.

CDNHTTPSSecurity
0 likes · 6 min read
Managing HTTPS Certificates When Using Third‑Party CDN Services
MaGe Linux Operations
MaGe Linux Operations
Jul 30, 2015 · Cloud Native

Essential Docker Tips for Developers: Boost Efficiency and Security

This article shares practical Docker tips covering CLI enhancements, Dockerfile best practices, networking, volume management, and security measures, helping developers who already know the basics to improve container workflows, reduce image size, and secure their Docker deployments.

CLIDevOpsDockerfile
0 likes · 11 min read
Essential Docker Tips for Developers: Boost Efficiency and Security
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Jul 19, 2015 · Information Security

25 Essential PHP Security Best Practices for Hardened Web Servers

This guide presents 25 practical PHP security best practices, covering configuration files, module management, error handling, file uploads, remote code execution, SQL safety, resource limits, user permissions, SELinux, firewall rules, and additional tools, to help administrators harden PHP deployments on Linux servers.

BackendLinuxPHP
0 likes · 27 min read
25 Essential PHP Security Best Practices for Hardened Web Servers
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

Securitybcryptcryptography
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.
Java High-Performance Architecture
Java High-Performance Architecture
Jun 5, 2015 · Frontend Development

Why Static Pages Boost Speed, SEO, and Security – A Practical Guide

Static page generation dramatically improves load times, reduces server load, enhances SEO, and strengthens security by eliminating dynamic processing and database queries, while allowing flexible strategies such as full-page or partial static rendering for high‑traffic pages like homepages and detail pages with dynamic comments.

SEOSecurityWeb Development
0 likes · 2 min read
Why Static Pages Boost Speed, SEO, and Security – A Practical Guide
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 30, 2015 · Cloud Computing

Top Technology Trends of the Year: Cloud, Containers, Microservices, DevOps, and More

The article surveys this year's hottest technology trends—including the rise of public cloud, containerization, microservices, multi‑cloud management, endpoint security, machine learning, and the resurgence of DevOps—explaining why they are reshaping enterprise IT and why open source is the common driver behind them.

ContainersMicroservicesSecurity
0 likes · 10 min read
Top Technology Trends of the Year: Cloud, Containers, Microservices, DevOps, and More
MaGe Linux Operations
MaGe Linux Operations
May 12, 2015 · Information Security

Master ZMap: Fast Network Scanning, Installation, Commands, and Advanced Uses

ZMap is a high‑speed network scanner developed at the University of Michigan, and this guide covers its installation on various Linux distributions, core command‑line options, configuration files, advanced extensions like banner grabbing and UDP probes, and discusses its underlying SYN‑RST scanning mechanism and security considerations.

LinuxNetwork ScanningSecurity
0 likes · 16 min read
Master ZMap: Fast Network Scanning, Installation, Commands, and Advanced Uses
Qunar Tech Salon
Qunar Tech Salon
Mar 25, 2015 · Operations

13 Common Production Pitfalls Developers and Architects Should Avoid

The article outlines thirteen critical production‑related mistakes—from not externalizing configuration and using inadequate test data to neglecting security, documentation, disaster‑recovery planning, and proper capacity planning—providing actionable guidance for developers and architects to improve system stability and performance.

SecuritySoftware Architecturebest practices
0 likes · 8 min read
13 Common Production Pitfalls Developers and Architects Should Avoid
ITPUB
ITPUB
Mar 19, 2015 · Databases

How 360 Secures Massive Data with Custom NoSQL and Open‑Source Backend

In an in‑depth interview, 360’s web platform architect Wang Chao explains the open‑source and proprietary database technologies, multi‑data‑center NoSQL system Bada, and layered security mechanisms that power 360’s search, cloud storage and other high‑traffic services.

NoSQLSecuritydatabases
0 likes · 11 min read
How 360 Secures Massive Data with Custom NoSQL and Open‑Source Backend
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Mar 14, 2015 · Cloud Computing

Hybrid Cloud Architecture and Scalability Analysis of China’s 12306 Railway Ticketing System

The article examines the technical challenges of the 12306 railway ticketing platform, comparing it with e‑commerce systems, and proposes a hybrid‑cloud solution that leverages private and public cloud resources to handle massive, unpredictable traffic while ensuring security, high availability, and elastic scalability.

