Tagged articles
2150 articles
Page 6 of 22
Java Tech Enthusiast
Java Tech Enthusiast
May 9, 2025 · Information Security

Understanding and Preventing HTTP Redirect Attacks in Java Applications

After a login module unintentionally redirected users to a gambling site, the author explains how maliciously crafted redirect parameters enable HTTP redirect attacks, demonstrates vulnerable Java code, and outlines three defensive layers—whitelisting, signature verification, and path sanitization—plus five best‑practice tips to prevent such exploits.

HTTP redirectJavaMitigation
0 likes · 7 min read
Understanding and Preventing HTTP Redirect Attacks in Java Applications
Sohu Tech Products
Sohu Tech Products
May 7, 2025 · Information Security

Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations

This article provides a comprehensive security analysis of the Model Context Protocol (MCP), exposing multiple attack vectors such as prompt poisoning, tool poisoning, command and code injection, and illustrating how MCP’s design flaws make it more vulnerable than traditional applications while offering concrete mitigation recommendations.

AI SafetyCode InjectionMCP
0 likes · 34 min read
Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations
Test Development Learning Exchange
Test Development Learning Exchange
May 5, 2025 · Backend Development

Comprehensive Collection of Python Decorators for Logging, Timing, Error Handling, Caching, and More

This article presents a thorough set of Python decorator implementations covering logging, performance timing, exception handling, caching, retry mechanisms, authentication, parameter validation, decorator chaining, JSON response formatting, rate limiting, environment variable injection, response monitoring, custom headers, data transformation, concurrency control, distributed locking, API version control, security auditing, input validation, and output filtering, each with usage examples and sample output.

APIPythondecorators
0 likes · 21 min read
Comprehensive Collection of Python Decorators for Logging, Timing, Error Handling, Caching, and More
MaGe Linux Operations
MaGe Linux Operations
May 5, 2025 · Operations

Master Nginx: Forward & Reverse Proxy Essentials and Performance Tips

This comprehensive guide explores Nginx’s core functionalities, detailing forward and reverse proxy concepts, deployment procedures, configuration parameters, security hardening, rewrite module intricacies, performance optimization, and cloud‑native integration, while offering practical code examples and comparative analysis for real‑world scenarios.

NginxPerformance OptimizationProxy
0 likes · 19 min read
Master Nginx: Forward & Reverse Proxy Essentials and Performance Tips
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 5, 2025 · Backend Development

Explore 100+ Spring Boot 3 Real-World Cases: DB Init, Redis, Security & More

This article presents a continuously updated collection of over 120 Spring Boot 3 practical examples, covering database initialization scripts, switching Redis clients, disabling and customizing security, configuring HTTP clients, and fine‑tuning Spring MVC behavior with code snippets and configuration details.

Database InitializationHTTP clientSpring Boot
0 likes · 9 min read
Explore 100+ Spring Boot 3 Real-World Cases: DB Init, Redis, Security & More
Code Mala Tang
Code Mala Tang
May 4, 2025 · Backend Development

Mastering Environment Variables in FastAPI: Secure, Scalable Configurations

This guide explains why environment variables are essential for FastAPI projects and provides step‑by‑step instructions for both a simple .env + python‑dotenv setup and a modern pydantic‑settings approach, including Docker integration and security best practices.

DockerFastAPIbackend configuration
0 likes · 6 min read
Mastering Environment Variables in FastAPI: Secure, Scalable Configurations
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
May 4, 2025 · Frontend Development

A Front‑End Developer’s Guide to Integrating WeChat QR‑Code Login

This step‑by‑step tutorial walks front‑end developers through the entire process of integrating WeChat QR‑code login, covering prerequisite checklist, platform setup, core JavaScript SDK usage, callback handling, common pitfalls, security hardening, performance tweaks, debugging tricks, and a learning roadmap.

DebuggingFront-endOAuth
0 likes · 10 min read
A Front‑End Developer’s Guide to Integrating WeChat QR‑Code Login
Raymond Ops
Raymond Ops
May 3, 2025 · Operations

Master Linux DNS: From Basics to Advanced BIND9 Configuration

Explore the essential role of DNS in the internet, learn how Linux resolves domain names, configure resolvers via /etc/resolv.conf, NetworkManager, systemd-resolved, set up a BIND9 server with zone files, and discover advanced techniques like DNSSEC, DoH, split views, and troubleshooting tools.

DNSbind9linux
0 likes · 11 min read
Master Linux DNS: From Basics to Advanced BIND9 Configuration
Liangxu Linux
Liangxu Linux
May 2, 2025 · Information Security

Hardening Linux Servers to Level‑3 Security with Open‑Source Check and Protective Scripts

This article introduces open‑source Linux server hardening scripts that meet Level‑3 security protection requirements, outlines the essential security controls such as identity verification, access control, auditing, and intrusion prevention, and provides step‑by‑step usage instructions for both checking and applying the protective scripts.

