Tagged articles
2149 articles
Page 5 of 22
Ops Community
Ops Community
Aug 18, 2025 · Operations

Master Dockerfile: From Beginner Mistakes to Pro-Level Best Practices

Learn how to avoid common Dockerfile pitfalls, choose optimal base images, streamline layer caching, implement health checks, and apply security best practices with real code examples, enabling faster builds, smaller images, and reliable production deployments for developers and ops engineers alike.

DevOpsDockerDockerfile
0 likes · 14 min read
Master Dockerfile: From Beginner Mistakes to Pro-Level Best Practices
Architecture Digest
Architecture Digest
Aug 18, 2025 · Backend Development

Why a Username of "null" Breaks Your System and How to Prevent It

The article explains how using the literal string "null" as a username can cause user‑experience glitches, log‑debugging nightmares, database pollution, security risks and automation failures, and provides concrete backend, frontend and database validation techniques to avoid these pitfalls.

Backend DevelopmentSecuritydatabase constraints
0 likes · 5 min read
Why a Username of "null" Breaks Your System and How to Prevent It
Su San Talks Tech
Su San Talks Tech
Aug 18, 2025 · Information Security

Mastering Token Renewal: 5 Strategies to Boost Security and Performance

This article explores the fundamentals of token renewal, analyzes common pitfalls, and presents five practical schemes—including single‑token, blacklist, double‑token, automatic renewal, and distributed‑environment solutions—while offering a comparison matrix, selection guidance, and best‑practice recommendations for secure, high‑performance authentication systems.

AuthenticationBackendJava
0 likes · 10 min read
Mastering Token Renewal: 5 Strategies to Boost Security and Performance
Architect
Architect
Aug 16, 2025 · Artificial Intelligence

Build a Scalable High‑Performance OCR Invoice Pipeline with Spring Boot & Tesseract

This article presents a comprehensive, high‑throughput OCR invoice processing solution that combines distributed system design, Spring Boot asynchronous execution, Tesseract deep optimization, multi‑engine fusion, structured data extraction, performance tuning, Kubernetes deployment, and security compliance.

AIKubernetesOCR
0 likes · 16 min read
Build a Scalable High‑Performance OCR Invoice Pipeline with Spring Boot & Tesseract
Selected Java Interview Questions
Selected Java Interview Questions
Aug 15, 2025 · Backend Development

Master Spring Boot Controllers: Design Patterns, Best Practices & Code Samples

This comprehensive guide explains how to design high‑quality Spring Boot controller layers, covering architecture planning, RESTful API conventions, parameter validation, unified response structures, exception handling, logging, security, testing, asynchronous processing, and performance optimization with practical code examples and clear best‑practice recommendations.

ControllerException HandlingJava
0 likes · 15 min read
Master Spring Boot Controllers: Design Patterns, Best Practices & Code Samples
Liangxu Linux
Liangxu Linux
Aug 10, 2025 · Databases

Master MySQL Backup & Recovery: Complete Guide for Reliable Data Protection

This comprehensive guide explains MySQL data backup and recovery strategies, covering backup types, planning principles, built‑in tools like mysqldump and mysqlpump, third‑party solutions such as Percona XtraBackup, scripting for automated schedules, storage options, encryption, monitoring, troubleshooting, and best‑practice recommendations to ensure data safety and business continuity.

AutomationBackupRecovery
0 likes · 22 min read
Master MySQL Backup & Recovery: Complete Guide for Reliable Data Protection
Open Source Tech Hub
Open Source Tech Hub
Aug 6, 2025 · Backend Development

Swow 1.0 Release: Full PHP 8.4 Support, New Pipe API, and Critical Fixes

The latest Swow release brings complete PHP 8.4 compatibility, introduces a powerful pipe API (Swow\pipe(), Swow\fileno(), Swow\pipe_from_fd()), adds CPU core detection via Swow\nproc(), enhances SSL/TLS reliability, restructures closure serialization, fixes numerous memory‑safety and compatibility bugs, and updates internal libraries.

PHP 8.4Release NotesSecurity
0 likes · 4 min read
Swow 1.0 Release: Full PHP 8.4 Support, New Pipe API, and Critical Fixes
Tech Freedom Circle
Tech Freedom Circle
Jul 27, 2025 · Interview Experience

Designing a Payment Middle Platform from Scratch – Core Challenges (Interview Answer)

This article provides a comprehensive guide to designing a payment middle platform from zero, covering its definition, classic middle‑platform types, core architecture, functional modules, fault‑tolerance, security measures, distributed‑transaction strategies, and detailed Java pseudocode, offering interview‑ready insights for architects.

MicroservicesSecurityarchitecture
0 likes · 39 min read
Designing a Payment Middle Platform from Scratch – Core Challenges (Interview Answer)
Architecture and Beyond
Architecture and Beyond
Jul 27, 2025 · Artificial Intelligence

What Makes an AI Agent Tick? From Expert Systems to Modern Architectures

This article traces the evolution of AI agents from early expert systems to today’s multimodal, memory‑rich agents, explains their perception, reasoning, memory and action modules, discusses model selection, prompt engineering, RAG techniques, and highlights current limitations such as hallucinations, reliability, cost, and security.

AI AgentFunction CallingMemory Architecture
0 likes · 28 min read
What Makes an AI Agent Tick? From Expert Systems to Modern Architectures
php Courses
php Courses
Jul 25, 2025 · Backend Development

How to Run and Parse Ping Results in PHP: A Complete Guide

Learn how to execute the Ping command from PHP, capture its output, format it into structured data, handle cross‑platform differences, ensure security with input validation, and display results in a user‑friendly HTML layout, enabling powerful network diagnostics within your web applications.

