Tagged articles
2152 articles
Page 9 of 22
DevOps Operations Practice
DevOps Operations Practice
Apr 8, 2024 · Fundamentals

Fundamentals of Computer Networking: Key Concepts and Definitions

This article provides concise definitions and explanations of essential networking concepts, including links, OSI model layers, backbone networks, LAN, nodes, routers, VPN, NAT, subnet masks, data encapsulation, TCP/IP, protocols, and security mechanisms, serving as a fundamental reference for beginners.

NetworkingOSI modelProtocols
0 likes · 14 min read
Fundamentals of Computer Networking: Key Concepts and Definitions
ITPUB
ITPUB
Apr 7, 2024 · Databases

How to Choose the Right Database Management Tool: Expert DBA Insights

In this interview, a senior database operations manager shares why building a lightweight, purpose‑built tool is essential, outlines a systematic selection process based on clear operational needs, and highlights key criteria such as usability, security, and controllability while recommending practical solutions.

DBADatabase ToolsTool Selection
0 likes · 8 min read
How to Choose the Right Database Management Tool: Expert DBA Insights
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Apr 4, 2024 · Fundamentals

Essential Networking Q&A: 100 Key Concepts Explained

This article provides concise explanations for 100 fundamental networking questions, covering links, OSI layers, backbone networks, LAN, nodes, routers, point‑to‑point links, anonymous FTP, subnet masks, UTP cable limits, data encapsulation, network topologies, VPN, NAT, routing, fault tolerance, cable standards, IP classes, routing protocols, security measures, NICs, WAN, physical layer, TCP/IP layers, proxy servers, session layer, clustering, antivirus placement, Ethernet, ring topology, CSMA/CD vs CSMA/CA, SMTP, multicast routing, encryption, IP address formatting, authentication, tunnel mode, WAN link technologies, mesh topology, hardware troubleshooting, signal attenuation, DHCP, network permissions, VLANs, IPv6, RSA, and more.

IP addressingNetworkingOSI model
0 likes · 30 min read
Essential Networking Q&A: 100 Key Concepts Explained
Baidu Geek Talk
Baidu Geek Talk
Apr 1, 2024 · Information Security

How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions

This article traces the evolution of login authentication—from simple username/password and cookie storage to token‑based, OAuth, and sub‑token architectures—while presenting practical one‑click login methods such as carrier mobile verification, trusted device history, and facial recognition, and it looks ahead to AI‑driven, privacy‑focused identity systems.

Identity ManagementOAuthToken
0 likes · 14 min read
How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions
AntTech
AntTech
Mar 28, 2024 · Information Security

Web3 Phishing Attacks: Methods, Risks, and Countermeasures

This article examines the rapid rise of Web3 phishing, detailing various attack vectors such as transaction‑based phishing, eth_sign blind signing, modal phishing, approval abuse, address‑poisoning, and zero‑transfer tricks, while presenting detection methods and Ant Group’s multi‑dimensional anti‑money‑laundering platform as a countermeasure.

BlockchainWeb3phishing
0 likes · 16 min read
Web3 Phishing Attacks: Methods, Risks, and Countermeasures
21CTO
21CTO
Mar 26, 2024 · Artificial Intelligence

How GitHub’s New AI Auto‑Fixes Vulnerabilities in Real Time

GitHub and Entry have introduced an AI‑powered Code Scanning Autofix that automatically detects, prioritizes, and repairs security flaws in JavaScript, TypeScript, Java, and Python code, dramatically speeding up vulnerability remediation for private repositories.

AICode ScanningCodeQL
0 likes · 7 min read
How GitHub’s New AI Auto‑Fixes Vulnerabilities in Real Time
Selected Java Interview Questions
Selected Java Interview Questions
Mar 25, 2024 · Databases

Redis Best Practices: Memory Management, Performance Tuning, Reliability, Operations, and Security

This comprehensive guide outlines practical Redis best practices covering memory optimization, key design, data type selection, performance enhancements, high‑availability deployment, operational safeguards, security hardening, and monitoring to help engineers build stable, efficient caching solutions.

