Tagged articles
2149 articles
Page 4 of 22
Ops Community
Ops Community
Nov 8, 2025 · Operations

Mastering Nginx Reverse Proxy & Load Balancing: Best Practices for High‑Performance Deployments

This comprehensive guide walks you through Nginx reverse proxy and load balancing fundamentals, key features, suitable scenarios, environment prerequisites, step‑by‑step installation, core configuration, performance tuning, security hardening, high‑availability designs, troubleshooting, monitoring, backup strategies, real‑world case studies, and advanced learning paths for production‑grade deployments.

Performance OptimizationSecurityhigh availability
0 likes · 56 min read
Mastering Nginx Reverse Proxy & Load Balancing: Best Practices for High‑Performance Deployments
Tencent Technical Engineering
Tencent Technical Engineering
Nov 7, 2025 · Information Security

How AI Multi‑Agent Systems Are Revolutionizing Code Security Audits

This article explores how Wukong's AI‑driven multi‑agent architecture dramatically improves code security auditing by addressing context loss, scheduling imbalances, and integrating a data‑flywheel that turns bad cases into continuous model improvements, illustrated by a real NVIDIA Megatron‑LM vulnerability fix.

AICode AuditingMulti-Agent
0 likes · 14 min read
How AI Multi‑Agent Systems Are Revolutionizing Code Security Audits
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Nov 5, 2025 · Backend Development

Complete Easysearch.yml Field Guide and Security Configuration Walkthrough

This article answers a WeChat query by providing the official documentation link, demonstrating how to disable HTTP TLS, testing TCP TLS, and offering a line‑by‑line walkthrough of easysearch.yml’s core settings—including cluster basics, security options, TLS certificates, password policies, and critical risk warnings for production deployments.

ClusterEasysearchElasticsearch
0 likes · 8 min read
Complete Easysearch.yml Field Guide and Security Configuration Walkthrough
Java Web Project
Java Web Project
Nov 5, 2025 · Backend Development

When "null" Is Just a String: Hidden Bugs and How to Prevent Them

The article explains how treating the literal string "null" as a valid username can cause user‑experience glitches, log‑analysis confusion, database contamination, security risks, and script failures, and provides step‑by‑step validation, front‑end checks, database constraints, and logging strategies to avoid these hidden bugs.

Backend DevelopmentSecuritydatabase integrity
0 likes · 5 min read
When "null" Is Just a String: Hidden Bugs and How to Prevent Them
Xiao Liu Lab
Xiao Liu Lab
Nov 4, 2025 · Information Security

7 Essential Redis Security Baselines to Harden Your Production Deployments

This guide details seven critical Redis hardening steps—including timeout, syslog, strong password, non‑root execution, strict file permissions, trusted bind addresses, and command renaming—to transform insecure default settings into a verifiable, production‑ready security baseline.

ConfigurationHardeningLinux
0 likes · 13 min read
7 Essential Redis Security Baselines to Harden Your Production Deployments
Xiao Liu Lab
Xiao Liu Lab
Nov 3, 2025 · Information Security

13 Essential Tomcat Security Baselines to Harden Your Server

Learn how to secure Apache Tomcat by applying a 13‑item baseline that covers account permissions, root‑less operation, strong passwords, disabling manager apps, preventing directory listing, restricting HTTP methods, enabling HTTPS, changing default ports, configuring access logs, custom error pages, hiding server banners, and limiting connections.

HardeningJavaSecurity
0 likes · 12 min read
13 Essential Tomcat Security Baselines to Harden Your Server
Ops Community
Ops Community
Nov 3, 2025 · Information Security

Why Wireshark Is Essential for Network Security Professionals

Wireshark, the open‑source packet analyzer formerly known as Ethereal, captures live network traffic on Windows and UNIX systems and is widely used for network management, security analysis, troubleshooting, and especially penetration testing, offering capabilities such as data capture, unencrypted information detection, attack behavior analysis, vulnerability discovery, and real‑time monitoring.

Packet CaptureSecurityWireshark
0 likes · 2 min read
Why Wireshark Is Essential for Network Security Professionals
MaGe Linux Operations
MaGe Linux Operations
Nov 3, 2025 · Operations

Master Git Ops: From Zero to Production-Ready IaC Version Control

This comprehensive guide walks you through Git operations for infrastructure-as-code, covering installation, SSH key setup, repository structuring, branching strategies, sensitive data handling, automation with hooks, backup, audit, monitoring, performance tuning, and security best practices for production environments.

AutomationBackupGit
0 likes · 31 min read
Master Git Ops: From Zero to Production-Ready IaC Version Control
Deepin Linux
Deepin Linux
Nov 1, 2025 · Fundamentals

Master Linux System Call Hooking: Theory, Security & Performance Tricks

This article explores Linux system call hooking by first reviewing syscall fundamentals, then detailing various Hook techniques—including function pointer replacement, LD_PRELOAD, and kernel modules—accompanied by C/C++ examples, and demonstrates practical applications in security monitoring, performance optimization, and debugging across real-world scenarios.

DebuggingHookLinux
0 likes · 29 min read
Master Linux System Call Hooking: Theory, Security & Performance Tricks
Open Source Linux
Open Source Linux
Nov 1, 2025 · Operations

Top 32 SSH Interview Questions Every Linux Cloud Engineer Must Master

This comprehensive guide covers 32 high‑frequency SSH interview questions, from basic concepts and key management to advanced tunneling, performance tuning, and enterprise‑level security practices, providing detailed answers, best‑practice configurations, and code examples for Linux cloud environments.