Backend DevelopmentNetwork DiagnosticsSecurity
0 likes · 8 min read
How to Run and Parse Ping Results in PHP: A Complete Guide
php Courses
php Courses
Jul 25, 2025 · Backend Development

How to Execute and Parse Ping Results in PHP for Structured Network Diagnostics

Learn how to run the ping command from PHP, format its raw output, parse statistics into a structured array, handle cross‑platform differences, ensure security with input validation, and display results in a user‑friendly HTML format for robust network diagnostics.

Backend DevelopmentNetwork DiagnosticsSecurity
0 likes · 7 min read
How to Execute and Parse Ping Results in PHP for Structured Network Diagnostics
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Jul 24, 2025 · Cloud Computing

Why Serverless Is the Best Way to Deploy Enterprise MCP Servers

The article explains how the MCP protocol standardizes AI model interactions with external services, outlines the challenges of deploying MCP servers in enterprises, and demonstrates how Huawei Cloud FunctionGraph's serverless workflow offers a low‑cost, scalable, and secure solution with step‑by‑step deployment guidance.

AI integrationCloud FunctionsMCP
0 likes · 8 min read
Why Serverless Is the Best Way to Deploy Enterprise MCP Servers
vivo Internet Technology
vivo Internet Technology
Jul 23, 2025 · Information Security

How Vivo’s Rust‑Based BlueOS Kernel Redefines Security and Performance

Vivo unveiled its BlueOS kernel, the first industry‑wide, fully Rust‑written operating system kernel open‑sourced at the 2025 Open Atom Open‑Source Ecosystem Conference, highlighting its security‑first design, lightweight footprint, cross‑architecture compatibility, and AI‑integrated features aimed at the emerging AGI era.

BlueOSKernelOperating System
0 likes · 7 min read
How Vivo’s Rust‑Based BlueOS Kernel Redefines Security and Performance
DevOps Operations Practice
DevOps Operations Practice
Jul 22, 2025 · Operations

Top 7 DevOps Best Practices to Accelerate Delivery and Boost Reliability

These seven essential DevOps best practices—from cultural transformation and full automation to continuous integration, observability, security, cloud-native microservices, and performance optimization—guide teams in accelerating software delivery, enhancing quality, ensuring reliability, and reducing costs through collaborative, automated, and measurable processes.

AutomationCloud NativeDevOps
0 likes · 4 min read
Top 7 DevOps Best Practices to Accelerate Delivery and Boost Reliability
Java Captain
Java Captain
Jul 22, 2025 · Information Security

How to Unlock a Banned WeChat Account in 2025: Step‑by‑Step Self‑Unblock and Appeal Guide

This comprehensive 2025 guide explains how to identify temporary versus permanent WeChat bans, walk you through the four‑step self‑unblock process, detail the required materials for manual appeals, and provide troubleshooting tips and long‑term protection strategies to safely recover your account.

2025Account UnblockAppeal Process
0 likes · 12 min read
How to Unlock a Banned WeChat Account in 2025: Step‑by‑Step Self‑Unblock and Appeal Guide
JavaScript
JavaScript
Jul 22, 2025 · Frontend Development

How ShadowRealm Can Safely Isolate Untrusted JavaScript in Your Web Apps

This article explains the security risks of integrating third‑party scripts, why traditional isolation methods like iframes, Web Workers, and eval fall short, and introduces the upcoming ShadowRealm proposal with its lightweight, synchronous, and fully isolated JavaScript global environment and simple API.

JavaScriptSecurityShadowRealm
0 likes · 4 min read
How ShadowRealm Can Safely Isolate Untrusted JavaScript in Your Web Apps
Raymond Ops
Raymond Ops
Jul 21, 2025 · Operations

How to Secure Linux: Create a Sudo User and Disable Root SSH Login

This guide explains why disabling root SSH access is essential, then walks through creating a privileged user, assigning sudo rights, editing the sshd_config file to reject root logins, restarting the service, and verifying that root login is effectively blocked.

LinuxSecuritySudo
0 likes · 5 min read
How to Secure Linux: Create a Sudo User and Disable Root SSH Login
Lin is Dream
Lin is Dream
Jul 21, 2025 · Operations

Unlock Nginx Power: Load Balancing, Static Serving, Logging, Security & Gray Release Guide

This article walks you through practical Nginx configurations covering reverse‑proxy load balancing, static resource handling, cache control, version hiding, JSON‑formatted logging, rate‑limiting, IP restrictions, gray‑release traffic splitting, security headers and DNS anti‑spoofing, with ready‑to‑use code examples.

ConfigurationNginxSecurity
0 likes · 20 min read
Unlock Nginx Power: Load Balancing, Static Serving, Logging, Security & Gray Release Guide
Ops Community
Ops Community
Jul 19, 2025 · Operations

Mastering Linux Enterprise Data Synchronization: From Basics to Production Best Practices

This comprehensive guide explores Linux‑based enterprise data synchronization, covering core concepts, architecture patterns, tools like rsync, MySQL and PostgreSQL replication, distributed file systems, cloud‑native solutions, monitoring, security, and production‑grade best practices to help engineers build reliable, scalable sync systems.