Reliabilitybest practicescaching
0 likes · 15 min read
Redis Best Practices: Memory Management, Performance Tuning, Reliability, Operations, and Security
MaGe Linux Operations
MaGe Linux Operations
Mar 21, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: Step‑by‑Step Guide

This article walks through a real‑world Linux server breach, detailing the observed symptoms, investigative commands, hidden malicious scripts, file‑locking tricks, and a comprehensive remediation process that includes tightening security groups, strengthening passwords, monitoring critical files, and restoring compromised system utilities.

ForensicsLD_PRELOADLinux
0 likes · 14 min read
How to Detect and Recover from a Linux Server Intrusion: Step‑by‑Step Guide
Top Architect
Top Architect
Mar 20, 2024 · Information Security

Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks

This article explains how Single Sign-On (SSO) and OAuth2.0 enable seamless authentication across micro‑service applications, compares session‑based, token‑based, OAuth‑based, and SAML‑based SSO approaches, outlines OAuth2.0 grant types, and introduces popular frameworks such as Spring Security OAuth, Keycloak, and Apache Oltu.

OAuth2.0SSOsecurity
0 likes · 11 min read
Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks
MaGe Linux Operations
MaGe Linux Operations
Mar 18, 2024 · Cloud Native

Is Your Kubernetes Setup Secure? A Complete Best‑Practice Checklist

This article provides a thorough checklist covering application deployment, service governance, and cluster configuration in Kubernetes, including health probes, graceful shutdown, fault tolerance, resource limits, labeling, logging, scaling, RBAC, network policies, and compliance with CIS benchmarks.

Cloud NativeKubernetesOperations
0 likes · 27 min read
Is Your Kubernetes Setup Secure? A Complete Best‑Practice Checklist
Ops Development Stories
Ops Development Stories
Mar 18, 2024 · Cloud Native

13 Essential Kubernetes Tips to Boost Scalability, Security, and Management

Discover 13 practical Kubernetes techniques—including PreStop hooks, automatic secret rotation, ephemeral containers, custom metric autoscaling, init containers, node affinity, taints and tolerations, pod priority, ConfigMaps, debugging tools, resource requests, CRDs, and API automation—to enhance application reliability, scalability, and security in cloud‑native environments.

Kubernetespod managementscaling
0 likes · 21 min read
13 Essential Kubernetes Tips to Boost Scalability, Security, and Management
Java Captain
Java Captain
Mar 14, 2024 · Fundamentals

Why and How to Upgrade from JDK 8 to JDK 19: Benefits, Considerations, and New Features

Upgrading from JDK 8 to JDK 19 brings significant performance, security, and modularity improvements, but requires careful compatibility testing, performance evaluation, and security checks, while offering new features such as Text Blocks, Virtual Threads, Record Patterns, and enhanced APIs, positioning Java for future cloud, big data, and AI workloads.

JDKNewFeaturesjava
0 likes · 6 min read
Why and How to Upgrade from JDK 8 to JDK 19: Benefits, Considerations, and New Features
Java Tech Enthusiast
Java Tech Enthusiast
Mar 14, 2024 · Information Security

VM Escape via Chrome and VMware: Six‑CVE Attack Chain

A Korean security firm demonstrated a real‑world VM‑escape chain in which a user clicking a malicious Chrome link inside a VMware guest triggers six linked CVEs—two Chrome sandbox bypasses, two Windows kernel driver flaws, a VM‑information leak, and a Bluetooth buffer overflow—ultimately granting the attacker host‑level code execution and full system compromise.

CVEChromeVM Escape
0 likes · 5 min read
VM Escape via Chrome and VMware: Six‑CVE Attack Chain
Java Tech Enthusiast
Java Tech Enthusiast
Mar 13, 2024 · Information Security

Understanding QR Code Login and Token-Based Authentication

QR‑code login lets a already‑authenticated mobile app scan a code shown on a PC, using a server‑issued token tied to the user’s account and device ID; the scan creates a temporary token, the user confirms, and a permanent token is issued to the PC, enabling password‑less, secure authentication.