HardeningLevel 3security
0 likes · 8 min read
Hardening Linux Servers to Level‑3 Security with Open‑Source Check and Protective Scripts
php Courses
php Courses
Apr 29, 2025 · Information Security

How to Build an OAuth2 Authorization Code Server in PHP

This article explains the OAuth2 authorization code flow and provides a step‑by‑step guide to creating a PHP‑based authorization server, including installing the bshaffer/oauth2‑server‑php library, writing the server code, setting up the MySQL client table, and testing token requests.

Authorization ServerBackendOAuth2
0 likes · 6 min read
How to Build an OAuth2 Authorization Code Server in PHP
Cognitive Technology Team
Cognitive Technology Team
Apr 28, 2025 · Information Security

Linus Torvalds Criticizes Case‑Insensitive File System Support in Linux

Linus Torvalds sharply condemned the case‑insensitive file‑system feature in Linux, labeling it a massive mistake that introduces serious security risks, citing recent Bcachefs patches that finally enabled the functionality, and sparking debate among developers about the trade‑offs between compatibility and safety.

BcachefsCase Insensitivityfile system
0 likes · 4 min read
Linus Torvalds Criticizes Case‑Insensitive File System Support in Linux
Java Tech Enthusiast
Java Tech Enthusiast
Apr 27, 2025 · Frontend Development

Common Front-End Security Attacks, Principles, and Mitigations

The article outlines prevalent front‑end security threats such as XSS, SQL injection, CSRF, MITM, clickjacking, misconfiguration, and vulnerable dependencies, explains their underlying principles, and recommends practical mitigations including input validation, CSP, HTTPS/TLS, CSRF tokens, secure headers, regular audits, and dependency scanning.

CSRFMITMSQL injection
0 likes · 8 min read
Common Front-End Security Attacks, Principles, and Mitigations
Python Crawling & Data Mining
Python Crawling & Data Mining
Apr 26, 2025 · Information Security

Master Frida: Step-by-Step Guide to Hook Android Apps with Python

This tutorial walks you through setting up a Python virtual environment, installing Frida and frida‑server on a rooted Android device, configuring the server, verifying the connection, and writing JavaScript hooks to intercept login functions, complete with code snippets, command examples, and troubleshooting tips.

AndroidFridaHooking
0 likes · 11 min read
Master Frida: Step-by-Step Guide to Hook Android Apps with Python
Raymond Ops
Raymond Ops
Apr 24, 2025 · Cloud Native

Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization

This article explains how Istio secures micro‑service architectures by providing strong identity, fine‑grained access policies, transparent TLS encryption, and comprehensive AAA (authentication, authorization, audit) mechanisms, covering high‑level architecture, certificate management, peer and request authentication, and authorization policy design.

AuthenticationAuthorizationIstio
0 likes · 23 min read
Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization
21CTO
21CTO
Apr 23, 2025 · Information Security

Why Docker’s New MCP Protocol Could Be a Security Nightmare for AI Agents

Docker’s newly introduced Model Context Protocol (MCP) aims to standardize AI agent interactions, but security researchers warn that unregistered and malicious MCP servers can expose code, enable tool injection attacks, and create “rug pulls,” highlighting significant risks for developers adopting this emerging technology.

AI agentsDockerMCP
0 likes · 6 min read
Why Docker’s New MCP Protocol Could Be a Security Nightmare for AI Agents
php Courses
php Courses
Apr 23, 2025 · Artificial Intelligence

Real-Time Face Recognition with PHP and OpenCV

This article explains how to set up a PHP environment, control a camera, and use the OpenCV library to perform real‑time face detection and recognition with code examples, demonstrating a practical security solution for applications such as access control and surveillance.

Computer VisionOpenCVPHP
0 likes · 6 min read
Real-Time Face Recognition with PHP and OpenCV
Linux Kernel Journey
Linux Kernel Journey
Apr 23, 2025 · Industry Insights

Highlights from the 3rd eBPF Developer Conference: A Technical Recap

The 3rd eBPF Developer Conference held on April 19, 2025 at Xi'an University of Posts and Telecommunications featured 36 expert talks on eBPF advancements, network and security innovations, observability, performance optimization, a vibrant project marketplace, student projects, and provides video and PPT resources for the community.

Linux kernelconferenceeBPF
0 likes · 7 min read
Highlights from the 3rd eBPF Developer Conference: A Technical Recap
21CTO
21CTO
Apr 21, 2025 · Information Security

Hidden VSCode Extensions Deploy Crypto Miners: What Developers Must Know

A recent security report reveals that ten malicious Visual Studio Code extensions, disguised as popular tools, install PowerShell loaders that persist, disable defenses, and deploy XMRig miners, highlighting a classic third‑party supply‑chain attack and urging developers to tighten defenses.

Supply ChainVSCodecrypto mining
0 likes · 7 min read
Hidden VSCode Extensions Deploy Crypto Miners: What Developers Must Know
php Courses
php Courses
Apr 17, 2025 · Backend Development

10 Common Mistakes to Avoid in Laravel Development

This article outlines ten frequent Laravel pitfalls—from neglecting mass‑assignment protection and overusing query builders to ignoring exception handling and security best practices—providing clear explanations and corrected code examples to help developers write more efficient, secure, and maintainable applications.

