Tagged articles
2153 articles
Page 7 of 22
php Courses
php Courses
Jan 13, 2025 · Backend Development

25 Practical PHP Tips for Performance, Security, and Modern Development

These 25 practical PHP tips cover performance optimization, security best practices, code organization, modern language features, error handling, testing, caching, API development, and debugging, providing developers with actionable guidance to write higher-quality, more efficient, and secure server-side applications.

PHPPerformancebest practices
0 likes · 8 min read
25 Practical PHP Tips for Performance, Security, and Modern Development
Raymond Ops
Raymond Ops
Jan 12, 2025 · Information Security

Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands

This guide explains common certificate formats (PEM, DER, CRT, CER), shows how to generate a CA key, CSR, and signed certificate with OpenSSL, demonstrates format conversions, and provides commands for inspecting and verifying certificates, all essential for secure operations.

CertificateDEROpenSSL
0 likes · 7 min read
Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands
IT Architects Alliance
IT Architects Alliance
Jan 11, 2025 · Backend Development

Understanding API Gateways: Functions, Implementations, and a Spring Cloud Gateway Case Study

The article explains the rise of microservice architecture, why API gateways are indispensable, details their key functions such as routing, protocol translation, load balancing, caching, and security, compares major implementations like NGINX, Spring Cloud Gateway and Kong, and provides a Spring Cloud Gateway case study with code examples.

Microservicesroutingsecurity
0 likes · 18 min read
Understanding API Gateways: Functions, Implementations, and a Spring Cloud Gateway Case Study
Tencent Cloud Developer
Tencent Cloud Developer
Jan 8, 2025 · Backend Development

Best Practices for Designing, Optimizing, Securing, and Maintaining APIs

This guide presents comprehensive best‑practice recommendations for building APIs—defining clear contracts, applying six design principles, optimizing performance through batching, async and caching, enforcing robust security with encryption, signing and rate‑limiting, and ensuring long‑term maintainability via versioning, documentation and structured logging.

api-designbackend-developmentbest practices
0 likes · 24 min read
Best Practices for Designing, Optimizing, Securing, and Maintaining APIs
Efficient Ops
Efficient Ops
Jan 5, 2025 · Operations

Master Linux Sysadmin: 20 Essential Commands & Solutions Explained

This guide presents 20 practical Linux, security, networking, and Python questions with step‑by‑step command examples, covering bulk image download, file sorting, port monitoring, header retrieval, user account facts, RAID misconceptions, load‑balancer tools, time measurement, rewrite flags, cookie vs session, HTTP versions, common web vulnerabilities, DoS attacks, incident response, TCP handshake, TIME_WAIT optimization, Python range differences, set intersections, and parallel remote execution.

BashPythonSysadmin
0 likes · 15 min read
Master Linux Sysadmin: 20 Essential Commands & Solutions Explained
Architect
Architect
Jan 5, 2025 · Information Security

How to Build a Dynamic IP Blacklist with Nginx, Lua, and Redis

This guide explains how to create a dynamic IP blacklist that blocks malicious crawlers or users by configuring Nginx with Lua scripts and a Redis store, covering requirements, environment setup, design choices, configuration files, Lua code, and advanced usage scenarios.

BackendLuaNGINX
0 likes · 9 min read
How to Build a Dynamic IP Blacklist with Nginx, Lua, and Redis
Architecture and Beyond
Architecture and Beyond
Jan 4, 2025 · Backend Development

From ToC to ToB: Key Shifts in SaaS Product Design, Architecture, and Business Logic

This article examines how SaaS products evolve from consumer‑focused (ToC) to enterprise‑focused (ToB) models, detailing differences in target users, pricing, product features, multi‑tenant architecture, scalability, high availability, security, compliance, and API integration strategies required for successful business‑to‑business transformation.

APIProduct ArchitectureSaaS
0 likes · 28 min read
From ToC to ToB: Key Shifts in SaaS Product Design, Architecture, and Business Logic
21CTO
21CTO
Jan 1, 2025 · R&D Management

What Will Shape Open Source in 2025? Rust, New Tools, and Fading Trends

Looking ahead to 2025, this article predicts that Rust will become mainstream in Linux kernel development, emerging tools like jj and uv will reshape version control and Python packaging, while trends such as SBOM, Fair Source licensing, and server‑side WebAssembly are expected to stall, underscoring the resilient yet selective evolution of open‑source software.

RustVersion Controlpython packaging
0 likes · 7 min read
What Will Shape Open Source in 2025? Rust, New Tools, and Fading Trends
Java Tech Enthusiast
Java Tech Enthusiast
Jan 1, 2025 · Information Security

Fixing Logback CVE-2023-6378 in Spring Boot 2.7.x

To remediate CVE‑2023‑6378 in a Spring Boot 2.7.x application, you must replace the default logging starter with a direct Logback 1.2.x dependency (e.g., 1.2.13), because Spring Boot 2.7 cannot use Logback 1.3.x due to the removed StaticLoggerBinder class; the only other option is to upgrade the whole stack to Spring Boot 3.x, Logback 1.4.x, and JDK 11.