LinuxSSHSecurity
0 likes · 42 min read
Top 32 SSH Interview Questions Every Linux Cloud Engineer Must Master
Ray's Galactic Tech
Ray's Galactic Tech
Oct 31, 2025 · Operations

Master Linux DNS: Deep Dive into Mechanics and Best Practices

Linux DNS goes far beyond simple name‑to‑IP translation, involving hierarchical resolution, caching, and modern components like systemd‑resolved; this guide explains core concepts, the full lookup process, essential configuration files, and practical best‑practice steps such as reliable resolvers, cache management, DNSSEC, encrypted transport, and diagnostic tools.

DNSLinuxNetworking
0 likes · 9 min read
Master Linux DNS: Deep Dive into Mechanics and Best Practices
Xiao Liu Lab
Xiao Liu Lab
Oct 30, 2025 · Information Security

Essential Linux Security Baseline for Tier‑3 Compliance: Step‑by‑Step Guide

This article provides a comprehensive, step‑by‑step Linux security baseline for Tier‑3 compliance, covering password policies, login controls, access restrictions, audit logging, intrusion prevention, patch management, and resource limits, complete with executable commands for major distributions.

LinuxPassword policySecurity
0 likes · 9 min read
Essential Linux Security Baseline for Tier‑3 Compliance: Step‑by‑Step Guide
WeiLi Technology Team
WeiLi Technology Team
Oct 30, 2025 · Mobile Development

How to Build a Secure Android Payment SDK from Scratch

This article walks through the complete process of designing and implementing a secure, stable, and easy‑to‑use Android third‑party payment SDK, covering project background, technical challenges, layered architecture, core components, security mechanisms, memory management, UI design, performance optimizations, testing strategies, monitoring, and future roadmap.

AndroidKotlinSecurity
0 likes · 34 min read
How to Build a Secure Android Payment SDK from Scratch
Ops Development & AI Practice
Ops Development & AI Practice
Oct 29, 2025 · Information Security

Why AssumeRole Beats GetSessionToken: Deep Dive into AWS IAM Security

The article explains the fundamental security differences between AWS GetSessionToken and AssumeRole, illustrating how AssumeRole shifts from a holder‑to‑borrower model, enables privilege de‑escalation, separation of duties, fine‑grained audit, and discusses the challenges of enumerating assumable roles and strengthening trust policies with MFA, IP and time constraints.

AWSAssumeRoleIAM
0 likes · 9 min read
Why AssumeRole Beats GetSessionToken: Deep Dive into AWS IAM Security
Huolala Tech
Huolala Tech
Oct 29, 2025 · Artificial Intelligence

AI Audio Watermarking: Techniques, Metrics, and Real-World Implementations

With the rapid rise of generative AI audio models, this article explores the fundamentals, key metrics, and the “impossible triangle” of imperceptibility, robustness, and capacity in audio watermarking, and presents practical implementations such as SynthID and AudioSeal that embed and detect invisible watermarks for secure AIGC provenance.

AIGCRobustnessSecurity
0 likes · 14 min read
AI Audio Watermarking: Techniques, Metrics, and Real-World Implementations
ITPUB
ITPUB
Oct 28, 2025 · Operations

50 Powerful IT Ops Projects to Supercharge Your Resume

This article compiles 50 detailed IT operations projects across infrastructure, cloud, containers, automation, monitoring, security, databases, networking, disaster recovery and DevOps, each with scenario, tech stack, implementation steps and quantifiable results to help you craft standout résumé entries.

AutomationIT OperationsInfrastructure
0 likes · 30 min read
50 Powerful IT Ops Projects to Supercharge Your Resume
Open Source Tech Hub
Open Source Tech Hub
Oct 23, 2025 · Information Security

How to Embed and Extract Blind Watermarks in Images with Python

This guide explains the concept of blind watermarking for image copyright protection, shows how to install the blind-watermark Python package, and provides step‑by‑step code examples for embedding and extracting both text and image watermarks while preserving the original visual appearance.

PythonSecurityTutorial
0 likes · 4 min read
How to Embed and Extract Blind Watermarks in Images with Python
IT Architects Alliance
IT Architects Alliance
Oct 22, 2025 · Cloud Native

Avoid the Top 5 Cloud Migration Mistakes: Proven Cloud‑Native Strategies

This article analyzes the five most common cloud‑migration pitfalls—lift‑and‑shift, network latency, incomplete data‑architecture transformation, weak security models, and poor observability—offering concrete cloud‑native solutions, migration matrices, code examples, and best‑practice guidelines for successful architectural evolution.

Cloud NativeDevOpsObservability
0 likes · 12 min read
Avoid the Top 5 Cloud Migration Mistakes: Proven Cloud‑Native Strategies
Python Programming Learning Circle
Python Programming Learning Circle
Oct 18, 2025 · Information Security

Master Nginx Rate Limiting & Anti‑Crawler: Complete Guide with Token Bucket, GeoIP, Lua & JS Challenges

This comprehensive guide explains why modern web services need rate limiting and anti‑crawler protection, compares token‑bucket and leaky‑bucket algorithms, and provides step‑by‑step Nginx configurations for IP, URI, and geographic throttling, advanced user‑agent filtering, JavaScript challenges, real‑time monitoring, performance tuning, and troubleshooting.

NginxSecurityanti‑crawler
0 likes · 18 min read
Master Nginx Rate Limiting & Anti‑Crawler: Complete Guide with Token Bucket, GeoIP, Lua & JS Challenges
Open Source Linux
Open Source Linux
Oct 18, 2025 · Operations

Boost Nginx QPS by 500%: Core Configuration Secrets for Enterprise Performance

This guide details enterprise‑grade Nginx optimization techniques, covering worker process tuning, event model settings, network and buffer adjustments, compression, SSL/TLS hardening, load balancing, caching strategies, monitoring, system‑level tweaks, and troubleshooting steps to dramatically increase request throughput and stability.