AuthenticationBackendMobile
0 likes · 11 min read
Understanding QR Code Login and Token-Based Authentication
php Courses
php Courses
Mar 13, 2024 · Backend Development

A Comprehensive Roadmap to Becoming a PHP Expert

This guide outlines a step‑by‑step learning path for aspiring PHP developers, covering environment setup, core language fundamentals, front‑end basics, database mastery, popular frameworks, CI/CD practices, and additional topics such as security, version control, API design, performance optimization, and Linux deployment.

ci/cdframeworkssecurity
0 likes · 8 min read
A Comprehensive Roadmap to Becoming a PHP Expert
Java Captain
Java Captain
Mar 7, 2024 · Information Security

Requirements Analysis and Technical Implementation of Java Image Captcha

This article analyzes the security, usability, performance, and scalability requirements of Java image captchas and proposes a technical solution covering generation, verification, and optimization to build a safe, efficient, and user‑friendly validation mechanism.

CaptchaScalabilityUsability
0 likes · 5 min read
Requirements Analysis and Technical Implementation of Java Image Captcha
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Mar 6, 2024 · Cloud Computing

Understanding IaaS: Definition, Features, Core Technologies, and Application Scenarios

This article provides a comprehensive overview of IaaS, detailing its definition, core characteristics, underlying technologies such as virtualization and automation, and common use cases, while highlighting benefits like cost reduction, elasticity, high availability, and security in cloud environments.

IaaSInfrastructure as a ServiceVirtualization
0 likes · 8 min read
Understanding IaaS: Definition, Features, Core Technologies, and Application Scenarios
php Courses
php Courses
Mar 5, 2024 · Backend Development

Using PHP's is_executable() Function to Check File Executability

This article explains PHP's is_executable() function, detailing its definition, parameters, return values, and providing a complete code example with explanations, usage notes, and common scenarios such as checking uploaded files, executable status, and permission verification to enhance system security.

File PermissionsPHPis_executable
0 likes · 4 min read
Using PHP's is_executable() Function to Check File Executability
DataFunTalk
DataFunTalk
Mar 4, 2024 · Big Data

Design and Implementation of a Lakehouse‑Integrated Data Platform for Financial Innovation by Shuxin Network

This article presents Shuxin Network's practical experience in building a cloud‑native, lakehouse‑integrated data platform for the financial sector, covering architecture evolution, challenges of domestic‑innovation (信创), the DataCyber solution, core components, deployment roadmap, and real‑world case studies.

Big DataCloud NativeData Platform
0 likes · 21 min read
Design and Implementation of a Lakehouse‑Integrated Data Platform for Financial Innovation by Shuxin Network
Java High-Performance Architecture
Java High-Performance Architecture
Mar 4, 2024 · Information Security

How QR Code Login Works: From Token Authentication to Secure Scanning

This article explains the principles behind QR code login, covering everyday QR code usage, the two-step authentication concept of identifying and proving identity, token-based mechanisms, and a detailed step‑by‑step flow—from QR code generation to mobile confirmation—illustrated with diagrams and code examples.

MobileQR codelogin authentication
0 likes · 11 min read
How QR Code Login Works: From Token Authentication to Secure Scanning
21CTO
21CTO
Feb 25, 2024 · Artificial Intelligence

Top Software Development Trends to Watch in 2024: AI, Blockchain, Cloud & More

2024 will see software development driven by deeper AI/ML integration, expanding blockchain beyond cryptocurrency, multi‑runtime microservices, heightened security practices, immersive AR/VR, sustainable coding, serverless and edge computing, quantum advances, and the continued dominance of Python alongside rising Rust adoption.

2024 trendsAIBlockchain
0 likes · 20 min read
Top Software Development Trends to Watch in 2024: AI, Blockchain, Cloud & More
MaGe Linux Operations
MaGe Linux Operations
Feb 18, 2024 · Operations

7 Powerful Ways DevOps Transforms the Software Development Lifecycle

This article explains how DevOps, through practices like CI/CD, automated testing, enhanced collaboration, infrastructure as code, continuous feedback, integrated security, and resource efficiency, can accelerate development, improve quality, boost security, and optimize resource utilization in modern software projects.