EloquentLaravelPHP
0 likes · 8 min read
10 Common Mistakes to Avoid in Laravel Development
Raymond Ops
Raymond Ops
Apr 16, 2025 · Information Security

Boost Linux Server Security: Practical Hardening Steps for RHEL7

This guide walks through a comprehensive Linux hardening checklist for RHEL7, covering account locking, password policies, SSH port changes, SELinux activation, firewall tightening, and file attribute protections to elevate the system to a B1 security level.

HardeningRHEL7SELinux
0 likes · 12 min read
Boost Linux Server Security: Practical Hardening Steps for RHEL7
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAuthorizationPermissions
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Network Intelligence Research Center (NIRC)
Network Intelligence Research Center (NIRC)
Apr 14, 2025 · Artificial Intelligence

MCP Explained: Current Landscape and Future Prospects

The article analyzes the Model Context Protocol (MCP) as an emerging open standard that unifies how applications provide context to large language models, reviews its rapid ecosystem growth, highlights security and performance challenges, and discusses future directions such as vertical small‑model opportunities and broader protocol integrations.

AI InteroperabilityMCPModel Context Protocol
0 likes · 9 min read
MCP Explained: Current Landscape and Future Prospects
Architect
Architect
Apr 12, 2025 · Backend Development

Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP

This article walks through a complete solution for protecting data in Spring Boot applications, covering symmetric, asymmetric, and hybrid encryption schemes, utility classes for AES and RSA, a custom HttpServletRequestWrapper to enable multiple reads of the request body, a filter that transparently decrypts incoming parameters, and an AOP‑based response‑encryption mechanism triggered by a custom annotation.

AESRSASpring Boot
0 likes · 45 min read
Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP
Tencent Technical Engineering
Tencent Technical Engineering
Apr 11, 2025 · Information Security

Security Analysis of MCP and A2A Protocols for AI Agents

The article examines critical security flaws in Anthropic’s Model Context Protocol (MCP) and Google’s Agent‑to‑Agent (A2A) protocol—such as hidden tool‑poisoning, rug‑pull, and command‑injection attacks that can hijack AI agents and leak data—while proposing hardening measures like authentication, sandboxing, digital signatures, fine‑grained permissions, and robust OAuth‑based consent to safeguard AI‑agent communications.

A2AAI AgentMCP
0 likes · 26 min read
Security Analysis of MCP and A2A Protocols for AI Agents
php Courses
php Courses
Apr 11, 2025 · Information Security

Best Practices for Securing PHP Files and Directories

This article explains the risks of exposing sensitive PHP files, outlines common security threats, and provides concrete best‑practice measures such as proper permission settings, .htaccess rules, placing files outside the web root, configuration safeguards, and regular security audits to protect web applications.

File PermissionsPHPinformation security
0 likes · 6 min read
Best Practices for Securing PHP Files and Directories
Code Mala Tang
Code Mala Tang
Apr 10, 2025 · Artificial Intelligence

How Google’s A2A Protocol Enables Seamless AI Agent Collaboration

Google’s A2A (Agent‑to‑Agent) protocol introduces a universal language that lets AI agents from different vendors and platforms communicate, cooperate, and jointly complete tasks, addressing the current isolation of agents and reducing integration complexity across cloud environments.

A2AAI agentsInteroperability
0 likes · 8 min read
How Google’s A2A Protocol Enables Seamless AI Agent Collaboration
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Apr 9, 2025 · Backend Development

Master Spring Boot 3: 8 Real-World Cases to Boost Your Backend Skills

This article presents eight practical Spring Boot 3 examples—including Resilience4j protection, custom Actuator endpoints, distributed transactions, caching, asynchronous programming, API gateway, OAuth2/JWT security, and scheduled tasks—each with code snippets and configuration guidance to help developers build robust backend services.

ActuatorSpring Bootcaching
0 likes · 8 min read
Master Spring Boot 3: 8 Real-World Cases to Boost Your Backend Skills
Efficient Ops
Efficient Ops
Apr 7, 2025 · Operations

10 Dangerous Yet Tempting Ops Tricks That Can Ruin Your Career

This article lists ten seemingly efficient but risky operations practices, explains why they feel attractive, details the potential data loss, security breaches, and downtime they can cause, and provides safer alternatives for reliable system administration.

best practicesrisk managementsecurity
0 likes · 10 min read
10 Dangerous Yet Tempting Ops Tricks That Can Ruin Your Career
MaGe Linux Operations
MaGe Linux Operations
Apr 7, 2025 · Information Security

Master SSH Remote Login: From Basics to Advanced Security Practices

This guide explains SSH fundamentals, protocol types, advantages, client and server software, key exchange mechanisms, encryption principles, configuration files, best‑practice hardening steps, and practical commands for secure remote access and file transfer on Linux systems.