NginxSecurityload balancing
0 likes · 12 min read
Boost Nginx QPS by 500%: Core Configuration Secrets for Enterprise Performance
Architecture Digest
Architecture Digest
Oct 14, 2025 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article explores the challenges of fuzzy searching encrypted data, categorizes three implementation approaches—naïve, conventional, and advanced—examines their trade‑offs, provides practical examples and performance calculations, and offers recommendations for secure and efficient query solutions.

Securitydatabaseencryption
0 likes · 10 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Lin is Dream
Lin is Dream
Oct 14, 2025 · Backend Development

Designing a Scalable Short‑Link System: From Base62 Encoding to Security

This article explains how to build a production‑grade short‑link service, covering the background of SMS short URLs, Base62 encoding principles, database schema design, request routing, security measures such as custom alphabets, rate limiting, and signed links, and additional management features for operation and monitoring.

Backend ArchitectureDatabase designSecurity
0 likes · 16 min read
Designing a Scalable Short‑Link System: From Base62 Encoding to Security
Raymond Ops
Raymond Ops
Oct 13, 2025 · Information Security

How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide

This comprehensive guide explains how to harden an Ubuntu‑based Kubernetes cluster with external IPs by applying system hardening, firewall rules, TLS encryption, Calico network policies, RBAC permissions, audit logging, and verification steps to achieve a multi‑layered security posture.

HardeningKubernetesRBAC
0 likes · 17 min read
How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 13, 2025 · Backend Development

Master Spring Boot Logging: 12 Practical Guidelines for High‑Performance Apps

This article presents twelve concrete guidelines and code examples for configuring Spring Boot 3 logging—covering readability, level selection, structured JSON output, asynchronous handling, sensitive data masking, and log rotation—to help developers build observable, maintainable, and high‑performance backend services.

SecuritySpring Bootlogging
0 likes · 12 min read
Master Spring Boot Logging: 12 Practical Guidelines for High‑Performance Apps
Ray's Galactic Tech
Ray's Galactic Tech
Oct 12, 2025 · Cloud Native

Master Production‑Grade Kubernetes YAML: 10+ Security & Performance Checks

This guide presents a comprehensive, production‑ready Kubernetes YAML checklist covering over ten essential security, stability, observability, and scalability validation points, plus eight advanced best‑practice recommendations, enabling teams to create robust, maintainable, and automated configuration pipelines.

Cloud NativeKubernetesSecurity
0 likes · 12 min read
Master Production‑Grade Kubernetes YAML: 10+ Security & Performance Checks
IT Architects Alliance
IT Architects Alliance
Oct 10, 2025 · Information Security

How to Secure Distributed Permissions: Zero Trust Strategies & Code

This article examines the exponential growth of permission complexity in micro‑service architectures, outlines zero‑trust design principles, and provides concrete Java and YAML implementations for fine‑grained, context‑aware access control, caching, dynamic evaluation, and audit monitoring.

Distributed SystemsSecurityZero Trust
0 likes · 11 min read
How to Secure Distributed Permissions: Zero Trust Strategies & Code
Data Party THU
Data Party THU
Oct 9, 2025 · Information Security

How to Secure MCP Tools: Risks, Real‑World Cases, and the Open‑Source MCPScan Framework

The article analyzes the security challenges introduced by the open Model Context Protocol (MCP) ecosystem, outlines typical attack vectors such as command‑execution hijacking and indirect prompt injection, and presents MCPScan—an open‑source scanner that combines static taint analysis with LLM‑driven reasoning to detect exploitable tool chains before deployment.

LLMMCPOpen-source
0 likes · 7 min read
How to Secure MCP Tools: Risks, Real‑World Cases, and the Open‑Source MCPScan Framework
Linux Code Review Hub
Linux Code Review Hub
Oct 9, 2025 · Fundamentals

Multikernel Architecture: Redefining Modern Operating Systems (Part 1)

The article introduces the multikernel operating‑system paradigm, explains how traditional monolithic and microkernel designs struggle with scalability, noisy‑neighbor interference, and one‑size‑fits‑all kernels, and details the multikernel’s performance, isolation, customization, zero‑downtime updates, elastic resource management, and security benefits for cloud and real‑time workloads.

Elastic Resource ManagementKernel IsolationMultikernel
0 likes · 12 min read
Multikernel Architecture: Redefining Modern Operating Systems (Part 1)
Open Source Tech Hub
Open Source Tech Hub
Oct 9, 2025 · Information Security

How Dynamic Method Calls Can Cripple Your PHP App—and Simple Fixes

This article explains the security hazards of invoking PHP methods directly from user input, illustrates real‑world exploits such as accidental deletions and exposure of debug functions, and provides a concrete allow‑list mapping solution with code examples and best‑practice tips.

Securityallowlistdynamic-method-call
0 likes · 6 min read
How Dynamic Method Calls Can Cripple Your PHP App—and Simple Fixes
Liangxu Linux
Liangxu Linux
Oct 8, 2025 · Information Security

How to Detect and Respond to Server Intrusions: A Complete 24‑Hour Playbook

This guide walks operations engineers through recognizing intrusion signals, executing a step‑by‑step 24‑hour emergency response, performing digital forensics, cleaning the system, hardening security settings, and establishing continuous monitoring to prevent future attacks.