DevOpsInfrastructure as CodeSoftware Development
0 likes · 7 min read
7 Powerful Ways DevOps Transforms the Software Development Lifecycle
Ops Development & AI Practice
Ops Development & AI Practice
Feb 13, 2024 · Backend Development

How to Stop Blank JSON Pages on Failed Downloads: Two Effective Strategies

This article analyzes why failed file downloads often display a blank JSON page and compares two technical solutions—a pre‑check API and an API that returns a download URL—evaluating their latency, security, user experience, and server‑resource impacts before recommending the optimal approach.

File DownloadUser experiencebackend optimization
0 likes · 6 min read
How to Stop Blank JSON Pages on Failed Downloads: Two Effective Strategies
MaGe Linux Operations
MaGe Linux Operations
Feb 12, 2024 · Information Security

How XML External Entity (XXE) Attacks Exploit DTDs and How to Defend Them

This article explains fundamental XML concepts, DTD and entity definitions, demonstrates common XXE attack scenarios such as file reading, internal network probing, DoS and XInclude exploitation with Java code examples, and provides practical security hardening techniques including disabling XInclude, DTD parsing, and external entity resolution.

DTDEntity ExpansionXInclude
0 likes · 15 min read
How XML External Entity (XXE) Attacks Exploit DTDs and How to Defend Them
php Courses
php Courses
Feb 8, 2024 · Backend Development

Password Encryption Methods in PHP: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash (using BCrypt), and crypt—detailing their security considerations and providing complete code examples for user registration and login verification.

MD5cryptpassword hashing
0 likes · 6 min read
Password Encryption Methods in PHP: md5, password_hash, and crypt
CSS Magic
CSS Magic
Feb 8, 2024 · Artificial Intelligence

Complete GPTs Guide Part 3: Securing and Publishing Your Bot to the Store

Learn how to protect your custom GPT from prompt‑injection attacks that expose its system prompt and follow the step‑by‑step process to publish it on the GPTs Store, including selecting visibility, completing developer verification via payment or domain, and choosing a category.

GPTsOpenAIdomain verification
0 likes · 5 min read
Complete GPTs Guide Part 3: Securing and Publishing Your Bot to the Store
Java Architect Essentials
Java Architect Essentials
Jan 30, 2024 · Backend Development

Using ProGuard for Java Code Obfuscation in Maven Projects

This article explains how to protect Java applications from decompilation by configuring a ProGuard file and adding the ProGuard Maven plugin, then building the project to generate an obfuscated JAR, complete with step‑by‑step instructions and sample configuration code.

BackendObfuscationProGuard
0 likes · 5 min read
Using ProGuard for Java Code Obfuscation in Maven Projects
Beike Product & Technology
Beike Product & Technology
Jan 29, 2024 · Information Security

Kubernetes Security Risks and Hardening Recommendations

This article analyzes Kubernetes security threats from cloud, cluster, and container perspectives, enumerates high‑risk permissions, default privileged accounts, and insecure configurations, and provides concrete hardening steps such as least‑privilege RAM policies, etcd encryption, RBAC tightening, and workload isolation measures.

CloudNativeKubernetesPodSecurity
0 likes · 31 min read
Kubernetes Security Risks and Hardening Recommendations
OPPO Amber Lab
OPPO Amber Lab
Jan 26, 2024 · Information Security

BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits

This article analyzes the BLUFFS vulnerability disclosed at ACM CCS 2023, detailing how the legacy Bluetooth security mechanism (LSC) allows attackers to manipulate authentication and key‑generation parameters, leading to forward‑secrecy and future‑secrecy breaches, and evaluates the impact across devices supporting Bluetooth 4.2‑5.4.

BluetoothLSCSC
0 likes · 27 min read
BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits
Sohu Tech Products
Sohu Tech Products
Jan 24, 2024 · Mobile Development

Advanced Android Binder Interview Questions and Answers

This guide presents advanced Android Binder interview questions and concise answers, covering its architecture, cross‑process communication, relationship with AIDL, object lifecycle and death notifications, thread‑pool mechanics, performance tuning for large data transfers, and security measures, equipping engineers for confident interview performance.

AIDLAndroidBinder
0 likes · 15 min read
Advanced Android Binder Interview Questions and Answers
OPPO Amber Lab
OPPO Amber Lab
Jan 19, 2024 · Information Security

Uncovering Android AIDL/HIDL Service Vulnerabilities: Methods and Real CVE Examples

This article explains how Android AIDL and HIDL services are generated, outlines systematic steps to enumerate services, filter Java implementations, and automate information gathering, then details common memory‑corruption bug patterns and demonstrates real CVE‑2023‑21008 and CVE‑2023‑20766 exploits, concluding with a risk assessment.