OpenSSHRemote Loginsecurity
0 likes · 16 min read
Master SSH Remote Login: From Basics to Advanced Security Practices
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2025 · Information Security

How to Harden Linux Systems: Practical Security Steps for RHEL7

An in‑depth guide shows how to harden a RHEL 7 Linux server by tightening account permissions, enforcing password policies, limiting login attempts, changing SSH settings, restricting compiler use, protecting log files, applying minimal firewall rules, and enabling SELinux to achieve a B1‑level security baseline.

HardeningRHEL7SELinux
0 likes · 13 min read
How to Harden Linux Systems: Practical Security Steps for RHEL7
Liangxu Linux
Liangxu Linux
Mar 30, 2025 · Operations

Top 10 Server Ops Mistakes That Can Cripple Your Business

A concise guide lists the ten most dangerous server‑administration blunders—from forced power‑offs and reckless experiments in production to poor firewall, SSH, backup, and patch management—explaining real‑world incidents and practical safeguards to prevent costly outages and security breaches.

System Administrationbest practicessecurity
0 likes · 6 min read
Top 10 Server Ops Mistakes That Can Cripple Your Business
macrozheng
macrozheng
Mar 26, 2025 · Fundamentals

What’s New in Java 24? 24 Game‑Changing Features Explained

Java 24, the latest non‑LTS release, brings 24 new features across security, performance, and language enhancements—including KDF APIs, ahead‑of‑time class loading, a new class‑file API, stream gatherers, scoped values, and quantum‑resistant signatures—while previewing Java 25 for September.

JDKJEPJava24
0 likes · 15 min read
What’s New in Java 24? 24 Game‑Changing Features Explained
Java Backend Full-Stack
Java Backend Full-Stack
Mar 18, 2025 · Backend Development

18 Essential Practices for Designing Robust Backend APIs

The article outlines eighteen critical considerations for designing backend interfaces, ranging from documentation format and unified parameter schemas to encryption, idempotency, versioning, and monitoring, providing interview-ready insights that can impress hiring managers.

BackendIdempotencyVersioning
0 likes · 5 min read
18 Essential Practices for Designing Robust Backend APIs
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Mar 18, 2025 · Databases

Six Real-World Enterprise Use Cases of INFINI Gateway for Elasticsearch

The article examines six practical enterprise scenarios where INFINI Gateway enhances Elasticsearch clusters—covering zero‑cost security, intelligent query protection, automated slow‑query circuit breaking, high‑performance proxy architecture, fine‑grained read/write throttling, and end‑to‑end request logging—detailing problems, traditional limitations, and the gateway’s concrete solutions.

ElasticsearchInfinI GatewayLog Auditing
0 likes · 6 min read
Six Real-World Enterprise Use Cases of INFINI Gateway for Elasticsearch
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Mar 18, 2025 · Information Security

Uncovering MSSQL Attack Chains: Stored Procedures, COM, CLR, Triggers, and Lateral Movement

This article provides a comprehensive technical analysis of MSSQL attack vectors—including vulnerable stored procedures, COM automation, CLR exploitation, sandbox bypass, trigger abuse, proxy jobs, Kerberoasting, and linked servers—detailing prerequisites, step‑by‑step T‑SQL examples, mitigation recommendations, and overall impact on database security.

Attack ChainCLRCOM Automation
0 likes · 19 min read
Uncovering MSSQL Attack Chains: Stored Procedures, COM, CLR, Triggers, and Lateral Movement
Top Architect
Top Architect
Mar 17, 2025 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth 2.0 fundamentals, explains its roles and four grant types, and provides a step‑by‑step Spring Boot implementation with configuration classes, code snippets, and testing procedures, while also containing promotional material for AI‑related products and services.

APIAuthenticationOAuth2
0 likes · 12 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
Top Architect
Top Architect
Mar 16, 2025 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth 2.0 concepts, roles, and grant types, then provides a step‑by‑step Spring Boot implementation with configuration classes, dependency setup, resource server configuration, test controller code, and demonstrates how to obtain and use access tokens, followed by a series of promotional offers.

AuthorizationOAuth2security
0 likes · 14 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
Architect
Architect
Mar 15, 2025 · Artificial Intelligence

Why Building Your Own RAG System Is a Costly Mistake

The article explains that developing a custom Retrieval‑Augmented Generation (RAG) solution incurs hidden infrastructure, personnel, and security costs, leads to operational overload and budget overruns, and is rarely justified compared to purchasing a proven vendor solution.

AILLMRAG
0 likes · 11 min read
Why Building Your Own RAG System Is a Costly Mistake
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 14, 2025 · Information Security

Weaver-Enhanced Password Unlock Architecture and Security Analysis on Android

Weaver enhances Android’s password‑unlock system by moving rate‑limiting and secret storage into a Secure Element, protecting the authentication secret when the device is off and throttling repeated guesses with hardware timers, thereby hardening GateKeeper/KeyMint against offline brute‑force attacks despite added OMAPI latency.