CVE-2023-6378dependency managementjava
0 likes · 14 min read
Fixing Logback CVE-2023-6378 in Spring Boot 2.7.x
IT Architects Alliance
IT Architects Alliance
Dec 29, 2024 · Fundamentals

Five Common Mistakes in IT Architecture Design and How to Avoid Them

This article outlines five common IT architecture design errors—neglecting connectivity, postponing security, poor compatibility, uncontrolled data duplication, and unsynchronized environments—illustrated with real cases and provides practical strategies to prevent each pitfall and build resilient, efficient systems.

CompatibilityData ManagementEnvironment Sync
0 likes · 11 min read
Five Common Mistakes in IT Architecture Design and How to Avoid Them
dbaplus Community
dbaplus Community
Dec 29, 2024 · Information Security

Why Many Developers Warn Against Using JWTs for Authentication

This article explains what JSON Web Tokens are, outlines their typical usage flow, and critically examines their drawbacks such as size overhead, redundant signatures, revocation challenges, stale data, lack of encryption, and broader security concerns.

AuthenticationJWTSession Management
0 likes · 6 min read
Why Many Developers Warn Against Using JWTs for Authentication
IT Architects Alliance
IT Architects Alliance
Dec 25, 2024 · Industry Insights

How IT Architecture Powers the Metaverse: Key Technologies and Future Trends

The article examines how robust IT architecture—encompassing cloud and edge computing, high‑speed networks, AI, blockchain, and security measures—underpins the Metaverse, outlines current core technologies, explores emerging trends, and addresses performance, sustainability, and talent challenges shaping its evolution.

AIBlockchainEdge Computing
0 likes · 21 min read
How IT Architecture Powers the Metaverse: Key Technologies and Future Trends
Architect
Architect
Dec 23, 2024 · Information Security

How to Implement Enterprise Data Desensitization with MyBatis and Fastjson

This article explains why data desensitization is essential for modern enterprises, compares masking, obfuscation and encryption techniques, and provides step‑by‑step implementations for database, log, and output layers using MyBatis interceptors, Fastjson filters, and Spring MVC configuration.

Spring MVCdata desensitizationfastjson
0 likes · 13 min read
How to Implement Enterprise Data Desensitization with MyBatis and Fastjson
php Courses
php Courses
Dec 23, 2024 · Backend Development

Understanding PHP Built-in Objects and Their Practical Use

This article explains what PHP built-in objects are, categorizes them by request handling, file operations, database access, and exception handling, and demonstrates their usage with code examples to write more elegant, secure, and efficient backend code.

Built-in ObjectsException HandlingPHP
0 likes · 5 min read
Understanding PHP Built-in Objects and Their Practical Use
Cloud Native Technology Community
Cloud Native Technology Community
Dec 20, 2024 · Cloud Native

Key Highlights of the Kubernetes 1.32 “Penelope” Release

The Kubernetes 1.32 "Penelope" release, launched on December 11, introduces major enhancements such as improved Dynamic Resource Allocation, pod‑level resource specifications, asynchronous preemption, CEL‑based mutating admission, tighter security controls, graceful Windows node shutdown, full consistency test coverage, and several performance and networking upgrades.

Asynchronous PreemptionDynamic Resource AllocationKubernetes
0 likes · 6 min read
Key Highlights of the Kubernetes 1.32 “Penelope” Release
Radish, Keep Going!
Radish, Keep Going!
Dec 19, 2024 · Information Security

Why “Security Is Our Top Priority” Is Empty Talk—and How to Balance Security with UX

The article critiques hollow security‑first slogans, explores the endless nature of security, the tension between security and user experience, and offers practical risk‑scoring frameworks and phrasing advice for organizations seeking a realistic balance between protection and usability.

Information SecurityRisk managementUser experience
0 likes · 10 min read
Why “Security Is Our Top Priority” Is Empty Talk—and How to Balance Security with UX
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Dec 17, 2024 · Information Security

How Secure Are AI Agents? Risks, Attacks, and Governance Strategies

This article examines the rapid growth of AI agents, outlines their core components and classifications, analyzes a wide range of privacy and security threats—including data leakage, prompt injection, jailbreak, backdoor, hallucination, and memory attacks—and proposes practical governance measures to mitigate these risks.

AI agentsLLMgovernance
0 likes · 25 min read
How Secure Are AI Agents? Risks, Attacks, and Governance Strategies
Open Source Tech Hub
Open Source Tech Hub
Dec 17, 2024 · Backend Development

Essential Webman Development Standards and Best Practices

This guide outlines Webman’s latest development conventions, covering PHP version selection, naming rules, memory-resident processes, logging, routing, deployment, controller design, database queries, security measures, and more to help developers write clean, efficient, and secure code.

Database QueriesDeploymentPHP
0 likes · 22 min read
Essential Webman Development Standards and Best Practices
AntData
AntData
Dec 17, 2024 · Databases

Designing Database Services for Modern Online Business: Scalability, Agility, Security, and Cost Optimization

The article examines how database services must evolve to meet the high‑availability, real‑time response, horizontal scalability, application agility, security compliance, and cost‑optimization demands of modern online businesses, using Ant Group’s multi‑generation architecture and technologies such as distributed middleware, HTAP/HSAP, and polyglot persistence as examples.