AIDLAndroidCVE
0 likes · 9 min read
Uncovering Android AIDL/HIDL Service Vulnerabilities: Methods and Real CVE Examples
MaGe Linux Operations
MaGe Linux Operations
Jan 16, 2024 · Fundamentals

Unlocking TCP, UDP, IP & More: A Deep Dive into Network Protocols

This article provides a comprehensive overview of core network protocol structures—including TCP, UDP, IPv4/IPv6, IPSec, Ethernet, 802.1Q, 802.11, SSL, RTP, and OpenFlow—detailing their header fields, functions, and security mechanisms to help readers grasp essential networking concepts.

ProtocolsTCPUDP
0 likes · 15 min read
Unlocking TCP, UDP, IP & More: A Deep Dive into Network Protocols
Java Backend Technology
Java Backend Technology
Jan 15, 2024 · Fundamentals

Why Every Web App Needs Front‑End and Back‑End Data Validation

This article explains why both front‑end and back‑end data validation are essential in modern web applications, outlines the specific checks each layer should perform—from required fields and format rules to security safeguards like XSS/CSRF protection—and highlights the combined benefits for user experience, server load, and overall system integrity.

BackendWebfrontend
0 likes · 9 min read
Why Every Web App Needs Front‑End and Back‑End Data Validation
DevOps
DevOps
Jan 14, 2024 · Artificial Intelligence

How AI Can Enhance DevOps: Reducing Friction and Boosting Efficiency

The article explains how integrating artificial intelligence into DevOps can automate repetitive tasks, improve feedback loops, enhance monitoring and security, and ultimately reduce operational friction while accelerating software delivery and ensuring compliance.

AIcompliancesecurity
0 likes · 9 min read
How AI Can Enhance DevOps: Reducing Friction and Boosting Efficiency
Beike Product & Technology
Beike Product & Technology
Jan 12, 2024 · Information Security

Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System

This article examines how misconfigured Kubernetes RBAC permissions can lead to privilege escalation across clusters, presents a graph‑based model to represent users, roles, and authorities, and provides code examples and Cypher queries for detecting and visualizing high‑risk permission paths.

KubernetesRBACgraph
0 likes · 16 min read
Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System
Open Source Linux
Open Source Linux
Jan 5, 2024 · Information Security

Secure Spring Boot Deployments with ClassFinal: Code Encryption & Machine‑Bound Launch

This guide explains how to protect Spring Boot production packages from decompilation by using the ClassFinal Maven plugin for code encryption, configuring machine‑bound startup, and comparing it with ProGuard obfuscation, including detailed plugin setup, launch commands, and observed decompilation results.

ClassFinalCode EncryptionMaven Plugin
0 likes · 7 min read
Secure Spring Boot Deployments with ClassFinal: Code Encryption & Machine‑Bound Launch
Architecture Development Notes
Architecture Development Notes
Jan 4, 2024 · Information Security

How to Implement Seamless, Secure Token Refresh for Modern Apps

This article explains the concept, workflow, and step‑by‑step implementation of a seamless token refresh mechanism, providing code examples and security best practices to keep user sessions alive without interruption while maintaining strong protection against token theft and replay attacks.

AuthenticationBackendToken
0 likes · 7 min read
How to Implement Seamless, Secure Token Refresh for Modern Apps
Architecture Development Notes
Architecture Development Notes
Jan 1, 2024 · Frontend Development

Master Modern Frontend Architecture: Patterns, Code Samples & Best Practices

This article explores the essential components of modern frontend architecture, covering concepts such as modularity, componentization, code organization, state management, network layer design, performance optimization, security measures, automated testing, and continuous deployment, with practical code examples in React, Vue, Redux, Axios, and GitHub Actions.