AndroidGatekeeperKeyMint
0 likes · 7 min read
Weaver-Enhanced Password Unlock Architecture and Security Analysis on Android
php Courses
php Courses
Mar 14, 2025 · Backend Development

10 Common PHP Development Mistakes That Could Crash Applications in 2025 and How to Avoid Them

This article outlines ten frequent PHP development errors—such as outdated versions, insecure practices, overreliance on third‑party libraries, poor error handling, performance neglect, insufficient testing, maintainability issues, resource mismanagement, ignored user feedback, and flawed scaling strategies—and provides concrete code examples and solutions to prevent application crashes by 2025.

Error HandlingPHPbest practices
0 likes · 9 min read
10 Common PHP Development Mistakes That Could Crash Applications in 2025 and How to Avoid Them
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2025 · Operations

Master Nginx Optimization: Hide Version, Tune Workers, Enable Gzip & More

This guide walks through comprehensive Nginx service optimization techniques—including hiding the server version, adjusting user and group settings, configuring cache expiration, automating log rotation, fine‑tuning connection timeouts, scaling worker processes, enabling gzip compression, preventing hotlinking, and an overview of essential modules—providing clear commands and configuration snippets for each step.

Nginxsecurityserver optimization
0 likes · 10 min read
Master Nginx Optimization: Hide Version, Tune Workers, Enable Gzip & More
Tencent Cloud Developer
Tencent Cloud Developer
Mar 11, 2025 · Artificial Intelligence

Fine‑Tuning Local LLaMA‑Factory Models and Building Networked AI Applications

The article walks through preparing a GPU‑enabled environment, downloading and LoRA‑fine‑tuning a DeepSeek model with LLaMA‑Factory, merging the adapter, then wrapping the model in a web UI that queries a ChromaDB vector store via crawled web data, illustrating security‑focused use cases and forecasting domain‑specific LLM adoption.

AIFine-tuningLLM
0 likes · 17 min read
Fine‑Tuning Local LLaMA‑Factory Models and Building Networked AI Applications
php Courses
php Courses
Mar 10, 2025 · Backend Development

New Major Features in Laravel 12

Laravel 12 introduces a suite of enhancements—including smarter route caching, an improved queue system, optimized database query handling, upgraded Eloquent ORM, tighter default security settings, better testing support, and new Artisan commands—aimed at boosting performance, security, and developer productivity.

LaravelPHPWeb framework
0 likes · 6 min read
New Major Features in Laravel 12
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Mar 9, 2025 · Backend Development

Spring Boot 3 Security Tutorial: AOP, Custom Annotations & JWT

This article presents a continuously updated collection of over 100 Spring Boot 3 practical cases, demonstrating how to implement permission authentication using Spring AOP, custom annotations, JWT utilities, interceptors, a global exception handler, a security context, and a custom argument resolver, complete with test examples and screenshots.

JWTJavaSpring Boot
0 likes · 12 min read
Spring Boot 3 Security Tutorial: AOP, Custom Annotations & JWT
php Courses
php Courses
Mar 6, 2025 · Databases

10 Essential MySQLi Functions to Boost PHP Development Efficiency and Security

This article introduces ten powerful MySQLi functions—including prepared statements, parameter binding, result retrieval, batch queries, transaction control, charset setting, and connection monitoring—that enhance PHP developers’ ability to write secure, efficient, and maintainable code when interacting with MySQL databases.

PHPdatabaseperformance
0 likes · 6 min read
10 Essential MySQLi Functions to Boost PHP Development Efficiency and Security
Ops Development & AI Practice
Ops Development & AI Practice
Mar 5, 2025 · Cloud Computing

Master Advanced Terraform Techniques: Best Practices for Reliable IaC

This guide presents advanced Terraform techniques and best practices—including code style, modular design, state management, version control, CI/CD integration, security, and monitoring—to help engineers write more professional, maintainable, and secure infrastructure-as-code configurations.

State Managementbest-practicesinfrastructure-as-code
0 likes · 12 min read
Master Advanced Terraform Techniques: Best Practices for Reliable IaC
MaGe Linux Operations
MaGe Linux Operations
Mar 2, 2025 · Operations

Master vsftpd Configuration: 21 Essential Settings for Secure FTP

This guide walks through 21 key vsftpd configuration options—including command port changes, active/passive mode ports, anonymous access, user mapping, chroot restrictions, logging, PAM authentication, connection limits, transfer rates, timeouts, and ASCII mode—to help you securely set up and fine‑tune an FTP server on Linux.

FTPServer Configurationsecurity
0 likes · 9 min read
Master vsftpd Configuration: 21 Essential Settings for Secure FTP
Linux Ops Smart Journey
Linux Ops Smart Journey
Feb 27, 2025 · Information Security

Build Military‑Grade Kafka Security in Four Easy Steps

This guide walks you through four progressive stages—basic configuration, SSL encryption, SCRAM authentication, and combined SSL+SASL—showing how to harden Kafka with certificates, keystores, and client settings to achieve financial‑level protection.

Distributed MessagingKafkaSASL
0 likes · 9 min read
Build Military‑Grade Kafka Security in Four Easy Steps
php Courses
php Courses
Feb 26, 2025 · Backend Development

Best Practices for PHP Developers to Enhance User Experience (UX)

This article outlines essential PHP development best practices—including performance optimization, framework utilization, clean coding, security, mobile responsiveness, accessibility, template engines, testing, media optimization, and continuous monitoring—to help businesses build fast, secure, and user‑friendly web applications that drive better engagement and business outcomes.