EnterpriseKubernetesLinux
0 likes · 18 min read
Mastering Linux Enterprise Data Synchronization: From Basics to Production Best Practices
Raymond Ops
Raymond Ops
Jul 17, 2025 · Operations

Essential Ops Toolkit: Unified Account Management, Automation, DNS, and More

This guide reviews a comprehensive set of operations tools—including LDAP, JumpServer, Fabric, Ansible, dnsmasq, pdnsd, ApacheBench, TCPcopy, PortSentry, fail2ban, knockd, Vagrant, Docker, ELK, and Smokeping—detailing their features, advantages, and typical use cases for modern infrastructure management.

DNSOperationsSecurity
0 likes · 8 min read
Essential Ops Toolkit: Unified Account Management, Automation, DNS, and More
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jul 17, 2025 · Artificial Intelligence

Boost Security and Accuracy with a Multi‑Engine Voiceprint Fusion Service

This article introduces a multi‑engine voiceprint fusion service that combines Tencent Cloud, iFlytek, and a self‑developed model, detailing its architecture, intelligent scheduling, flexible API, technical highlights, typical high‑security scenarios, and usage specifications with example code for developers.

AISecuritybiometric authentication
0 likes · 9 min read
Boost Security and Accuracy with a Multi‑Engine Voiceprint Fusion Service
php Courses
php Courses
Jul 15, 2025 · Backend Development

7 Fatal PHP Mistakes Every Developer Must Avoid

This article outlines the seven most common and dangerous errors in PHP development—ranging from SQL injection and unchecked input to poor session handling and lack of autoloading—while offering concrete code‑level solutions to boost security, performance, and maintainability.

BackendPHPSecurity
0 likes · 6 min read
7 Fatal PHP Mistakes Every Developer Must Avoid
Efficient Ops
Efficient Ops
Jul 13, 2025 · Operations

Mastering Modern System Operations: 6 Essential Strategies for Stability and Efficiency

This comprehensive guide outlines six critical areas of modern system operations—including real‑time monitoring, security safeguards, automation, fault diagnosis, collaborative teamwork, and process optimization—offering practical strategies and tools such as Zabbix, Prometheus, ELK, Redis, Ansible, and capacity planning to ensure stable, efficient enterprise services.

AutomationSecuritycapacity planning
0 likes · 10 min read
Mastering Modern System Operations: 6 Essential Strategies for Stability and Efficiency
Code Mala Tang
Code Mala Tang
Jul 12, 2025 · Fundamentals

Mastering Python’s eval(): How It Works, When to Use It, and How to Stay Safe

Python’s eval() function acts as a double‑edged sword, enabling dynamic code execution by parsing, compiling, and running string‑based expressions, but it introduces security and performance risks; this article explains its inner workings, common use cases, potential dangers, and safe practices or alternatives.

PythonSecuritybest-practices
0 likes · 9 min read
Mastering Python’s eval(): How It Works, When to Use It, and How to Stay Safe
Raymond Ops
Raymond Ops
Jul 12, 2025 · Information Security

How to Enforce Password Expiration and Complexity on Linux Systems

Learn how to configure password aging and enforce complexity rules on Linux by editing /etc/login.defs and /etc/pam.d/system-auth, including setting maximum password age, minimum length, character class requirements, and preventing reuse of recent passwords, with practical sed commands and example configurations for CentOS 6 and 7.

Password ComplexityPassword policySecurity
0 likes · 8 min read
How to Enforce Password Expiration and Complexity on Linux Systems
IT Architects Alliance
IT Architects Alliance
Jul 10, 2025 · Cloud Native

Inside Alibaba’s Tech Stack: Cloud‑Native Architecture Behind Billions of Transactions

This article examines Alibaba's extensive cloud‑native technology stack—including distributed computing, storage, middleware, real‑time data processing, AI platforms, performance engineering, and security—revealing how its architects design systems that handle massive transaction volumes during events like Double 11.

Big DataDistributed SystemsMicroservices
0 likes · 12 min read
Inside Alibaba’s Tech Stack: Cloud‑Native Architecture Behind Billions of Transactions
JavaScript
JavaScript
Jul 9, 2025 · Information Security

How to Achieve a Seamless “Never‑Logout” Experience with Token Refresh

This article explains why short‑lived access tokens cause user interruptions, introduces the dual‑token authentication model with refresh tokens, and provides a complete Axios interceptor implementation that transparently renews tokens, handles concurrency, and gracefully logs out when refresh fails.

AuthenticationSecurityToken
0 likes · 9 min read
How to Achieve a Seamless “Never‑Logout” Experience with Token Refresh
Tencent Cloud Developer
Tencent Cloud Developer
Jul 9, 2025 · Backend Development

Why Payment System Architecture Is the Backbone of E‑Commerce

Payment systems serve as the essential bridge linking consumers, merchants, and financial institutions in e‑commerce, handling everything from transaction processing and security compliance to multi‑channel payment management, order settlement, refunds, and detailed architecture design that evolves from closed internal apps to open, scalable micro‑service platforms.

Backend ArchitectureSecuritye‑commerce
0 likes · 20 min read
Why Payment System Architecture Is the Backbone of E‑Commerce
Raymond Ops
Raymond Ops
Jul 8, 2025 · Information Security

How to Detect and Remove Linux Mining Malware: Step‑by‑Step Guide

This article explains how to identify high CPU usage caused by hidden mining malware on Linux servers and provides a comprehensive, command‑line driven process for isolating the host, blocking malicious network traffic, cleaning cron jobs, startup services, compromised libraries, SSH keys, and terminating malicious processes.