State Managementarchitecturefrontend
0 likes · 8 min read
Master Modern Frontend Architecture: Patterns, Code Samples & Best Practices
OPPO Amber Lab
OPPO Amber Lab
Dec 29, 2023 · Information Security

Uncovering Android Malicious Anti‑Kill Vulnerabilities in Foreground Services

This article explains how Android malicious anti‑kill techniques exploit foreground services to keep processes alive, outlines the Low Memory Killer mechanism, details process priority values, presents real CVE examples, and offers mitigation strategies for developers and security researchers.

AndroidAnti‑KillForeground Service
0 likes · 9 min read
Uncovering Android Malicious Anti‑Kill Vulnerabilities in Foreground Services
HomeTech
HomeTech
Dec 27, 2023 · Backend Development

High‑Availability Architecture and Optimization Strategies for Live Streaming Push‑Pull Technology

This article examines the challenges of live streaming push‑pull technology and presents a high‑availability system architecture, network and CDN optimizations, disaster‑recovery mechanisms, fault‑perception monitoring, and security measures to ensure low latency, reliability, and scalability for large‑scale live events.

live streamingpush-pullsecurity
0 likes · 10 min read
High‑Availability Architecture and Optimization Strategies for Live Streaming Push‑Pull Technology
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Dec 23, 2023 · Cloud Native

Essential Kubernetes Security Practices to Safeguard Production Clusters

Learn the critical Kubernetes security measures for production environments, including RBAC access control, network policies, secret management, continuous monitoring, patch updates, API server hardening, Kubelet protection, pod security policies, and container hardening techniques, each illustrated with practical YAML examples and command snippets.

ContainerHardeningKubernetesNetworkPolicy
0 likes · 10 min read
Essential Kubernetes Security Practices to Safeguard Production Clusters
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 22, 2023 · Fundamentals

Overview of Embedded ROM Flashing Processes and Online Programming Techniques

The article explains embedded ROM updating terminology, compares factory‑level burner programming with board‑level online flashing, details the boot sequence and U‑Boot implementation, outlines security signatures, common USB‑related issues, and the evolution of flash storage, concluding that online flashing offers low‑cost, scalable, high‑speed production for smartphones.

FlashingMobile DevelopmentROM
0 likes · 15 min read
Overview of Embedded ROM Flashing Processes and Online Programming Techniques
Huolala Tech
Huolala Tech
Dec 19, 2023 · Information Security

How to Build Effective Bot Management: Strategies, Architecture, and Tools

This article explains bot fundamentals, classifies bot types, analyzes the rising threat of malicious bot traffic, compares major vendor solutions, and outlines a four‑layer architecture with data, feature, model, and policy layers for robust bot management in modern web services.

Bot ManagementTraffic analysiscloud security
0 likes · 14 min read
How to Build Effective Bot Management: Strategies, Architecture, and Tools
Efficient Ops
Efficient Ops
Dec 18, 2023 · Information Security

How China Postal Savings Bank Reached Advanced DevSecOps Standards

The article details China Postal Savings Bank's successful DevSecOps assessment, showcasing the bank's cultural, procedural, and technical implementations that boosted security, collaboration, and compliance, while sharing interview insights and future plans for broader DevSecOps adoption.

DevOpsDevSecOpsDigital Transformation
0 likes · 15 min read
How China Postal Savings Bank Reached Advanced DevSecOps Standards
DataFunSummit
DataFunSummit
Dec 17, 2023 · Big Data

Apache Kyuubi 1.8: New Features and Enhancements Overview

Apache Kyuubi 1.8 introduces a range of enhancements including multi‑tenant serverless SQL support on Spark and Flink, expanded batch and streaming capabilities, improved resource scheduling with database‑backed queues, stronger Kerberos/LDAP security, Flink YARN integration, and a new web UI for management.

Apache KyuubiBig DataFlink
0 likes · 13 min read
Apache Kyuubi 1.8: New Features and Enhancements Overview
OPPO Amber Lab
OPPO Amber Lab
Dec 15, 2023 · Information Security

Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes

This article explains the fundamentals of Android Binder services, categorizes Origin, AIDL, HIDL, and Vendor types, describes methods for locating services, and details common vulnerability patterns such as uninitialized memory, out-of-bounds reads/writes, and type confusion, illustrated with real CVE cases and mitigation insights.