PHPUser experienceaccessibility
0 likes · 20 min read
Best Practices for PHP Developers to Enhance User Experience (UX)
Java Tech Enthusiast
Java Tech Enthusiast
Feb 23, 2025 · Information Security

Why Windows 11’s UI and Security Flaws Frustrate Users and Developers

The article critiques Windows 11’s cumbersome secondary right‑click menu, weak permission controls that render UAC ineffective, rampant adware, and the platform’s poor developer experience, arguing that these design missteps undermine both user satisfaction and system security.

Developer ExperienceOperating SystemUser experience
0 likes · 7 min read
Why Windows 11’s UI and Security Flaws Frustrate Users and Developers
php Courses
php Courses
Feb 20, 2025 · Backend Development

Advanced Security Strategies and Tools for Laravel Applications

This article presents a comprehensive guide to securing Laravel applications, covering essential practices such as keeping the framework up to date, implementing CSP and HTTPS, preventing SQL injection and XSS, applying rate limiting, protecting environment files, and leveraging tools like Sanctum, Telescope, and security checkers.

LaravelPHPWeb Development
0 likes · 14 min read
Advanced Security Strategies and Tools for Laravel Applications
php Courses
php Courses
Feb 19, 2025 · Backend Development

Improving Development Practices in a Legacy PHP/MySQL Environment Without Version Control

The article recounts a developer’s experience modernizing a legacy PHP and MySQL codebase that lacked version control, detailing the challenges of disorganized code, security risks, and inefficient workflows, and describing the step‑by‑step solutions implemented to introduce backups, local Git, security hardening, and a structured development process.

PHPSoftware EngineeringVersion Control
0 likes · 10 min read
Improving Development Practices in a Legacy PHP/MySQL Environment Without Version Control
DevOps Cloud Academy
DevOps Cloud Academy
Feb 18, 2025 · Operations

How AI Is Transforming DevOps: 10 Key Benefits

AI is reshaping DevOps by enhancing automation, enabling predictive analytics, optimizing CI/CD pipelines, managing resources intelligently, strengthening security, accelerating incident response, driving data-driven decisions, scaling infrastructure, fostering collaboration, and promoting continuous learning, thereby boosting flexibility, scalability, and reliability of software delivery.

AIDevOpsResource Management
0 likes · 8 min read
How AI Is Transforming DevOps: 10 Key Benefits
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Feb 18, 2025 · Operations

Secure and Customize Kibana in One Click with INFINI Gateway

The article explains why exposing Kibana without protection is risky, then shows how to use INFINI Gateway to add Basic Auth, TLS encryption, and flexible routing rules—without changing Kibana itself—providing step‑by‑step configuration, validation screenshots, and ideas for further customization.

Basic AuthConfigurationInfinI Gateway
0 likes · 11 min read
Secure and Customize Kibana in One Click with INFINI Gateway
php Courses
php Courses
Feb 18, 2025 · Backend Development

Comprehensive Guide to PHP 8.4 File System Operations for Beginners

This article provides a thorough introduction to PHP 8.4 file system operations, covering core functions for file handling, directory management, and metadata retrieval, along with practical examples, best‑practice security tips, and real‑world use cases for web developers.

Backend DevelopmentFilesystemPHP
0 likes · 9 min read
Comprehensive Guide to PHP 8.4 File System Operations for Beginners
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Feb 17, 2025 · Information Security

Secure Elasticsearch with a Single InfinI Gateway: Adding TLS and Basic Auth

By placing an InfinI Gateway in front of Elasticsearch, you can quickly add Basic Authentication and TLS encryption without modifying the ES cluster, enabling unified security for legacy or multi‑version deployments, with step‑by‑step configuration examples, validation commands, and guidance on optional HTTP fallback.

Basic AuthElasticsearchInfinI Gateway
0 likes · 11 min read
Secure Elasticsearch with a Single InfinI Gateway: Adding TLS and Basic Auth
Radish, Keep Going!
Radish, Keep Going!
Feb 17, 2025 · Information Security

Why “Security Is Our Top Priority” Is Misleading: Balancing Safety and UX

This article critiques the empty slogan “Security is our top priority,” explores the endless nature of security, its conflict with user experience, and offers practical risk‑assessment frameworks to help organizations find a realistic balance between safety and usability.

User experienceinformation securityrisk management
0 likes · 12 min read
Why “Security Is Our Top Priority” Is Misleading: Balancing Safety and UX
DataFunSummit
DataFunSummit
Feb 13, 2025 · Information Security

Building and Optimizing a Comprehensive Security System: Practices, Innovations, and Future Outlook

This article presents a detailed walkthrough of constructing a robust security architecture, covering single‑person security team strategies, risk perception and quantification, rapid incident response, automated detection, precise strike mechanisms, deterrence tactics, and forward‑looking plans for intelligent, data‑driven risk management.