LinuxMalware RemovalSecurity
0 likes · 10 min read
How to Detect and Remove Linux Mining Malware: Step‑by‑Step Guide
php Courses
php Courses
Jul 8, 2025 · Backend Development

How to Use PHP’s is_executable() to Check File Executability

This guide explains PHP’s is_executable() function, detailing its definition, parameters, return values, practical code examples, step‑by‑step explanation, important considerations, and common use cases such as validating uploaded files and enhancing system security.

Backend DevelopmentFile PermissionsSecurity
0 likes · 4 min read
How to Use PHP’s is_executable() to Check File Executability
Deepin Linux
Deepin Linux
Jul 7, 2025 · Information Security

How IOMMU Safeguards Systems: From DMA Attacks to Virtualization Security

This article explains how the Input/Output Memory Management Unit (IOMMU) protects computers from DMA‑based attacks, details its architecture, DMA and interrupt remapping mechanisms, implementations across Intel, AMD and ARM, and provides practical configuration and programming guidance for secure virtualization and cloud environments.

DMAIOMMUMemory Management
0 likes · 21 min read
How IOMMU Safeguards Systems: From DMA Attacks to Virtualization Security
Code Mala Tang
Code Mala Tang
Jul 7, 2025 · Backend Development

Secure FastAPI APIs with JWT: Step‑by‑Step Guide & Best Practices

This tutorial explains the fundamentals of JSON Web Tokens, their structure, how to encode them with base64Url, and provides a complete FastAPI implementation—including installation, token generation, verification, protected routes, and practical security recommendations—for building robust authentication in distributed systems.

AuthenticationBackend DevelopmentFastAPI
0 likes · 10 min read
Secure FastAPI APIs with JWT: Step‑by‑Step Guide & Best Practices
Architects' Tech Alliance
Architects' Tech Alliance
Jul 6, 2025 · Fundamentals

Mastering Data Center Essentials: 100 Core Concepts You Must Know

This comprehensive guide walks you through 100 essential data‑center concepts—from basic definitions, tier standards, and modular design to networking layers, storage architectures, compute resources, security measures, operational practices, energy efficiency, emerging technologies, and industry ecosystem—providing a complete knowledge framework for modern digital infrastructure.

ComputeData centerInfrastructure
0 likes · 21 min read
Mastering Data Center Essentials: 100 Core Concepts You Must Know
Cognitive Technology Team
Cognitive Technology Team
Jul 5, 2025 · Frontend Development

Why Does a POST Request Appear Twice? Unraveling CORS Preflight Mechanics

POST requests can be sent twice in cross‑origin scenarios because browsers issue a CORS preflight OPTIONS request first, and only after the server approves the request does the actual POST occur; understanding same‑origin policy, simple vs complex requests, and proper server header configuration prevents this duplication.

CORSCross-OriginPOST
0 likes · 8 min read
Why Does a POST Request Appear Twice? Unraveling CORS Preflight Mechanics
Ops Development & AI Practice
Ops Development & AI Practice
Jul 4, 2025 · Information Security

Proactive Intrusion Detection for Financial Systems with AWS CloudTrail & EventBridge

This guide walks through designing and implementing a proactive, real‑time intrusion detection solution for financial systems by leveraging AWS CloudTrail to capture API activity and EventBridge to trigger alerts and automated responses, covering high‑risk IAM actions, network changes, and best‑practice rule configurations.

AWSCloudTrailEventBridge
0 likes · 10 min read
Proactive Intrusion Detection for Financial Systems with AWS CloudTrail & EventBridge
Liangxu Linux
Liangxu Linux
Jul 3, 2025 · Information Security

Four Effective Ways to Stop SSH Brute‑Force Attacks

This guide explains four practical methods—using strong passwords, changing the default SSH port, disabling direct root login while granting sudo rights to a regular user, and enabling key‑based authentication—plus how to install and configure Fail2ban to automatically block repeated login failures on Linux servers.

SSHSecuritybrute force
0 likes · 10 min read
Four Effective Ways to Stop SSH Brute‑Force Attacks
Java Architect Essentials
Java Architect Essentials
Jul 2, 2025 · Information Security

How to Bulletproof JWTs: Prevent Token Theft, None Attacks, and Brute‑Force

This article examines common JWT vulnerabilities—including token exposure via localStorage, algorithm‑tampering “none” attacks, weak signing keys, and lack of revocation—and presents a robust solution using HTTPS transmission, HttpOnly Secure cookies, SM9 cryptographic signatures, and a Redis‑based blacklist to achieve dramatically improved security.

FlaskJWTPython
0 likes · 12 min read
How to Bulletproof JWTs: Prevent Token Theft, None Attacks, and Brute‑Force
Continuous Delivery 2.0
Continuous Delivery 2.0
Jul 1, 2025 · Artificial Intelligence

How Gemini CLI Turns Your Terminal into an AI-Powered Swiss Army Knife

Gemini CLI, Google’s AI‑enhanced command‑line interface, extends beyond chat by offering a rich command system, intelligent file reading, shell integration, hierarchical configuration, project memory, and multi‑layered security features, enabling developers to streamline code review, customization, and safe local operations.

AI-powered CLICase StudiesGemini CLI
0 likes · 21 min read
How Gemini CLI Turns Your Terminal into an AI-Powered Swiss Army Knife
Ops Development & AI Practice
Ops Development & AI Practice
Jun 28, 2025 · Information Security

Why Assuming AWS Roles Beats Direct Permissions: A Security Deep Dive

The article explains how using AWS AssumeRole for temporary, scoped credentials transforms static access keys into dynamic, short‑lived permissions, dramatically reducing attack windows, enforcing least‑privilege, simplifying cross‑account management, and improving auditability compared to granting permanent IAM user rights.