AutomationForensicsSecurity
0 likes · 15 min read
How to Detect and Respond to Server Intrusions: A Complete 24‑Hour Playbook
JavaScript
JavaScript
Oct 6, 2025 · Frontend Development

Why Timestamp+Random Fails and How to Generate Truly Unique IDs in JavaScript

Generating unique IDs may seem trivial, but common approaches like combining Date.now() with Math.random() or using a simple counter suffer from timestamp precision limits and non‑cryptographic randomness, whereas the modern, standards‑based crypto.randomUUID() provides collision‑free, cryptographically secure identifiers across browsers and Node.js.

JavaScriptSecurityUnique ID
0 likes · 4 min read
Why Timestamp+Random Fails and How to Generate Truly Unique IDs in JavaScript
IT Services Circle
IT Services Circle
Oct 6, 2025 · Backend Development

Mastering Backend Development: A Complete Modern Server Guide

This guide covers essential backend development topics—including core responsibilities, HTTP basics, routing, serialization, authentication, middleware, request handling, CRUD, REST best practices, databases, caching, email, task queues, Elasticsearch, error handling, configuration, observability, graceful shutdown, security, performance, concurrency, object storage, real‑time systems, testing, the 12‑factor app, OpenAPI, and DevOps—offering practical insights for building robust, scalable server‑side applications.

APIBackendDevOps
0 likes · 69 min read
Mastering Backend Development: A Complete Modern Server Guide
MaGe Linux Operations
MaGe Linux Operations
Oct 6, 2025 · Operations

Avoid the Fatal Ops Mistakes That Could Ruin Your Career – 10 Critical Pitfalls and How to Prevent Them

Drawing on real-world incidents and Gartner 2023 data, this article reveals ten deadly operational pitfalls—from executing untested commands in production to inadequate backups—and offers concrete technical safeguards, process controls, and cultural practices to help engineers avoid costly errors and protect their careers.

AutomationBackupOperations
0 likes · 27 min read
Avoid the Fatal Ops Mistakes That Could Ruin Your Career – 10 Critical Pitfalls and How to Prevent Them
dbaplus Community
dbaplus Community
Oct 5, 2025 · Cloud Native

Binary Deployment vs kubeadm: Which Kubernetes Setup Fits Your Enterprise?

This article compares manual binary deployment and kubeadm‑based installation of Kubernetes, covering core architectural differences, high‑availability designs, upgrade procedures, security models, enterprise scenario‑driven selection criteria, practical implementation steps, and concluding recommendations for choosing the most suitable approach.

EnterpriseKubernetesSecurity
0 likes · 14 min read
Binary Deployment vs kubeadm: Which Kubernetes Setup Fits Your Enterprise?
IT Architects Alliance
IT Architects Alliance
Oct 4, 2025 · Information Security

How Zero Trust and Service Mesh Secure Modern Microservices

This article examines the rising security risks in microservice architectures, explains why traditional perimeter defenses fall short, and presents a comprehensive zero‑trust strategy that combines service‑mesh mTLS, API‑gateway hardening, token‑exchange authentication, OPA policies, data‑level encryption, observability, and container‑level safeguards.

AuthenticationMicroservicesSecurity
0 likes · 11 min read
How Zero Trust and Service Mesh Secure Modern Microservices
Open Source Linux
Open Source Linux
Oct 4, 2025 · Operations

Beyond 35: How Ops Professionals Can Thrive in Cloud Native & DevOps

After 35, operations engineers can still advance by mastering cloud-native technologies, DevOps automation, security operations, ITIL service management, or transitioning into leadership roles, with practical advice on skill development, market trends, and real-world examples illustrating diverse career paths.

Career DevelopmentCloud NativeITIL
0 likes · 9 min read
Beyond 35: How Ops Professionals Can Thrive in Cloud Native & DevOps
IT Services Circle
IT Services Circle
Oct 3, 2025 · Fundamentals

Master Network Fundamentals: From TCP/IP Layers to SYN Flood Defense

This article combines a post‑holiday job‑hunting update for Kingsoft WPS with a comprehensive interview guide covering OSI and TCP/IP models, HTTP connection handling, TCP three‑way handshake, SYN‑flood mitigation, Redis Bloom filters, CAP theorem, and I/O multiplexing techniques such as epoll.

BackendSecurityTCP/IP
0 likes · 30 min read
Master Network Fundamentals: From TCP/IP Layers to SYN Flood Defense
IT Architects Alliance
IT Architects Alliance
Oct 2, 2025 · Cloud Native

Mastering Cloud‑Native Architecture: 6 Core Principles Every Engineer Should Know

This article outlines six fundamental cloud‑native architecture principles—immutable infrastructure, service mesh, observability, declarative APIs, resilient design, and shift‑left security—explaining their purpose, key practices, code examples, and how they interrelate to build scalable, reliable, and secure distributed systems.

Cloud NativeDeclarative APIObservability
0 likes · 11 min read
Mastering Cloud‑Native Architecture: 6 Core Principles Every Engineer Should Know
Ma Wei Says
Ma Wei Says
Oct 2, 2025 · Databases

Essential Redis Best Practices: Keys, Memory, Security, and Performance

This guide outlines practical Redis best‑practice rules covering key naming conventions, data‑size limits, expiration strategies, script and transaction usage, client connection handling, and security measures to help you build fast, stable, and secure production systems.