Application AgilityCost OptimizationDatabase Services
0 likes · 22 min read
Designing Database Services for Modern Online Business: Scalability, Agility, Security, and Cost Optimization
Code Mala Tang
Code Mala Tang
Dec 16, 2024 · Information Security

Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps

This guide reveals nine frequent security mistakes in Node.js applications—from misconfigured CORS and vulnerable dependencies to weak authentication and missing HTTPS—offering concrete code‑level solutions and best‑practice recommendations to protect your backend.

AuthenticationCORSNode.js
0 likes · 8 min read
Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps
Architect's Guide
Architect's Guide
Dec 16, 2024 · Information Security

Understanding the Mechanics of QR Code Login and Token‑Based Authentication

This article explains how QR code login works by describing QR code fundamentals, token‑based authentication, and the step‑by‑step process—including QR generation, scanning, state transitions, and final confirmation—that enables a mobile device to securely authenticate a PC session.

AuthenticationMobileQR code
0 likes · 11 min read
Understanding the Mechanics of QR Code Login and Token‑Based Authentication
MaGe Linux Operations
MaGe Linux Operations
Dec 15, 2024 · Operations

Top Open-Source Tools for Unified Accounts, Automation & Infra Ops

This guide surveys a curated set of open‑source solutions—including LDAP, JumpServer, Ansible, dnsmasq, ApacheBench, PortSentry, Vagrant, Docker, ELK and Smokeping—that together enable unified account management, automated deployment, DNS services, stress testing, security hardening, virtualization, log collection and monitoring for robust operations.

Account ManagementInfrastructureautomation
0 likes · 8 min read
Top Open-Source Tools for Unified Accounts, Automation & Infra Ops
php Courses
php Courses
Dec 11, 2024 · Backend Development

Debunking Common Misconceptions About PHP

This article systematically dispels ten widespread myths about PHP—covering threading, project scale, security, modern relevance, usage scope, code quality, performance, object‑oriented support, learning depth, and scalability—showing that modern PHP remains a powerful, secure, and versatile backend technology.

PHPPerformanceScalability
0 likes · 8 min read
Debunking Common Misconceptions About PHP
Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Dec 3, 2024 · Backend Development

Master Advanced Spring Boot 3 Techniques: Output Control, Body Parsing, and Security Context

This article presents a collection of over 50 practical Spring Boot 3 examples, demonstrating how to directly write responses with OutputStream, read request bodies via InputStream, use @Value and SpEL for fixed parameters, combine body and headers with HttpEntity, access security data through @CurrentSecurityContext, and handle Map parameters with @ModelAttribute.

REST APIRequest Handlingannotations
0 likes · 7 min read
Master Advanced Spring Boot 3 Techniques: Output Control, Body Parsing, and Security Context
php Courses
php Courses
Dec 2, 2024 · Backend Development

Using PHP is_executable() to Check File Executability

This article explains the PHP is_executable() function, its definition, parameters, return values, and provides a detailed code example and usage scenarios for checking file executability and improving web application security for developers.

Code ExampleFile PermissionsPHP
0 likes · 4 min read
Using PHP is_executable() to Check File Executability
OPPO Amber Lab
OPPO Amber Lab
Nov 29, 2024 · Information Security

5 Real Android Native Memory Bugs: Heap Overflows, UAF, and Fixes

This article reviews five high‑severity Android native vulnerabilities, detailing how missing length checks, unsigned integer wrap‑around, thread‑lifecycle misuse, unlocked vectors, and out‑of‑scope pointers lead to heap overflows or use‑after‑free bugs, and presents the remediation steps recommended by Google.

AndroidMemory VulnerabilitiesUse-After-Free
0 likes · 12 min read
5 Real Android Native Memory Bugs: Heap Overflows, UAF, and Fixes
DevOps
DevOps
Nov 28, 2024 · Information Security

The Myths and Challenges of Security Left‑Shift in Software Development

This article examines the origins, questionable cost‑saving claims, and practical challenges of the security‑left‑shift movement, highlighting CISA’s skeptical report, the over‑reliance on tools, and the need for empirical research to validate security integration early in the software development lifecycle.

CISADevSecOpsShift-Left
0 likes · 11 min read
The Myths and Challenges of Security Left‑Shift in Software Development
IT Services Circle
IT Services Circle
Nov 27, 2024 · Databases

15 Common MySQL Pitfalls and How to Avoid Them

This article outlines fifteen typical MySQL pitfalls—including missing WHERE clauses, lack of indexes, improper NULL handling, wrong data types, deep pagination, missing EXPLAIN analysis, charset misconfiguration, SQL injection risks, transaction misuse, collation issues, overusing SELECT *, index loss, frequent schema changes, missing backups, and unarchived historical data—and provides concrete examples and best‑practice solutions to improve performance, reliability, and security.

Database OptimizationMySQLTransactions
0 likes · 13 min read
15 Common MySQL Pitfalls and How to Avoid Them
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 21, 2024 · Information Security

Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications

This article provides a comprehensive overview of Single Sign-On (SSO), explaining its core concepts, authentication flow, token generation and validation, and practical use cases across enterprises, education, finance, and e‑commerce, while also offering insights into security benefits and implementation details.