AWSAssumeRoleCloud Native
0 likes · 8 min read
Why Assuming AWS Roles Beats Direct Permissions: A Security Deep Dive
Ops Development & AI Practice
Ops Development & AI Practice
Jun 28, 2025 · Information Security

Mastering AWS Temporary Credentials: Securely Assume IAM Roles

This guide explains why long‑lived IAM user keys are risky, introduces IAM roles and temporary security credentials, details trust and permissions policies, and provides step‑by‑step commands and profile configurations for safely using AWS STS assume‑role in production environments.

AWSAssumeRoleIAM
0 likes · 8 min read
Mastering AWS Temporary Credentials: Securely Assume IAM Roles
Ops Development & AI Practice
Ops Development & AI Practice
Jun 27, 2025 · Information Security

How Teleport Redefines Secure Infrastructure Access in the Cloud‑Native Era

Teleport is an open‑source identity‑native access proxy that consolidates SSH, Kubernetes, databases, and internal web apps into a single, zero‑trust platform, replacing traditional bastion hosts, VPNs, and database gateways with short‑lived certificates, reverse tunnels, and unified audit logs for enhanced security and operational simplicity.

Cloud NativeDevOpsInfrastructure Access
0 likes · 9 min read
How Teleport Redefines Secure Infrastructure Access in the Cloud‑Native Era
Java Backend Technology
Java Backend Technology
Jun 25, 2025 · Information Security

How to Seamlessly Refresh JWT Tokens: Backend and Frontend Strategies

This article explains why sudden logouts occur due to expired JWT tokens stored in Redis, and presents both backend automatic token renewal and frontend double‑token (access‑token and refresh‑token) approaches, complete with code examples, testing tips, and handling edge cases such as long‑idle form submissions.

AuthenticationBackendJWT
0 likes · 10 min read
How to Seamlessly Refresh JWT Tokens: Backend and Frontend Strategies
Big Data Tech Team
Big Data Tech Team
Jun 24, 2025 · Artificial Intelligence

How AI Large Models Are Revolutionizing Enterprise Data Warehouses

This article examines how AI large models reshape enterprise data warehouses through intelligent data governance, natural‑language query conversion, real‑time predictive analytics, multimodal knowledge integration, and automated security compliance, while outlining supporting technologies, toolchains, and future trends.

AIData WarehouseSecurity
0 likes · 7 min read
How AI Large Models Are Revolutionizing Enterprise Data Warehouses
Architect's Guide
Architect's Guide
Jun 23, 2025 · Information Security

Discover Sa-Token: The Most Feature‑Rich Java Authentication Framework

Sa-Token is a lightweight Java permission authentication framework that offers zero‑configuration login, comprehensive permission checks, session management, single sign‑on, OAuth2.0 support, distributed sessions, token customization, and many advanced features, with simple one‑line API calls illustrated by clear code examples.

AuthenticationAuthorizationFramework
0 likes · 7 min read
Discover Sa-Token: The Most Feature‑Rich Java Authentication Framework
Architecture and Beyond
Architecture and Beyond
Jun 21, 2025 · Information Security

How Permission Control Can Make or Break Your SaaS Product (Design Tips)

Permission control is a critical, often overlooked component of SaaS products; this article explains why it matters, outlines core concepts, compares ACL, RBAC, and ABAC models, discusses SaaS-specific challenges like multi‑tenant isolation, and offers practical design, implementation, and performance‑optimization guidelines.

PermissionsRBACSaaS
0 likes · 21 min read
How Permission Control Can Make or Break Your SaaS Product (Design Tips)
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Jun 18, 2025 · Operations

How to Reset a Forgotten Elasticsearch 8.x/9.x Password Safely

When the built‑in elastic user password is lost in Elasticsearch 8.x or 9.x, you can use the official elasticsearch‑reset‑password command‑line tool to generate or set a new password without restarting the service, following a few simple steps and troubleshooting tips.

ElasticsearchOperationsSecurity
0 likes · 4 min read
How to Reset a Forgotten Elasticsearch 8.x/9.x Password Safely
php Courses
php Courses
Jun 18, 2025 · Information Security

Why Most PHP Auth Systems Are Insecure and How to Build a Truly Safe One

This article reveals common security flaws in typical PHP authentication implementations—such as misconceptions about session safety, weak password storage, inadequate CSRF protection, missing rate limiting, and lack of multi‑factor authentication—and provides concrete best‑practice steps, including modern password hashing, strict session management, HTTPS enforcement, comprehensive CSRF defenses, intelligent rate limiting, MFA support, and regular security audits.

CSRFMFAPHP
0 likes · 5 min read
Why Most PHP Auth Systems Are Insecure and How to Build a Truly Safe One
Liangxu Linux
Liangxu Linux
Jun 16, 2025 · Information Security

Hardening CentOS 7/8: Essential Security Baseline Steps

This guide outlines a comprehensive set of security hardening measures for CentOS 7/8 servers, including creating non‑root users, disabling root SSH login, configuring password policies, tightening SSH settings, enabling logging, and applying kernel protections such as ASLR to reduce attack surface.