Key DesignMemory ManagementSecurity
0 likes · 9 min read
Essential Redis Best Practices: Keys, Memory, Security, and Performance
21CTO
21CTO
Oct 2, 2025 · Artificial Intelligence

Is AI Turning Developers into Code‑Dependent ‘Vibe Coders’? The Hidden Risks

The article warns that while AI coding tools boost short‑term productivity, they are eroding developers' core coding skills, increasing debugging time, introducing security vulnerabilities, and creating a feedback loop that degrades software quality and team knowledge.

AIDebuggingSecurity
0 likes · 15 min read
Is AI Turning Developers into Code‑Dependent ‘Vibe Coders’? The Hidden Risks
Ops Community
Ops Community
Sep 29, 2025 · Cloud Native

Enterprise Docker Deployment: From Zero to Production – A Complete Guide

This comprehensive guide walks through the evolution of container technology, explains Docker's core mechanisms, and presents enterprise‑grade architecture, deployment strategies, monitoring, security hardening, and real‑world case studies, helping ops engineers build efficient, scalable, and secure production‑ready Docker environments.

DockerEnterprise DeploymentSecurity
0 likes · 19 min read
Enterprise Docker Deployment: From Zero to Production – A Complete Guide
Liangxu Linux
Liangxu Linux
Sep 28, 2025 · Information Security

Hardening SSH on Linux: Practical Defenses Against Brute‑Force Attacks

This guide explains why SSH brute‑force attacks threaten Linux servers and provides a step‑by‑step hardening checklist—including changing the default port, disabling root login, using key‑based authentication, deploying automatic block tools, setting IP whitelists, and regularly analyzing logs—to dramatically improve server security.

Brute-force protectionDenyHostsFail2ban
0 likes · 5 min read
Hardening SSH on Linux: Practical Defenses Against Brute‑Force Attacks
Ops Community
Ops Community
Sep 27, 2025 · Operations

Boost Your Server Performance: Practical Nginx Tuning Guide for 10× Speed

This comprehensive guide walks operations engineers through advanced Nginx configuration and performance‑tuning techniques—including worker process settings, event model tweaks, HTTP module optimizations, caching strategies, load‑balancing, security hardening, monitoring, and testing—to dramatically improve web service throughput and stability.

NginxSecurityload balancing
0 likes · 10 min read
Boost Your Server Performance: Practical Nginx Tuning Guide for 10× Speed
ITPUB
ITPUB
Sep 27, 2025 · Information Security

Master SSH Security: Keys, Port Hiding, 2FA, Jump Hosts & Zero Trust

This guide walks through hardening SSH against massive brute‑force attacks by switching to ed25519 key authentication, disabling password logins, obscuring the default port, tightening user permissions, adding two‑factor authentication, configuring bastion hosts, setting connection limits, centralizing logs, rotating keys regularly, and adopting a zero‑trust architecture with HashiCorp Vault.

DevOpsLinuxSecurity
0 likes · 15 min read
Master SSH Security: Keys, Port Hiding, 2FA, Jump Hosts & Zero Trust
JavaScript
JavaScript
Sep 26, 2025 · Information Security

How ShadowRealm Can Safely Isolate Untrusted JavaScript in the Browser

ShadowRealm, a forthcoming ECMAScript standard now at TC39 Stage 3, lets developers create isolated JavaScript global environments without DOM overhead, offering a lightweight alternative to iframes and eval for securely executing third‑party code, with APIs like new ShadowRealm(), evaluate() and importValue().

ECMAScriptIsolationJavaScript
0 likes · 4 min read
How ShadowRealm Can Safely Isolate Untrusted JavaScript in the Browser
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 25, 2025 · Frontend Development

Electron vs Tauri: Which Cross‑Platform Desktop Framework Wins?

Electron and Tauri both enable building cross‑platform desktop apps with HTML/CSS/JavaScript, but they differ fundamentally in architecture, performance, security, resource usage, and developer experience; this article provides a detailed side‑by‑side comparison, including tables and code samples, to help you choose the right framework.

Desktop AppsElectronSecurity
0 likes · 7 min read
Electron vs Tauri: Which Cross‑Platform Desktop Framework Wins?
Open Source Linux
Open Source Linux
Sep 25, 2025 · Operations

Master NFS in 30 Minutes: Complete Deployment & Performance Guide (2025)

Learn how to design, install, configure, secure, monitor, and optimize a production‑grade NFS service—including step‑by‑step server and client setup, advanced permission controls, performance tuning, automated deployment scripts, backup strategies, and real‑world use cases—so you can reduce file‑sync time by up to 80%.

AutomationBackupLinux
0 likes · 28 min read
Master NFS in 30 Minutes: Complete Deployment & Performance Guide (2025)
MaGe Linux Operations
MaGe Linux Operations
Sep 24, 2025 · Operations

How a 3 AM MySQL Crash Taught Me Essential Ops Lessons

This article recounts a 3 AM MySQL outage, analyzes its root causes, and shares comprehensive operational strategies—including index optimization, connection‑pool tuning, slow‑query fixing, replication lag handling, monitoring metrics, automation scripts, performance tuning, security hardening, and future trends—to help DBAs prevent and resolve similar incidents.

AutomationDatabase operationsSecurity
0 likes · 15 min read
How a 3 AM MySQL Crash Taught Me Essential Ops Lessons
Tencent Tech
Tencent Tech
Sep 23, 2025 · Cloud Computing

Why Agent Infra Is the Next Evolution in Cloud Computing for AI Agents

This article explains how cloud computing has historically reduced accidental complexity, why AI agents introduce a fundamentally new software paradigm, and how Tencent Cloud's Agent Infra and Agent Runtime provide a layered, serverless, and secure infrastructure to support autonomous, uncertain, and complex AI workloads.