AuthenticationSSOToken
0 likes · 5 min read
Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications
dbaplus Community
dbaplus Community
Nov 18, 2024 · Cloud Native

10 Expert Tips to Master Kubernetes Architecture on Its 10th Anniversary

In this interview, CNCF ecosystem lead Taylor Dolezal shares ten practical recommendations for Kubernetes architects, covering security, resource optimization, observability, high‑availability, multi‑cluster networking, stateful workloads, CI/CD, lifecycle upgrades, documentation, and a learning roadmap for the next one to two years.

CI/CDDocumentationMulti-Cluster
0 likes · 21 min read
10 Expert Tips to Master Kubernetes Architecture on Its 10th Anniversary
IT Services Circle
IT Services Circle
Nov 15, 2024 · Backend Development

Best Practices for Designing Secure and Robust API Controller Interfaces

This guide outlines comprehensive techniques for building safe, repeatable, and maintainable API controller interfaces, covering signature generation, encryption, IP whitelisting, rate limiting, parameter validation, unified responses, exception handling, logging, idempotency, request size limits, stress testing, asynchronous processing, data masking, and complete documentation.

APIException HandlingIdempotency
0 likes · 15 min read
Best Practices for Designing Secure and Robust API Controller Interfaces
Java Tech Enthusiast
Java Tech Enthusiast
Nov 15, 2024 · Fundamentals

C++26 Reflections, Safety, and Emerging Security Guidelines

After 22 years at Microsoft, Herb Sutter departs for Citadel while staying ISO C++ chair, declaring 2024 pivotal as C++26 introduces reflection‑driven compile‑time libraries and default safety—potentially the most impactful release since C++11—while U.S. CISA and the FBI urge memory‑unsafe language users to publish safety roadmaps by January 2026.

C++26ReflectionSafety
0 likes · 6 min read
C++26 Reflections, Safety, and Emerging Security Guidelines
Architects' Tech Alliance
Architects' Tech Alliance
Nov 15, 2024 · Cloud Computing

Comprehensive Overview of Computing Power Networks: Definitions, Features, Architecture, and Future Directions

This article provides an in‑depth explanation of computing power networks, covering their definition, key characteristics such as elasticity, agility and security, underlying technologies like SRv6 and network slicing, architectural components including the brain, and emerging trends spanning AI, big data, optical networking and blockchain.

Cloud ComputingEdge Computingcomputing power
0 likes · 27 min read
Comprehensive Overview of Computing Power Networks: Definitions, Features, Architecture, and Future Directions
Java Tech Enthusiast
Java Tech Enthusiast
Nov 13, 2024 · Backend Development

Implementing Image Self‑Destruct Feature with Spring Boot and MySQL

This guide walks through building a Spring Boot and MySQL‑backed “burn after viewing” image sharing service, covering architecture, environment setup, entity and repository design, upload and automatic deletion logic, Thymeleaf UI with burn animation, error handling, optimization, and Docker deployment.

Image BurnMySQLSelf-Destruct
0 likes · 15 min read
Implementing Image Self‑Destruct Feature with Spring Boot and MySQL
Su San Talks Tech
Su San Talks Tech
Nov 12, 2024 · Backend Development

Designing Secure, Reliable API Controllers: Signatures, Encryption, Rate Limiting & More

This article outlines best‑practice techniques for building robust API controller interfaces, covering request signing, RSA encryption, IP whitelisting, rate limiting, parameter validation, unified responses, exception handling, logging, idempotency, record limits, stress testing, asynchronous processing, data masking, and comprehensive documentation.

api-designsecurity
0 likes · 16 min read
Designing Secure, Reliable API Controllers: Signatures, Encryption, Rate Limiting & More
Liangxu Linux
Liangxu Linux
Nov 10, 2024 · Operations

50 Essential Ops Troubleshooting & Fix Techniques Every Sysadmin Should Know

This guide compiles fifty practical troubleshooting and remediation techniques covering system, network, application, database, and security layers, enabling operations engineers to quickly diagnose common failures such as high load, service crashes, permission errors, and performance bottlenecks, and apply concrete fixes to maintain stable, secure services.

Operationsnetworksecurity
0 likes · 16 min read
50 Essential Ops Troubleshooting & Fix Techniques Every Sysadmin Should Know
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 1, 2024 · Fundamentals

Highlights of the 19th China Linux Kernel Developers Conference (CLK 2024)

The 19th China Linux Kernel Developers Conference in Wuhan on October 26, 2024 attracted over 80,000 online viewers and nearly 400 developers, showcased five technical sub‑forums—from memory and storage I/O to virtualization and scheduling—featured AI‑focused kernel talks, announced a new open‑source innovation institute, and made all materials publicly available on GitHub.

AILinux kernelMemory Management
0 likes · 9 min read
Highlights of the 19th China Linux Kernel Developers Conference (CLK 2024)
Selected Java Interview Questions
Selected Java Interview Questions
Oct 24, 2024 · Information Security

Guide to Using the Sensitive‑Word Java Library for Sensitive Word Detection and Replacement

This article provides a step‑by‑step tutorial on integrating the Sensitive‑Word Java library via Maven, demonstrates core find/replace APIs, showcases advanced detection features such as email, URL, IPv4 and custom replacement strategies, and includes complete code examples and output results.