HardeningPasswordPolicySSH
0 likes · 12 min read
Hardening CentOS 7/8: Essential Security Baseline Steps
Java Captain
Java Captain
Jun 16, 2025 · Operations

How to Safely Remove WeChat Zombie Followers in 2025 Without Risk

This guide explains what WeChat "zombie" contacts are, why third‑party cleaning tools are dangerous, and provides four official, zero‑risk methods—transfer verification, group‑broadcast screening, Moments AB testing, and group isolation—plus deletion limits, risk controls, and long‑term maintenance strategies.

Contact ManagementSecurityWeChat
0 likes · 8 min read
How to Safely Remove WeChat Zombie Followers in 2025 Without Risk
Raymond Ops
Raymond Ops
Jun 13, 2025 · Information Security

Master Ubuntu’s UFW: Simple Commands to Enable, Configure, and Manage Firewall Rules

This article introduces Ubuntu’s Uncomplicated Firewall (UFW), explaining how to enable, disable, reset, set default policies, and create, modify, or delete specific IP, port, and protocol rules using concise command-line examples, helping users quickly secure client machines with practical firewall configurations.

Command-lineLinuxSecurity
0 likes · 7 min read
Master Ubuntu’s UFW: Simple Commands to Enable, Configure, and Manage Firewall Rules
Java Captain
Java Captain
Jun 12, 2025 · Information Security

How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide

This comprehensive 2025 guide explains how to identify WeChat restriction types, prepare necessary evidence and materials, use both client‑side and web‑based self‑service tools, complete assisted verification, and follow new regulations to successfully restore account access.

GuidelinesSecurityWeChat
0 likes · 9 min read
How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide
MaGe Linux Operations
MaGe Linux Operations
Jun 11, 2025 · Backend Development

Master Nginx: From Beginner Setup to Full LNMP Architecture Deployment

This comprehensive guide walks you through installing and configuring Nginx, implementing access control, setting up virtual hosts, building a complete LNMP stack with MySQL and PHP‑FPM, applying performance optimizations, hardening security, and establishing monitoring for high‑performance web services.

LNMPNginxPerformance Optimization
0 likes · 20 min read
Master Nginx: From Beginner Setup to Full LNMP Architecture Deployment
Java Captain
Java Captain
Jun 11, 2025 · Information Security

Mastering WeChat Account Unblocking: A Step‑by‑Step Self‑Service Guide

This comprehensive guide explains the types of WeChat account restrictions, preparation steps, the five‑stage self‑service unblocking workflow, common issues and solutions, friend‑assisted verification procedures, advanced appeal strategies for permanent bans, and post‑unblock security measures to help users efficiently restore access.

SecurityUnblockingWeChat
0 likes · 18 min read
Mastering WeChat Account Unblocking: A Step‑by‑Step Self‑Service Guide
Lin is Dream
Lin is Dream
Jun 11, 2025 · Information Security

Why SFTP Beats FTP: Secure File Transfer for Java Projects

Learn why SFTP, built on SSH, offers encrypted, authenticated file transfers unlike plain FTP, and how Java developers can securely integrate SFTP using libraries like JSch, with practical comparisons, usage scenarios, and a visual illustration of protocol differences.

JavaSFTPSSH
0 likes · 7 min read
Why SFTP Beats FTP: Secure File Transfer for Java Projects
Java Captain
Java Captain
Jun 10, 2025 · Operations

How to Unlock a Banned WeChat Account: Step‑by‑Step 2025 Guide

This 2025 guide details every step to diagnose the type of WeChat ban, prepare required documents and devices, and use both client‑side and web‑based self‑service channels, including advanced verification tips and FAQs, to successfully restore a restricted or permanently blocked account.

2025 GuidelinesAccount UnblockingSecurity
0 likes · 10 min read
How to Unlock a Banned WeChat Account: Step‑by‑Step 2025 Guide
dbaplus Community
dbaplus Community
Jun 9, 2025 · Operations

20 High‑Risk Ops Tricks That Actually Boost Efficiency (And How to Do Them Safely)

Drawing on a decade of ops experience, this article reveals twenty seemingly dangerous yet highly efficient operational practices—from production debugging and bulk server changes to database hacks, network security shortcuts, system tweaks, disaster‑recovery drills, and cloud‑native tricks—while outlining their risks and concrete mitigation steps.

SecuritySystem Administrationrisk management
0 likes · 12 min read
20 High‑Risk Ops Tricks That Actually Boost Efficiency (And How to Do Them Safely)
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 8, 2025 · Information Security

Why SBOMs Are the Key to Secure Software Supply Chains

This article explains how Software Bill of Materials (SBOM) mirrors hardware BOMs, outlines their core differences, presents best practices, tools, and implementation strategies to improve supply‑chain transparency, compliance, and security for modern software development.

SBOMSecuritycompliance
0 likes · 12 min read
Why SBOMs Are the Key to Secure Software Supply Chains
IT Services Circle
IT Services Circle
Jun 8, 2025 · Information Security

Why mmap Shared Memory Is More Dangerous Than malloc – Risks Explained

mmap shared memory lets multiple processes access the same physical memory, which can break process isolation, expose permission misconfigurations like PROT_EXEC, and cause cross‑process crashes or code‑injection attacks, making it far riskier than heap allocations with malloc that remain confined to a single process.

C programmingSecuritymalloc
0 likes · 5 min read
Why mmap Shared Memory Is More Dangerous Than malloc – Risks Explained
Java Captain
Java Captain
Jun 8, 2025 · Operations

Step-by-Step 2025 Guide to Unlocking Your WeChat Account

This comprehensive 2025 guide walks users through identifying restriction types, preparing evidence, using WeChat's self‑service unlocking tools or web‑based appeal, completing assisted verification, handling enterprise account checks, and applying best‑practice safeguards to maximize the chance of successful account restoration.