Securityhigh concurrencyhybrid cloud
0 likes · 16 min read
Hybrid Cloud Architecture and Scalability Analysis of China’s 12306 Railway Ticketing System
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Mar 11, 2015 · Backend Development

Understanding Reverse Proxy: Purposes, Deployment Strategies, and Performance Considerations

This article explains what reverse proxy is, compares it with forward proxy, outlines its security, load‑balancing, caching, and concurrency‑control benefits, and discusses various deployment approaches including one‑to‑one setups, separate servers, and clustered architectures for large‑scale web applications.

DeploymentSecuritycaching
0 likes · 13 min read
Understanding Reverse Proxy: Purposes, Deployment Strategies, and Performance Considerations
Nightwalker Tech
Nightwalker Tech
Jan 4, 2015 · Backend Development

Design and Pitfalls of Internet App Long‑Connection Push Systems and Related Backend Practices

This article surveys the architecture of long‑connection push systems for internet apps, distinguishes connection types, outlines client and server handling strategies, reviews mainstream backend solutions, and shares practical insights on security, API design, operations, queue services, debugging, and NoSQL usage.

Backend ArchitectureDebuggingMessage Queue
0 likes · 32 min read
Design and Pitfalls of Internet App Long‑Connection Push Systems and Related Backend Practices
Baidu Tech Salon
Baidu Tech Salon
Oct 17, 2014 · Information Security

How to Hook and Hide JavaScript APIs to Thwart XSS Attacks

This article explores practical techniques for intercepting and protecting JavaScript APIs—such as setAttribute—using MutationObserver, API hooks, random token naming, property hiding, and recursive iframe monitoring to build a resilient front‑end defense against XSS and other injection attacks.

API interceptionHookJavaScript
0 likes · 14 min read
How to Hook and Hide JavaScript APIs to Thwart XSS Attacks
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2014 · Information Security

Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup

This tutorial explains how to protect SSH logins by installing Google Authenticator, generating a secret key, configuring PAM and sshd, and using an Android device to provide time‑based one‑time passwords, complete with installation commands, troubleshooting tips, and verification steps.

Google AuthenticatorLinuxSSH
0 likes · 8 min read
Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup
MaGe Linux Operations
MaGe Linux Operations
Aug 30, 2014 · Operations

How CDN Architecture Boosts Performance, Security, and Cost Efficiency

This article explains how leveraging CDN technology—through caching proxies, routing acceleration, security protection, and cost‑saving strategies—can overcome regional network limitations, mitigate DDoS attacks, and optimize storage and load‑balancing, while also comparing open‑source reverse‑proxy solutions and offering practical hardware and software tuning tips.

CDNSecurityload balancing
0 likes · 14 min read
How CDN Architecture Boosts Performance, Security, and Cost Efficiency
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2014 · Information Security

Essential Linux Commands for Incident Response and System Forensics

This guide presents a comprehensive set of Linux commands and practical steps for detecting, analyzing, and responding to compromised systems, covering process identification, file inspection, network checks, log recovery, forensic imaging, and useful tools such as ldd, strace, and nc.

ForensicsLinuxSecurity
0 likes · 13 min read
Essential Linux Commands for Incident Response and System Forensics
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2014 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This guide lists 25 practical Linux hardening techniques—from BIOS protection and partitioning to SSH configuration, SELinux, firewall rules, password policies, and log management—helping system administrators strengthen server security against attacks and vulnerabilities.

HardeningLinuxSecurity
0 likes · 15 min read
25 Essential Linux Hardening Tips to Secure Your Servers
MaGe Linux Operations
MaGe Linux Operations
Jul 8, 2014 · Information Security

Top 9 Essential Linux Security Practices Every Admin Should Implement

Securing Linux systems requires more than a single anti‑malware tool; this guide outlines nine practical measures—including SELinux, vulnerability alerts, service hardening, log monitoring, port knocking, iptables, default‑deny policies, IDS, and full‑disk encryption—to strengthen system defenses against attacks.

IDSLinuxPort Knocking
0 likes · 6 min read
Top 9 Essential Linux Security Practices Every Admin Should Implement
MaGe Linux Operations
MaGe Linux Operations
Jul 1, 2014 · Operations

11 Essential DevOps Insights Every IT Professional Should Know

This comprehensive guide, originally a white‑paper by Gene Kim, explains what DevOps is, how it differs from Agile, ITIL and visible ops, outlines its core principles, application domains, business value, and practical patterns for integrating security, QA, and continuous delivery into modern IT workflows.

Continuous DeliverySecurityagile
0 likes · 22 min read
11 Essential DevOps Insights Every IT Professional Should Know