BackendSensitive WordText Filtering
0 likes · 12 min read
Guide to Using the Sensitive‑Word Java Library for Sensitive Word Detection and Replacement
MaGe Linux Operations
MaGe Linux Operations
Oct 23, 2024 · Backend Development

How to Hide Nginx Version and Set a Custom Server Header

This guide walks you through downloading, compiling, and configuring Nginx so that the server version is hidden and a custom Server header is displayed, including step‑by‑step commands, source code edits, and verification methods.

BackendVersion Hidingcustom server header
0 likes · 4 min read
How to Hide Nginx Version and Set a Custom Server Header
AntTech
AntTech
Oct 22, 2024 · Fundamentals

Asterinas (星绽) OS: A Rust‑Based Framekernel Architecture Combining Macro‑Kernel Performance with Micro‑Kernel Security

Released by a consortium of Chinese research institutions, Asterinas (星绽) OS is an open‑source, Rust‑written operating system that introduces a novel framekernel architecture, aiming to deliver industrial‑grade security comparable to micro‑kernels while preserving the performance of traditional macro‑kernels for cloud and data‑center workloads.

Cloud ComputingKernel ArchitectureOperating System
0 likes · 7 min read
Asterinas (星绽) OS: A Rust‑Based Framekernel Architecture Combining Macro‑Kernel Performance with Micro‑Kernel Security
转转QA
转转QA
Oct 21, 2024 · Information Security

Implementation of Static Code Scanning in Zhuanzhuan's DevOps Platform

This article details Zhuanzhuan's practical implementation of static code scanning within its self‑built DevOps platform, covering its significance, architecture, incremental analysis methods, permission management, rule selection, promotion process, and challenges encountered, illustrating how it became a low‑cost, repeatable security safeguard in their CI/CD workflow.

CI/CDDevOpsSonarQube
0 likes · 10 min read
Implementation of Static Code Scanning in Zhuanzhuan's DevOps Platform
Open Source Linux
Open Source Linux
Oct 18, 2024 · Information Security

Why Do TCP Connections Send RST Packets? Causes and Analysis Explained

This article explains what TCP RST packets are, why they appear during connection establishment, data transfer, and termination, and how to diagnose server‑side, client‑side, and firewall‑induced resets by examining sequence diagrams, common error conditions, and TTL differences.

RSTTCPpacket analysis
0 likes · 9 min read
Why Do TCP Connections Send RST Packets? Causes and Analysis Explained
Data Thinking Notes
Data Thinking Notes
Oct 17, 2024 · Artificial Intelligence

Gartner 2024 Emerging Tech Curve: How Autonomous AI Will Transform Enterprises

According to Gartner’s 2024 Emerging Technology Maturity Curve, four disruptive tech themes—autonomous AI, developer productivity, holistic experience, and human‑centric security—are poised to reshape enterprises over the next decade, with autonomous AI moving beyond hype toward practical, self‑directed systems.

Autonomous AIExperiencedeveloper productivity
0 likes · 6 min read
Gartner 2024 Emerging Tech Curve: How Autonomous AI Will Transform Enterprises
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 17, 2024 · Information Security

Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks

After a night-time SMS spam attack that cost 400 RMB, the team analyzed the breach, evaluated various captcha methods—including text, slider, reCAPTCHA v2/v3, and 2FA—implemented temporary throttling, and ultimately adopted a combined reCAPTCHA and two‑factor authentication approach to strengthen account security.

2FACaptchaSMS attack
0 likes · 8 min read
Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks
21CTO
21CTO
Oct 15, 2024 · Operations

Why Windows 10’s Support End Is a Critical Turning Point for Users and the Market

With Windows 10 support ending on October 14 2025, users face a year‑long deadline that will force many to consider security risks, hardware upgrades, or alternative operating systems, while Microsoft’s push for Windows 11 adoption raises questions about market share and e‑waste.

Operating SystemSupport LifecycleWindows 10
0 likes · 5 min read
Why Windows 10’s Support End Is a Critical Turning Point for Users and the Market
IT Architects Alliance
IT Architects Alliance
Oct 14, 2024 · Frontend Development

Jamstack Explained: Key Benefits, Challenges, and Best Practices

This article explores the Jamstack architecture—its core concepts of JavaScript, APIs, and markup, the essential tooling like static site generators and headless CMS, and examines its performance, security, scalability benefits alongside challenges such as dynamic content handling, build times, and SEO, offering practical best‑practice recommendations.

Frontend ArchitectureJamstackPerformance
0 likes · 10 min read
Jamstack Explained: Key Benefits, Challenges, and Best Practices
php Courses
php Courses
Oct 12, 2024 · Backend Development

Modern Secure Session Management in PHP: Replacing session_register()

This tutorial explains why the legacy PHP function session_register() was deprecated and guides developers through modern, secure session management techniques such as using the $_SESSION superglobal, regenerating session IDs, enforcing expiration, setting secure cookie flags, CSRF tokens, and encrypting session data.

BackendPHPWeb Development
0 likes · 8 min read
Modern Secure Session Management in PHP: Replacing session_register()
DevOps Operations Practice
DevOps Operations Practice
Oct 10, 2024 · Operations

Seven Key Truths About Operations: Downtime, Automation, Prevention, Technology as a Tool, DevOps, Communication, and Security

Effective operations management acknowledges inevitable downtime, emphasizes automation, prioritizes proactive prevention, treats technology as a means rather than an end, integrates closely with development through DevOps, relies on strong communication, and continuously addresses pervasive security challenges to minimize business impact.