2025 GuidelinesSecurityWeChat
0 likes · 9 min read
Step-by-Step 2025 Guide to Unlocking Your WeChat Account
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 7, 2025 · Information Security

Unlocking Software Supply Chain Security with SBOM

This article explains how Software Bill of Materials (SBOM) serves as a digital map for component dependency and change management, detailing its functions in visualizing dependencies, detecting version conflicts, ensuring license compliance, and providing supply‑chain risk alerts, ultimately improving development efficiency, security, and regulatory compliance.

SBOMSecuritycompliance
0 likes · 11 min read
Unlocking Software Supply Chain Security with SBOM
360 Tech Engineering
360 Tech Engineering
Jun 4, 2025 · Information Security

Security Risk Assessment and Governance for Model Context Protocol (MCP) Ecosystem

This article systematically analyzes the security threats of the Model Context Protocol (MCP) ecosystem—including supply‑chain poisoning, backdoors, tool‑description injection, malicious updates, cloud‑service abuse, installer vulnerabilities, and open‑source risks—and proposes concrete governance measures and early‑stage implementations to help enterprises secure MCP deployments and operations.

AIMCPModel Context Protocol
0 likes · 18 min read
Security Risk Assessment and Governance for Model Context Protocol (MCP) Ecosystem
Liangxu Linux
Liangxu Linux
Jun 3, 2025 · Information Security

How to Detect and Remove Linux Mining Malware: A Step‑by‑Step Guide

This guide explains how to identify hidden cryptocurrency‑mining processes on a Linux server, stop them, disable the services that restart them, block malicious IPs, clean unauthorized SSH keys, and harden the system with tools such as sysdig, Safedog, and ClamAV.

ClamAVSecurityiptables
0 likes · 9 min read
How to Detect and Remove Linux Mining Malware: A Step‑by‑Step Guide
php Courses
php Courses
Jun 3, 2025 · Backend Development

Using PHP's setcookie Function to Create and Manage Cookies

This article explains how PHP's setcookie function works, describes each parameter, and provides several practical code examples for setting cookies with different lifetimes, scopes, and security options, helping developers manage client‑side data effectively.

BackendPHPSecurity
0 likes · 5 min read
Using PHP's setcookie Function to Create and Manage Cookies
php Courses
php Courses
Jun 3, 2025 · Backend Development

Using PHP password_hash for Secure Password Storage

This article explains how PHP's password_hash function can securely hash passwords, automatically handle salting, and be verified with password_verify, providing code examples and best practices for protecting user credentials in web applications.

BackendHashingSecurity
0 likes · 5 min read
Using PHP password_hash for Secure Password Storage
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
May 29, 2025 · Information Security

How Single Sign-On (SSO) Works: Architecture and Flow Explained

This article explains the fundamentals of Single Sign-On (SSO), detailing its cross‑system authentication mechanism, core components such as CAS Server, CAS Client, and User Agent, and walks through the step‑by‑step flow that enables users to log in once and access multiple trusted applications seamlessly.

AuthenticationCASSSO
0 likes · 4 min read
How Single Sign-On (SSO) Works: Architecture and Flow Explained
Linux Cloud Computing Practice
Linux Cloud Computing Practice
May 29, 2025 · Cloud Computing

2025 Linux Cloud Computing Interview Questions: 142 Essential Q&A

An extensive collection of 2025 Linux cloud computing interview questions—covering fundamentals, system architecture, security, shell scripting, networking, load balancing, and practical command‑line tasks—provides job seekers with a ready‑to‑study resource to master the knowledge most interviewers demand.

Securityinterview-questionsload balancing
0 likes · 8 min read
2025 Linux Cloud Computing Interview Questions: 142 Essential Q&A
Cloud Native Technology Community
Cloud Native Technology Community
May 22, 2025 · Information Security

How to Prevent Common Kubernetes Security Mistakes and Harden Your Cluster

This article analyzes typical Kubernetes security pitfalls—from weak authentication and overly permissive network policies to missing real‑time monitoring, exposed services, outdated versions, and default component settings—and provides concrete, layered mitigation steps and tool recommendations.

Cloud NativeKubernetesNetwork Policy
0 likes · 13 min read
How to Prevent Common Kubernetes Security Mistakes and Harden Your Cluster
MaGe Linux Operations
MaGe Linux Operations
May 21, 2025 · Information Security

Comprehensive Linux Intrusion Detection Checklist: Spot Hackers Fast

This guide walks you through a step‑by‑step Linux intrusion detection process, covering account audits, log analysis, process inspection, system file checks, scheduled task reviews, and historical command examinations, each illustrated with clear screenshots to help you quickly identify potential compromises.

Account AuditSecurityintrusion detection
0 likes · 5 min read
Comprehensive Linux Intrusion Detection Checklist: Spot Hackers Fast
Efficient Ops
Efficient Ops
May 20, 2025 · Operations

How AI Is Transforming Enterprise Monitoring and Automated Operations

This article outlines a comprehensive AI‑driven framework for upgrading intelligent monitoring, automating operations, enhancing log analysis, optimizing cloud costs, strengthening security, and improving disaster recovery, showcasing practical techniques such as unified data platforms, dynamic baselines, smart ticket routing, and self‑healing infrastructure.