Security Architectureautomationfraud detection
0 likes · 21 min read
Building and Optimizing a Comprehensive Security System: Practices, Innovations, and Future Outlook
Code Mala Tang
Code Mala Tang
Feb 13, 2025 · Backend Development

Node.js 23.7.0 Highlights: TypeScript Integration, FS Glob Boosts, and Performance Gains

Node.js 23.7.0 introduces professional‑grade TypeScript integration with improved error handling, stronger fs module glob patterns with exclusion options, an upgraded test runner, enhanced SQLite support, security and encryption updates, worker thread improvements, performance gains, and detailed migration guidance for developers.

FilesystemNode.jsTypeScript
0 likes · 3 min read
Node.js 23.7.0 Highlights: TypeScript Integration, FS Glob Boosts, and Performance Gains
php Courses
php Courses
Feb 13, 2025 · Information Security

Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing

This article presents a thorough guide to securing PHP applications by managing Composer dependencies, hardening session handling, implementing CSRF defenses, sanitizing all inputs, enforcing strict type declarations, using prepared statements for database access, concealing sensitive error details, encapsulating critical operations, and incorporating security‑focused testing.

CSRFPHPWeb Development
0 likes · 16 min read
Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing
AntTech
AntTech
Feb 12, 2025 · Information Security

Selected Ant Group Papers Presented at NDSS 2025

The 2025 NDSS conference in San Diego featured five Ant Group papers covering secure forensics for compromised TrustZone, privacy‑preserving inference for large Transformers, LLM‑driven shell command explanation, a scalable randomness beacon protocol, and enclave construction within confidential virtual machines.

Confidential ComputingNDSSShell Command Explanation
0 likes · 9 min read
Selected Ant Group Papers Presented at NDSS 2025
Efficient Ops
Efficient Ops
Feb 11, 2025 · Information Security

Why Orion-Visor Is the Modern Bastion Host Redefining Secure Operations

This article explains the critical role of bastion hosts for network security, introduces Orion-Visor’s key features such as asset management, web‑based SSH and SFTP, batch operations and scheduled tasks, and provides step‑by‑step installation and configuration instructions.

Bastion HostInstallationOrion-Visor
0 likes · 4 min read
Why Orion-Visor Is the Modern Bastion Host Redefining Secure Operations
FunTester
FunTester
Feb 11, 2025 · Fundamentals

Reconsidering Java Serialization: Challenges and Modern Alternatives

Java serialization, while convenient for object persistence, suffers from security vulnerabilities, versioning issues, performance constraints, and difficulties handling complex object graphs, prompting developers to evaluate alternatives such as JSON, Protocol Buffers, and Apache Avro, each offering distinct trade‑offs in readability, efficiency, and safety.

Apache AvroJSONJava
0 likes · 9 min read
Reconsidering Java Serialization: Challenges and Modern Alternatives
Sanyou's Java Diary
Sanyou's Java Diary
Feb 10, 2025 · Backend Development

10 Essential Backend Optimization Techniques Every Developer Should Master

This comprehensive guide explores ten critical backend optimization strategies—from defensive validation and batch N+1 query elimination to asynchronous processing, parallel execution, caching, connection pooling, compression, message queuing, and design patterns—providing practical examples, Go code snippets, and best‑practice insights to boost performance and reliability.

Backend DevelopmentDesign PatternsPerformance Optimization
0 likes · 32 min read
10 Essential Backend Optimization Techniques Every Developer Should Master
Baidu Geek Talk
Baidu Geek Talk
Feb 10, 2025 · Artificial Intelligence

How Baidu Cloud Slashes Inference Costs: DeepSeek Model Optimizations Unveiled

Baidu Cloud's Qianfan platform launched DeepSeek‑R1 and DeepSeek‑V3 with ultra‑low inference pricing, leveraging advanced engine performance tweaks, a split Prefill/Decode architecture, and comprehensive security measures that together boost throughput, cut costs, and ensure enterprise‑grade reliability.

AI inferenceBaidu CloudModel Serving
0 likes · 5 min read
How Baidu Cloud Slashes Inference Costs: DeepSeek Model Optimizations Unveiled
Raymond Ops
Raymond Ops
Feb 6, 2025 · Databases

Master MongoDB Config: System Log, Network, Security & More

This article provides a comprehensive overview of MongoDB's configuration file, detailing system log options, process management, network settings, security parameters, storage engine configurations, slow query profiling, replication, sharding, and mongos-specific settings, with explanations of each option and recommended defaults.

MongoDBReplicationdatabase
0 likes · 12 min read
Master MongoDB Config: System Log, Network, Security & More
Top Architect
Top Architect
Jan 30, 2025 · Backend Development

OAuth 2.0 Tutorial with Spring Boot Implementation and Testing

This article introduces OAuth 2.0 concepts, explains its roles and grant types, and provides a complete Spring Boot implementation—including configuration classes, dependency setup, and test endpoints—followed by step‑by‑step testing results with screenshots.