AIAutonomous AgentsSecurity
0 likes · 18 min read
Why Agent Infra Is the Next Evolution in Cloud Computing for AI Agents
macrozheng
macrozheng
Sep 23, 2025 · Information Security

Mastering Token Renewal: 5 Proven Strategies to Boost Security and Performance

This article examines common token‑renewal pitfalls and presents five practical solutions—including single‑token, blacklist, double‑token with triple validation, automatic renewal, and distributed‑environment techniques—while offering best‑practice guidelines to enhance security, user experience, and system scalability.

AuthenticationJavaSecurity
0 likes · 9 min read
Mastering Token Renewal: 5 Proven Strategies to Boost Security and Performance
IT Services Circle
IT Services Circle
Sep 22, 2025 · Information Security

JWT vs Token+Redis: Which Authentication Strategy Wins for Your Apps?

This article provides a comprehensive comparison of JWT and Token‑Redis authentication schemes, covering their underlying principles, Java implementations, advantages and disadvantages, performance and security trade‑offs, suitable use‑cases, and practical guidance for choosing the optimal solution in modern web and mobile applications.

AuthenticationJWTJava
0 likes · 15 min read
JWT vs Token+Redis: Which Authentication Strategy Wins for Your Apps?
Su San Talks Tech
Su San Talks Tech
Sep 19, 2025 · Information Security

JWT vs Token+Redis: Which Authentication Strategy Wins for Your Backend?

This article thoroughly compares JWT and Token‑plus‑Redis authentication approaches, detailing their underlying principles, Java implementations, performance, security trade‑offs, and ideal use‑cases, and even proposes a hybrid solution that combines the strengths of both methods for modern applications.

AuthenticationJWTSecurity
0 likes · 16 min read
JWT vs Token+Redis: Which Authentication Strategy Wins for Your Backend?
Deepin Linux
Deepin Linux
Sep 19, 2025 · Fundamentals

Unlocking Linux Memory: How Virtual Memory, MMU, and Heap Really Work

This article demystifies Linux process memory by explaining the layered architecture of virtual and physical memory, the role of the MMU and page tables, dynamic allocation mechanisms such as brk and mmap, and practical tools for inspecting and optimizing memory usage.

LinuxMMUMemory Management
0 likes · 47 min read
Unlocking Linux Memory: How Virtual Memory, MMU, and Heap Really Work
MaGe Linux Operations
MaGe Linux Operations
Sep 18, 2025 · Cloud Native

Master Helm: Proven Best Practices for Kubernetes Deployments

This comprehensive guide walks you through Helm's architecture, chart structuring, template development, dependency management, production deployment strategies, security hardening, observability integration, testing, performance tuning, and enterprise governance, providing actionable examples and code snippets to help you become a Helm expert in cloud‑native environments.

DeploymentObservabilitySecurity
0 likes · 22 min read
Master Helm: Proven Best Practices for Kubernetes Deployments
Instant Consumer Technology Team
Instant Consumer Technology Team
Sep 17, 2025 · Artificial Intelligence

Uncovering the Secret System Prompts Behind ChatGPT, Claude, and Gemini

The article examines the open‑source "system_prompts_leaks" project, which collects leaked system prompts from major AI models and reveals recurring design patterns such as modular layering, strict boundary control, dynamic strategy adjustment, emotional persona injection, and multi‑layer safety mechanisms.

AI SafetyPrompt engineeringSecurity
0 likes · 7 min read
Uncovering the Secret System Prompts Behind ChatGPT, Claude, and Gemini
Java Architecture Diary
Java Architecture Diary
Sep 17, 2025 · Fundamentals

What’s New in Java 25? Explore the Game‑Changing Features and Performance Boosts

Java 25, released on September 16 2025 as the next long‑term support version, introduces a suite of language, runtime, and security enhancements—including compact source files, pattern matching for primitive types, scoped values, a new Shenandoah GC, and a powerful vector API—aimed at improving developer productivity, application performance, and sustainability.

JEPSecurityconcurrency
0 likes · 11 min read
What’s New in Java 25? Explore the Game‑Changing Features and Performance Boosts
MaGe Linux Operations
MaGe Linux Operations
Sep 15, 2025 · Operations

Master Nginx Troubleshooting: From 502 Errors to Performance Optimization

This article walks you through ten real-world Nginx failure cases—covering 502 errors, SSL expiration, high concurrency bottlenecks, cache misconfigurations, log rotation issues, load‑balancing mistakes, security gaps, reverse‑proxy quirks, URL rewrite conflicts, and monitoring—while teaching a systematic diagnostic methodology for ops engineers.

502 errorDevOpsOperations
0 likes · 27 min read
Master Nginx Troubleshooting: From 502 Errors to Performance Optimization
JavaScript
JavaScript
Sep 14, 2025 · Frontend Development

Why IndexedDB Beats localStorage: Unlock Faster, Safer Browser Storage

This article examines the security, performance, and capacity limitations of localStorage and explains how IndexedDB offers asynchronous operations, larger storage, stronger security, and advanced query capabilities, while also recommending helper libraries to simplify its use.

IndexedDBJavaScriptSecurity
0 likes · 5 min read
Why IndexedDB Beats localStorage: Unlock Faster, Safer Browser Storage
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Sep 12, 2025 · Artificial Intelligence

How AI is Transforming DNS: Insights from China’s 2025 DNS+ Innovation Summit

At a 2025 summit co‑hosted by the National Engineering Lab for Internet Domain Name Management and Alibaba Cloud, over 30 experts from government, academia, and industry discussed AI‑driven DNS innovations, security measures like SRv6 compression and RPKI, and collaborative standards to accelerate next‑generation internet infrastructure in China.