AI MonitoringSecuritycloud optimization
0 likes · 9 min read
How AI Is Transforming Enterprise Monitoring and Automated Operations
IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Securitydata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
May 16, 2025 · Information Security

Critical Ingress‑NGINX RCE Vulnerability (CVE‑2025‑19742): Impact, Exploit Details, and Fixes

A severe security flaw in the ingress‑nginx controller (CVE‑2025‑19742) allows unauthenticated attackers to inject malicious NGINX configuration via the auth‑tls‑match‑cn annotation, leading to remote code execution, secret leakage, and potential full Kubernetes cluster takeover, with detailed remediation steps provided.

RCERemediationSecurity
0 likes · 10 min read
Critical Ingress‑NGINX RCE Vulnerability (CVE‑2025‑19742): Impact, Exploit Details, and Fixes
Liangxu Linux
Liangxu Linux
May 15, 2025 · Operations

10 Critical Server Ops Mistakes to Avoid and Real-World Lessons

This article outlines ten common server operation pitfalls—such as forced power‑offs, reckless experiments in production, neglecting firewall rules, running unknown scripts as root, unbacked‑up database changes, weak SSH settings, poor log management, exposed ports, unmonitored changes, and delayed patching—each illustrated with real‑world cases and practical remediation advice.

BackupSecuritySystem Administration
0 likes · 7 min read
10 Critical Server Ops Mistakes to Avoid and Real-World Lessons
MaGe Linux Operations
MaGe Linux Operations
May 15, 2025 · Cloud Native

Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control

This article explains Kubernetes' comprehensive security architecture, detailing the three critical gates—authentication, authorization, and admission control—along with token, basic, and certificate methods, RBAC policies, service accounts, kubeconfig setup, and practical examples for managing user permissions within clusters.

AdmissionControlAuthenticationAuthorization
0 likes · 20 min read
Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control
FunTester
FunTester
May 15, 2025 · Operations

Uncovering the Eight Hidden Pitfalls That Can Crash Your Distributed System

This article dissects the classic Eight Fallacies of Distributed Computing, explaining each mistaken assumption about network reliability, latency, bandwidth, security, topology, administration, cost, and homogeneity, and provides real‑world case studies and practical recommendations to help engineers design more resilient distributed systems.

Distributed SystemsFallaciesLatency
0 likes · 16 min read
Uncovering the Eight Hidden Pitfalls That Can Crash Your Distributed System
Selected Java Interview Questions
Selected Java Interview Questions
May 14, 2025 · Backend Development

Enterprise Java Core Features: Full‑Chain Logging, Unified Exception Handling, Permission Interceptor, and Thread Context Management

This article presents a comprehensive guide to implementing full‑chain log tracing, unified exception handling, permission interception, request latency monitoring, and standardized log formats in enterprise‑level Java projects using Spring AOP, thread‑local context, and Redis caching.

SecurityThreadLocalaop
0 likes · 23 min read
Enterprise Java Core Features: Full‑Chain Logging, Unified Exception Handling, Permission Interceptor, and Thread Context Management
Cognitive Technology Team
Cognitive Technology Team
May 13, 2025 · Operations

Essential Linux Log Files to Monitor and How to Access Them

Monitoring key Linux log files—such as syslog, auth.log, kern.log, and others—is crucial for system health, security, and troubleshooting, and this guide explains the purpose of each log, practical commands for viewing them, and automation techniques using scripts, cron, and tools like journalctl and Sematext.

BashLinuxLog Monitoring
0 likes · 20 min read
Essential Linux Log Files to Monitor and How to Access Them
Java Captain
Java Captain
May 12, 2025 · Databases

Comprehensive Guide to Installing, Configuring, and Managing MySQL on CentOS Linux

This tutorial walks through preparing the environment, installing and uninstalling MySQL on CentOS 7, configuring firewalls, setting up remote access, handling character sets, adjusting security policies, managing SQL modes, and best practices for case sensitivity and version‑specific password policies.

Character SetConfigurationInstallation
0 likes · 30 min read
Comprehensive Guide to Installing, Configuring, and Managing MySQL on CentOS Linux
php Courses
php Courses
May 12, 2025 · Backend Development

Using PHP is_executable() to Check File Executability

This article explains the PHP is_executable() function, its definition, parameters, return values, provides code examples, discusses important considerations, and outlines common scenarios where checking a file's executability enhances security and proper file handling.

BackendFile PermissionsPHP
0 likes · 4 min read
Using PHP is_executable() to Check File Executability
Liangxu Linux
Liangxu Linux
May 11, 2025 · Fundamentals

Why Linus Torvalds Calls Case‑Insensitive Filesystems a Huge Mistake

Linus Torvalds slammed the case‑insensitive design of file systems, highlighting a recent Bcachefs patch that finally implements proper case‑folding support while exposing deep engineering, security, and compatibility challenges that spark heated debate among kernel developers.

BcachefsCase InsensitivitySecurity
0 likes · 8 min read
Why Linus Torvalds Calls Case‑Insensitive Filesystems a Huge Mistake
Java Tech Enthusiast
Java Tech Enthusiast
May 9, 2025 · Information Security

Understanding and Preventing HTTP Redirect Attacks in Java Applications

After a login module unintentionally redirected users to a gambling site, the author explains how maliciously crafted redirect parameters enable HTTP redirect attacks, demonstrates vulnerable Java code, and outlines three defensive layers—whitelisting, signature verification, and path sanitization—plus five best‑practice tips to prevent such exploits.

HTTP redirectJavaMitigation
0 likes · 7 min read
Understanding and Preventing HTTP Redirect Attacks in Java Applications