AuthenticationBackendOAuth2
0 likes · 13 min read
OAuth 2.0 Tutorial with Spring Boot Implementation and Testing
php Courses
php Courses
Jan 26, 2025 · Backend Development

10 Critical PHP Development Mistakes That Could Break Your Application in 2025

This article outlines ten common PHP development errors—ranging from missing input validation and error handling to outdated versions, insecure session management, and lack of performance optimization—and provides practical recommendations to avoid them and keep applications robust.

Backend DevelopmentPHPbest practices
0 likes · 5 min read
10 Critical PHP Development Mistakes That Could Break Your Application in 2025
Raymond Ops
Raymond Ops
Jan 24, 2025 · Information Security

Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide

This tutorial explains how to enhance SSH security by integrating Google Authenticator for two‑factor authentication, covering SSH basics, Google Authenticator overview, Linux installation steps, PAM configuration, client setup on Android, browsers, and Python, with complete command examples.

Google AuthenticatorSSHTwo-Factor Authentication
0 likes · 9 min read
Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Jan 24, 2025 · Databases

Enable and Configure MariaDB Log Auditing with the Server_Audit Plugin

This guide walks through verifying the MariaDB server_audit plugin, installing it via configuration files or SQL, setting audit event variables, enabling logging, and restarting the MySQL service in a Kubernetes environment to achieve comprehensive query and connection auditing.

Database ConfigurationKubernetesLog Auditing
0 likes · 5 min read
Enable and Configure MariaDB Log Auditing with the Server_Audit Plugin
IT Architects Alliance
IT Architects Alliance
Jan 20, 2025 · Blockchain

How IT Architecture Can Address the Technical Challenges of Web3.0

Web3.0 introduces decentralized, blockchain‑based internet services that create performance bottlenecks, scalability, interoperability, and standardization challenges, and the article outlines how upgraded high‑performance blockchains, edge computing, modular micro‑service designs, cross‑chain solutions, and advanced security measures can help IT architectures meet these demands.

BlockchainIT ArchitectureScalability
0 likes · 10 min read
How IT Architecture Can Address the Technical Challenges of Web3.0
Open Source Linux
Open Source Linux
Jan 20, 2025 · Fundamentals

Why Linux Still Struggles on the Desktop: Core Issues Explained

The article examines why Linux desktop environments lag behind modern PCs, highlighting compatibility problems, software distribution challenges, hardware driver gaps, security concerns, and the lack of funding that together create a steep learning curve for non‑technical users.

CompatibilityDesktopHardware
0 likes · 15 min read
Why Linux Still Struggles on the Desktop: Core Issues Explained
ITPUB
ITPUB
Jan 14, 2025 · Information Security

How a Microsoft Patch Nearly Crashed Linux: Code Review, CFI, and Open‑Source Lessons

A Microsoft‑submitted performance patch for the x86_64 architecture was merged into Linux kernel 6.13 without maintainer acknowledgment, breaking control‑flow integrity and nearly causing a system‑wide failure, prompting swift emergency fixes from Intel and AMD engineers and sparking a broader discussion on open‑source code‑review practices.

CFICode reviewLinux kernel
0 likes · 5 min read
How a Microsoft Patch Nearly Crashed Linux: Code Review, CFI, and Open‑Source Lessons
php Courses
php Courses
Jan 14, 2025 · Databases

MySQL 8 New Features and Network Communication Course Overview

This course introduces MySQL 8's latest features—including performance optimizations, security enhancements, and new data types—while deeply exploring its network communication mechanisms, advanced optimization techniques, and hands‑on projects to improve database performance and security.

Coursedatabasemysql
0 likes · 3 min read
MySQL 8 New Features and Network Communication Course Overview
php Courses
php Courses
Jan 13, 2025 · Backend Development

25 Practical PHP Tips for Performance, Security, and Modern Development

These 25 practical PHP tips cover performance optimization, security best practices, code organization, modern language features, error handling, testing, caching, API development, and debugging, providing developers with actionable guidance to write higher-quality, more efficient, and secure server-side applications.

PHPbest practicesperformance
0 likes · 8 min read
25 Practical PHP Tips for Performance, Security, and Modern Development
Raymond Ops
Raymond Ops
Jan 12, 2025 · Information Security

Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands

This guide explains common certificate formats (PEM, DER, CRT, CER), shows how to generate a CA key, CSR, and signed certificate with OpenSSL, demonstrates format conversions, and provides commands for inspecting and verifying certificates, all essential for secure operations.

CertificateDEROpenSSL
0 likes · 7 min read
Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands
IT Architects Alliance
IT Architects Alliance
Jan 11, 2025 · Backend Development

Understanding API Gateways: Functions, Implementations, and a Spring Cloud Gateway Case Study

The article explains the rise of microservice architecture, why API gateways are indispensable, details their key functions such as routing, protocol translation, load balancing, caching, and security, compares major implementations like NGINX, Spring Cloud Gateway and Kong, and provides a Spring Cloud Gateway case study with code examples.

Microservicesroutingsecurity
0 likes · 18 min read
Understanding API Gateways: Functions, Implementations, and a Spring Cloud Gateway Case Study