DNSInternet infrastructureRPKI
0 likes · 4 min read
How AI is Transforming DNS: Insights from China’s 2025 DNS+ Innovation Summit
Cloud Native Technology Community
Cloud Native Technology Community
Sep 12, 2025 · Cloud Native

Why Kubernetes 1.34 Is a Must‑Upgrade for DevOps Teams

Kubernetes 1.34, released on August 27 2025, brings mature security defaults, cost‑saving features, and operational improvements such as ServiceAccount token image pulls, KYAML output, per‑deployment HPA tolerance, admission policy mutation, and dynamic resource allocation, all of which are crucial for DevOps teams to test before production rollout.

AutomationDevOpsKubernetes
0 likes · 12 min read
Why Kubernetes 1.34 Is a Must‑Upgrade for DevOps Teams
ITPUB
ITPUB
Sep 11, 2025 · Operations

Beyond 35: Viable Career Paths for Operations Professionals

The article compiles diverse viewpoints on how operations engineers can sustain and advance their careers after age 35, highlighting cloud‑native/DevOps, security operations, automation engineering, ITIL/service management, and broader roles such as consulting, project management, or training, while also noting industry realities and personal limits.

AutomationDevOpsITIL
0 likes · 10 min read
Beyond 35: Viable Career Paths for Operations Professionals
AI Large Model Application Practice
AI Large Model Application Practice
Sep 8, 2025 · Artificial Intelligence

How to Build Reliable, High‑Performance AI Services in Enterprise Applications

When integrating generative AI into existing enterprise systems, architects must address reliability, performance, and security by applying patterns such as circuit breakers, retries with exponential backoff, asynchronous processing, caching, request hedging, input/output guards, sandboxes, and security proxies to ensure continuous, fast, and safe AI‑driven functionality.

AI integrationAsynchronousReliability
0 likes · 18 min read
How to Build Reliable, High‑Performance AI Services in Enterprise Applications
Su San Talks Tech
Su San Talks Tech
Sep 8, 2025 · Backend Development

Why Online Payments Stall at Peak Hours and How Modern Backend Design Fixes It

This article dissects the architecture of modern online payment systems, explaining how layered, distributed designs handle millions of requests per second, ensure data consistency, prevent fraud, and recover from failures through robust routing, locking, reconciliation, and disaster‑recovery strategies.

Data ConsistencySecurityhigh concurrency
0 likes · 18 min read
Why Online Payments Stall at Peak Hours and How Modern Backend Design Fixes It
Java Tech Enthusiast
Java Tech Enthusiast
Sep 7, 2025 · Information Security

How to Protect Java Applications from Decompilation: Proven Techniques

This article explains why Java bytecode is easy to decompile and presents several practical protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—while discussing their strengths, weaknesses, and real‑world application examples.

ObfuscationSecuritydecompilation
0 likes · 12 min read
How to Protect Java Applications from Decompilation: Proven Techniques
Su San Talks Tech
Su San Talks Tech
Sep 6, 2025 · Backend Development

How Spring’s nohttp Project Eliminates Insecure HTTP URLs

Spring’s open‑source nohttp project scans, replaces, and blocks insecure http:// URLs across codebases, ensuring HTTPS usage to prevent man‑in‑the‑middle attacks, and includes modules like nohttp‑cli, nohttp‑checkstyle, and Gradle integration, while addressing cases where HTTPS isn’t feasible.

BackendHTTPSJava
0 likes · 5 min read
How Spring’s nohttp Project Eliminates Insecure HTTP URLs
Java Captain
Java Captain
Sep 5, 2025 · Backend Development

When "null" Becomes a Real Username: Hidden Bugs and How to Prevent Them

Developers often mistake the string "null" for an actual null value, leading to unexpected bugs such as phantom users, logging chaos, database contamination, and security risks; this article explains why this happens and provides practical backend, frontend, and database validation strategies to avoid the pitfalls.

BackendNULLSecurity
0 likes · 5 min read
When "null" Becomes a Real Username: Hidden Bugs and How to Prevent Them
Open Source Tech Hub
Open Source Tech Hub
Sep 5, 2025 · Backend Development

Mastering PHP Configuration: A Practical Guide to vlucas/phpdotenv

This guide explains how to securely manage configuration in PHP projects using the vlucas/phpdotenv library, covering installation, .env file creation, loading variables, best practices, performance tips, advanced features, and framework integration with clear code examples.

Environment VariablesSecuritydotenv
0 likes · 10 min read
Mastering PHP Configuration: A Practical Guide to vlucas/phpdotenv
MaGe Linux Operations
MaGe Linux Operations
Sep 4, 2025 · Operations

Master tcpdump: Real-World Linux Network Troubleshooting Techniques

This comprehensive guide walks you through why tcpdump is essential for ops engineers, how to install and configure it, basic and advanced filtering commands, real incident case studies, performance tuning, security analysis, and integration with other tools, turning raw packet captures into actionable insights.

Performance MonitoringSecuritynetwork troubleshooting
0 likes · 22 min read
Master tcpdump: Real-World Linux Network Troubleshooting Techniques
Java Web Project
Java Web Project
Sep 1, 2025 · Information Security

Why the Word “User” Is Killing Your Software Security and Design

The article argues that the vague term “user” misleads software design, illustrates the problem with airline reservation, Unix, and SaaS examples, shows how it creates security flaws like the Confused Deputy issue, and urges precise terminology early in projects to avoid costly rework.