Operationsautomationdowntime
0 likes · 5 min read
Seven Key Truths About Operations: Downtime, Automation, Prevention, Technology as a Tool, DevOps, Communication, and Security
Test Development Learning Exchange
Test Development Learning Exchange
Oct 7, 2024 · Interview Experience

30 Must‑Know Interview Questions & Answers for Modern Software Development

This article compiles 30 essential interview questions covering fundamentals, API pagination, HTTP status codes, JSON schema validation, CORS, test automation frameworks, pytest parametrization and fixtures, mocking, coverage testing, load and stress testing, Locust and JMeter usage, security testing such as SQL injection, XSS, OAuth2, JWT, CI/CD concepts with Jenkins, GitHub Actions, Travis CI, Docker, and Python code quality tools like static analysis, black formatting, unit testing, refactoring, and technical debt management, each accompanied by concise explanations and runnable code snippets.

APICI/CDPerformance Testing
0 likes · 15 min read
30 Must‑Know Interview Questions & Answers for Modern Software Development
Liangxu Linux
Liangxu Linux
Oct 6, 2024 · Operations

Master Linux DNS: From Fundamentals to Advanced BIND9 Configuration

This guide walks Linux system administrators through DNS fundamentals, client configuration files, NetworkManager and systemd-resolved settings, BIND9 server installation and zone setup, plus advanced techniques like DNSSEC, DoH, split views, load balancing, troubleshooting tools, and security best practices.

Networkingbind9security
0 likes · 10 min read
Master Linux DNS: From Fundamentals to Advanced BIND9 Configuration
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Master Nmap: Essential Commands and Scanning Techniques Explained

This guide walks through common Nmap commands, explains key options such as -A, -T4, and -sn, demonstrates host discovery, port and service detection, OS fingerprinting, and provides practical examples with output screenshots to help readers efficiently assess network security.

Network ScanningOS detectionhost discovery
0 likes · 15 min read
Master Nmap: Essential Commands and Scanning Techniques Explained
php Courses
php Courses
Sep 30, 2024 · Backend Development

How to Use PHP's setcookie Function to Set Cookies

This article explains PHP's setcookie function, detailing its syntax, parameter meanings, and providing several practical code examples for creating cookies with different lifetimes, paths, domains, and security flags, while also noting how to retrieve cookies using the $_COOKIE superglobal.

BackendPHPWeb Development
0 likes · 4 min read
How to Use PHP's setcookie Function to Set Cookies
Python Programming Learning Circle
Python Programming Learning Circle
Sep 29, 2024 · Operations

Resolving Common Jenkins Issues: Plugin Compatibility, CSP, Path Configuration, Clone Timeouts, and More

This guide details eleven frequent Jenkins problems—including Performance plugin incompatibility, CSP restrictions, custom URL paths, Git clone timeouts, jar replacement, CSRF disabling, disk‑space optimization, global environment variables, managed scripts, and lightweight backups—along with step‑by‑step solutions and configuration snippets.

JenkinsPerformanceplugin compatibility
0 likes · 10 min read
Resolving Common Jenkins Issues: Plugin Compatibility, CSP, Path Configuration, Clone Timeouts, and More
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 23, 2024 · Databases

Misuse of Wildcards in MySQL GRANT Statements Leads to Permission Errors and How to Avoid Them

This article explains how using the '_' and '%' wildcards in MySQL GRANT statements can unintentionally broaden privileges, illustrates the security risks with concrete examples and version‑specific behavior, and provides practical guidance on escaping wildcards, auditing existing grants, and preventing privilege loss.

GrantMySQLPermissions
0 likes · 14 min read
Misuse of Wildcards in MySQL GRANT Statements Leads to Permission Errors and How to Avoid Them
DevOps Operations Practice
DevOps Operations Practice
Sep 22, 2024 · Information Security

How to Disable a User Account on Linux

This step‑by‑step guide explains how to safely disable a Linux user account by opening a terminal, checking the account status, locking the login with usermod, verifying the lock, and optionally re‑enabling the account, all using simple command‑line instructions.

LinuxUser Managementaccount-disable
0 likes · 3 min read
How to Disable a User Account on Linux
Architect
Architect
Sep 20, 2024 · Backend Development

18 Essential API Design Rules Every Backend Engineer Should Follow

This article presents a comprehensive checklist of 18 practical API design rules—including signature, encryption, IP whitelisting, rate limiting, validation, unified responses, exception handling, logging, idempotency, pagination, stress testing, async processing, data masking, documentation, request methods, headers, batch operations, and single‑responsibility principles—to help developers build secure, maintainable, and high‑performance services.

BackendDocumentationIdempotency
0 likes · 18 min read
18 Essential API Design Rules Every Backend Engineer Should Follow
Selected Java Interview Questions
Selected Java Interview Questions
Sep 20, 2024 · Information Security

Generating and Verifying Java License Files with TrueLicense

This article explains how to generate a Java license using TrueLicense, configure key pairs, create the license file, and integrate verification and installation steps into a Spring Boot application, including detailed code examples and deployment considerations for secure software licensing.

CodeExampleLicenseSpringBoot
0 likes · 15 min read
Generating and Verifying Java License Files with TrueLicense
Liangxu Linux
Liangxu Linux
Sep 19, 2024 · Information Security

Encrypt Your Shell Scripts with gzexe: A Complete Step‑by‑Step Guide

This tutorial explains how to use the gzexe utility to encrypt a shell script, covering script preparation, making it executable, running gzexe to produce a compressed encrypted file, verifying and executing the encrypted script, optional decryption, and notes on security limitations and installation.

Linuxencryptiongzexe
0 likes · 4 min read
Encrypt Your Shell Scripts with gzexe: A Complete Step‑by‑Step Guide
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 19, 2024 · Information Security

01 Background Introduction

The article introduces the concept of an egress gateway, explains why iQIYI’s member‑cooperation services require a unified outbound gateway to handle IP‑whitelisting and external access, critiques the limitations of an Nginx proxy, and describes adopting APISIX with security, traffic‑control plugins and a UI‑driven URL translation layer.

APISIXegress gatewaysecurity
0 likes · 13 min read
01 Background Introduction
php Courses
php Courses
Sep 14, 2024 · Backend Development

Using PHP password_hash for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, demonstrates code examples for hashing and verifying passwords, discusses automatic salting, and highlights best practices for protecting user credentials.

BackendHashingpassword_hash
0 likes · 5 min read
Using PHP password_hash for Secure Password Hashing
Top Architecture Tech Stack
Top Architecture Tech Stack
Sep 9, 2024 · Information Security

A Developer’s Hidden Backdoor: MAC Address Modification Blocked by Intentional Code

The article recounts a real‑world incident where a device’s MAC address could not be changed because a previous engineer deliberately disabled the relevant function, discusses the discovery of the backdoor code, and examines the legal and ethical implications of such intentional vulnerabilities.

Code reviewLinux kernelMAC address
0 likes · 4 min read
A Developer’s Hidden Backdoor: MAC Address Modification Blocked by Intentional Code
Architecture Digest
Architecture Digest
Sep 8, 2024 · Information Security

Combining JWT and Session for Secure Authentication and State Management

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their respective roles, the reasons for using Session alongside JWT, and offering Java code examples that illustrate their combined implementation.

AuthenticationBackendJWT
0 likes · 7 min read
Combining JWT and Session for Secure Authentication and State Management
Java Tech Enthusiast
Java Tech Enthusiast
Sep 4, 2024 · Information Security

Spring and Nacos Security Vulnerabilities and Mitigation Guide

Recent disclosures revealed critical Spring DoS flaws (CVE‑2024‑38809 and CVE‑2024‑38808) exploitable via oversized If‑Match/If‑None‑Match headers and malicious SpEL expressions, plus a Nacos 2.4.1 vulnerability allowing arbitrary file read/write through port 7848, mitigated by upgrading to the patched Spring and Nacos releases or restricting the vulnerable ports.

CVENacosVulnerability
0 likes · 7 min read
Spring and Nacos Security Vulnerabilities and Mitigation Guide
php Courses
php Courses
Sep 4, 2024 · Backend Development

Using PHP's is_executable() Function to Check File Executability

This article explains PHP's is_executable() function, its definition, parameters, return values, provides a full code example, discusses usage notes, and outlines common scenarios such as securing uploaded files, checking executable status, and verifying file permissions.

BackendFile Permissionsis_executable
0 likes · 4 min read
Using PHP's is_executable() Function to Check File Executability
Java Tech Enthusiast
Java Tech Enthusiast
Sep 1, 2024 · Information Security

XSS Defense in Spring Boot Applications

The article explains how to protect Spring Boot applications from XSS attacks by using custom annotations such as @XSS with an XssValidator and by implementing a request‑filter chain—including XssFilter and XssWrapper—to sanitize input, demonstrating through tests that both approaches reliably secure user data.

Web ApplicationXSSdefense
0 likes · 14 min read
XSS Defense in Spring Boot Applications
Architecture and Beyond
Architecture and Beyond
Aug 30, 2024 · Information Security

Comprehensive Security Strategy for SaaS Startups: External and Internal Measures

This guide outlines a complete security strategy for SaaS startups, covering external threats such as network attacks and data leaks, as well as internal risks like access control, host protection, code safety, log management, and third‑party integration, providing practical solutions and best‑practice recommendations.

Data ProtectionExternal ThreatsInternal Controls
0 likes · 20 min read
Comprehensive Security Strategy for SaaS Startups: External and Internal Measures
php Courses
php Courses
Aug 30, 2024 · Backend Development

New Features and Changes in PHP 8.4 Release (Nov 21, 2024)

PHP 8.4, released on November 21, 2024, introduces performance, usability, and security enhancements such as property hooks, a parenthesis‑free new operator, powerful array functions, an HTMLDocument class, new Sodium algorithms, a request parsing helper, stricter type declarations, JIT optimizations, and migration of several extensions to PECL.