SaaSSecurityTerminology
0 likes · 8 min read
Why the Word “User” Is Killing Your Software Security and Design
Code Mala Tang
Code Mala Tang
Sep 1, 2025 · Backend Development

Why Deep‑Copying Request Payloads Is Critical for Safe Node.js APIs

Deep‑copying request payloads in Node.js prevents unintended mutations across middleware, protects shared state in async operations, improves debugging and security, and aligns with functional programming principles, making your APIs more robust, maintainable, and safe for handling user data and transactions.

Node.jsSecuritydeep copy
0 likes · 12 min read
Why Deep‑Copying Request Payloads Is Critical for Safe Node.js APIs
MaGe Linux Operations
MaGe Linux Operations
Aug 31, 2025 · Cloud Native

How to Build Lean, Reusable Docker Images: 5 Steps to Standardized Container Management

This article shares five practical steps and three core principles for creating minimal, reproducible, and secure Docker images, covering multi‑stage builds, parameterized builds, automated security scanning, version tagging, CI/CD integration, and advanced optimizations that can shrink image size by up to 70% and speed up builds fivefold.

ContainerDevOpsSecurity
0 likes · 15 min read
How to Build Lean, Reusable Docker Images: 5 Steps to Standardized Container Management
DevOps in Software Development
DevOps in Software Development
Aug 29, 2025 · Information Security

How Trusted Dependency Libraries Secure Industrial Software Supply Chains

This article analyzes the strategic importance of software supply‑chain security for industrial equipment, outlines challenges such as network isolation, fragmented management, compliance audits, zombie components and supply‑cut risks, and presents a full‑link trusted dependency library architecture that delivers security, efficiency, compliance and strategic autonomy.

Securityarchitecturecompliance
0 likes · 22 min read
How Trusted Dependency Libraries Secure Industrial Software Supply Chains
Instant Consumer Technology Team
Instant Consumer Technology Team
Aug 29, 2025 · Artificial Intelligence

Why AI Coding Tools Need a Unified Agent Specification and How AGENTS.md Leads the Way

This article systematically reviews eight popular AI coding tools, compares their fragmented configuration mechanisms, introduces the OpenAI‑driven AGENTS.md specification, and proposes a broader Agent Specification Language (ASL) to unify agent rules across coding, design, and product domains while addressing security concerns.

AGENTS.mdAI agentsAgent Specification Language
0 likes · 26 min read
Why AI Coding Tools Need a Unified Agent Specification and How AGENTS.md Leads the Way
php Courses
php Courses
Aug 29, 2025 · Backend Development

Boost Your PHP Site Speed and Security with APC Caching

This article explains why caching is essential for PHP websites, introduces common caching solutions like APC, Memcache, and Redis, and provides step‑by‑step instructions for installing APC, configuring PHP, writing cache code, and using caching to improve performance and protect API security.

Securityapc
0 likes · 6 min read
Boost Your PHP Site Speed and Security with APC Caching
Code Ape Tech Column
Code Ape Tech Column
Aug 28, 2025 · Backend Development

Why and How to Replace Fastjson with Gson in Large Java Projects

This article explains why fastjson is being abandoned due to frequent security vulnerabilities, compares fastjson, Jackson, and Gson, and provides practical migration strategies, code examples, performance considerations, and common pitfalls to help teams safely switch to Gson in enterprise Java applications.

GsonSecurityfastjson
0 likes · 18 min read
Why and How to Replace Fastjson with Gson in Large Java Projects
Su San Talks Tech
Su San Talks Tech
Aug 26, 2025 · Backend Development

How to Build a Dynamic IP Blacklist with Nginx, Lua, and Redis

This guide explains how to create a dynamic IP blacklist that blocks malicious crawlers and users by configuring Nginx with Lua scripts and a Redis store, covering requirements, environment setup, design options, configuration files, Lua code, summary of benefits, use cases, and advanced extensions.

Backend DevelopmentLuaNginx
0 likes · 9 min read
How to Build a Dynamic IP Blacklist with Nginx, Lua, and Redis
Selected Java Interview Questions
Selected Java Interview Questions
Aug 25, 2025 · Information Security

Why 90% of Token Bugs Come from Renewal Mistakes – 5 Proven Solutions

Token renewal is a critical yet often misunderstood component of authentication, balancing security, user experience, and performance; this article examines common pitfalls, compares five practical strategies—including single‑token, double‑token, automatic renewal, and distributed solutions—and offers concrete best‑practice guidelines to avoid security holes and concurrency storms.

AuthenticationBackendSecurity
0 likes · 10 min read
Why 90% of Token Bugs Come from Renewal Mistakes – 5 Proven Solutions
Java Architect Essentials
Java Architect Essentials
Aug 24, 2025 · Information Security

How Java Serialization Leaks Passwords—and the Simple Fix with transient

This article explains how Java’s native serialization can expose plain‑text passwords, illustrates real‑world breaches, and shows how using the transient keyword together with encryption, library replacement, security frameworks, and penetration testing creates a five‑layer defense against serialization attacks.

JavaMitigationSecurity
0 likes · 6 min read
How Java Serialization Leaks Passwords—and the Simple Fix with transient
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Aug 22, 2025 · Operations

10 Essential Nginx Settings to Boost Performance and Security

This guide walks you through ten crucial Nginx configuration tweaks—including optimal worker processes, connection limits, gzip compression, caching, request size limits, SSL/TLS setup, HTTP/2 enablement, timeout settings, version hiding, and Lua extensions—to improve server performance, security, and reliability.

ConfigurationOpsSecurity
0 likes · 4 min read
10 Essential Nginx Settings to Boost Performance and Security