BackendHTML5PHP
0 likes · 3 min read
New Features and Changes in PHP 8.4 Release (Nov 21, 2024)
Java Tech Enthusiast
Java Tech Enthusiast
Aug 29, 2024 · Backend Development

Comprehensive Backend Interview Guide: Network, Security, JVM, Spring, Redis, MySQL and More

The guide equips candidates for backend interviews by covering essential networking (HTTP/HTTPS, TLS handshake, status codes, headers, OCSP, session resumption, CSRF), RPC frameworks, Java class-loading and JVM memory/GC, OS process/thread scheduling, Spring bean lifecycle, Redis caching pitfalls, and MySQL indexing and query optimization.

BackendJVMMySQL
0 likes · 44 min read
Comprehensive Backend Interview Guide: Network, Security, JVM, Spring, Redis, MySQL and More
MaGe Linux Operations
MaGe Linux Operations
Aug 29, 2024 · Databases

Database Server Ops: Hardware, Tuning, Backup & Security Best Practices

This guide outlines comprehensive best practices for database server operations, covering hardware selection, OS and kernel tuning, storage choices, MySQL configuration, performance monitoring, backup strategies, security measures, high availability, automation, and systematic maintenance procedures to ensure optimal reliability and efficiency.

BackupOperationsdatabases
0 likes · 7 min read
Database Server Ops: Hardware, Tuning, Backup & Security Best Practices
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Aug 28, 2024 · Information Security

Understanding Single Sign-On (SSO): Principles, Implementation Steps, Challenges, and Applications

This article explains the concept of Single Sign‑On (SSO), outlines its implementation process—including user redirection, token generation, and cross‑system authentication—discusses challenges such as single point of failure, complexity, and cross‑domain issues, and highlights typical use cases in enterprise and e‑commerce environments.

SSOenterprise architecturesecurity
0 likes · 6 min read
Understanding Single Sign-On (SSO): Principles, Implementation Steps, Challenges, and Applications
21CTO
21CTO
Aug 28, 2024 · Fundamentals

Linus Torvalds on Linux Kernel’s Future: Versions, Rust, AI, and Security

At the 2024 OpenSource Summit China in Hong Kong, Linus Torvalds and Dirk Hohndel discussed the Linux kernel’s development roadmap, release cadence, security practices, the slow adoption of Rust, and the potential role of AI, while sharing candid views on cloud, Kubernetes, and legacy kernel support.

AILinuxOpenSource Summit
0 likes · 12 min read
Linus Torvalds on Linux Kernel’s Future: Versions, Rust, AI, and Security
大转转FE
大转转FE
Aug 23, 2024 · Information Security

How OAuth2.0 Powers Third‑Party Login: From WeChat to Secure Token Flows

This article explains third‑party authorization login, using WeChat as a concrete example, and provides a detailed walkthrough of the OAuth2.0 protocol, its roles, grant types, token handling, and implementation steps for mobile and web applications.

Authorization CodeOAuth2.0WeChat
0 likes · 24 min read
How OAuth2.0 Powers Third‑Party Login: From WeChat to Secure Token Flows
Inke Technology
Inke Technology
Aug 21, 2024 · Information Security

Can You Hide Android App Features from AI‑Based Detection? A Dynamic Obfuscation Guide

This article explores why Android apps are increasingly linked in AI‑driven security assessments, examines academic papers on feature extraction, compares static and dynamic obfuscation techniques, reviews industry protection solutions, and proposes a plug‑in‑based dynamic obfuscation framework that maximizes feature dispersion while preserving app functionality.

AndroidApp ObfuscationDynamic analysis
0 likes · 40 min read
Can You Hide Android App Features from AI‑Based Detection? A Dynamic Obfuscation Guide
Architect
Architect
Aug 16, 2024 · Information Security

How to Patch Critical Spring & Nacos Vulnerabilities in 2024

This article analyzes recent critical security flaws in Spring Framework (CVE‑2024‑38808 and CVE‑2024‑38809) and Nacos Jraft port, explains their impact, provides version‑specific mitigation steps, code snippets for Spring Boot fixes, and offers additional hardening recommendations for developers and operators.

CVE-2024-38808CVE-2024-38809Nacos
0 likes · 7 min read
How to Patch Critical Spring & Nacos Vulnerabilities in 2024
FunTester
FunTester
Aug 14, 2024 · Backend Development

Mastering Java Agents: Build, Package, and Deploy Runtime Instrumentation

This guide explains what Java Agents are, their core capabilities such as bytecode enhancement, performance monitoring, security checks, and debugging, and provides step‑by‑step instructions for implementing the premain method, creating a ClassFileTransformer, packaging the agent with Maven, and loading it both statically and dynamically.

InstrumentationJava Agentbytecode
0 likes · 10 min read
Mastering Java Agents: Build, Package, and Deploy Runtime Instrumentation
Architect
Architect
Aug 9, 2024 · Backend Development

Why Nginx Outperforms Others: Deep Dive into Architecture, Modules, and Tuning

This comprehensive guide explains Nginx's high‑performance architecture, module system, multi‑process model, FastCGI integration, configuration best practices, tuning techniques, error troubleshooting, and a known PHP‑related vulnerability, providing practical steps for optimal deployment on Linux servers.

LinuxNGINXPerformance Tuning
0 likes · 47 min read
Why Nginx Outperforms Others: Deep Dive into Architecture, Modules, and Tuning