AndroidBinderExploit
0 likes · 9 min read
Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes
Goodme Frontend Team
Goodme Frontend Team
Dec 13, 2023 · Frontend Development

Unlocking Concurrency, JS Quirks, Security Risks & Canvas Collisions: Frontend Insights

This roundup highlights the latest frontend tools and deep‑dive articles, covering StyleX, Astro 4.0, Vitest 1.0, VS Code 1.85, lock mechanisms for single‑threaded concurrency, bizarre JavaScript behaviors, target="_blank" security flaws, plugin system designs, designer‑developer workflows, and canvas collision detection techniques.

CanvasJavaScriptfrontend
0 likes · 5 min read
Unlocking Concurrency, JS Quirks, Security Risks & Canvas Collisions: Frontend Insights
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 10, 2023 · Operations

Comprehensive Guide to Nginx: Architecture, Configuration, and Advanced Features

This extensive tutorial explains Nginx's architecture, installation, directory layout, configuration directives, location matching rules, reverse proxy setup, load balancing strategies, static‑dynamic separation, CORS handling, caching mechanisms, access control lists, rate limiting, HTTPS configuration, compression, and many other essential directives for effective web server and reverse‑proxy management.

ConfigurationNginxOperations
0 likes · 66 min read
Comprehensive Guide to Nginx: Architecture, Configuration, and Advanced Features
Architects' Tech Alliance
Architects' Tech Alliance
Dec 7, 2023 · Artificial Intelligence

Evolution of ARM Architecture: From EPYC Flexibility to Armv9, Neoverse, Graviton and Confidential Compute

The article provides a comprehensive overview of ARM's recent architectural advances—including the flexible EPYC design, the Neoverse platform, AWS Graviton processors, and the security‑focused Armv9 with AI‑optimized SVE2 and Confidential Compute—highlighting their impact on cloud, data‑center and edge computing.

ARMArtificial IntelligenceCPU architecture
0 likes · 18 min read
Evolution of ARM Architecture: From EPYC Flexibility to Armv9, Neoverse, Graviton and Confidential Compute
Efficient Ops
Efficient Ops
Dec 5, 2023 · Operations

Why Operations Engineers Are Anything But Low-Level: Skills, Challenges, and Real-World Stories

This article compiles insights from multiple Zhihu contributors who explain how modern operations work spans basic system setup, complex hardware and network management, deep Linux kernel debugging, comprehensive monitoring, rapid incident response, and rigorous security, highlighting why ops expertise is essential and far from low‑level.

LinuxNetworkingSysadmin
0 likes · 14 min read
Why Operations Engineers Are Anything But Low-Level: Skills, Challenges, and Real-World Stories
IT Services Circle
IT Services Circle
Dec 4, 2023 · Information Security

Supply‑Chain Vulnerabilities in the JavaScript/npm Ecosystem: Notable Cases and Lessons

This article surveys a series of high‑profile supply‑chain attacks on the JavaScript/npm ecosystem—such as left‑pad removal, malicious faker.js updates, cross‑env hijacking, is‑promise bugs, getcookies backdoors, event‑stream social‑engineering, ESLint credential leaks, manifest obfuscation, and politically‑motivated code injections—highlighting how tiny, widely‑used packages can become vectors for large‑scale compromise and what developers can do to mitigate the risk.

Supply Chainmalwarenpm
0 likes · 17 min read
Supply‑Chain Vulnerabilities in the JavaScript/npm Ecosystem: Notable Cases and Lessons
OPPO Amber Lab
OPPO Amber Lab
Nov 30, 2023 · Information Security

Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study

This article details the methodology for discovering and analyzing Android local socket service vulnerabilities, outlines prerequisite skills, explains service classifications, demonstrates data‑handling function tracing, and presents a CVE‑2023‑35694 case study, highlighting common flaw types and mitigation insights.

AndroidCVESocket
0 likes · 8 min read
Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study
php Courses
php Courses
Nov 30, 2023 · Backend Development

5 Free AI Tools to Boost PHP Development

This article introduces five free AI-powered tools—TabNine, DeepCode, Snuffleupagus, Kite, and PHPInsights—that help PHP developers accelerate coding, improve code quality and security, automate documentation, and optimize performance, highlighting their key features and where to access them.

Artificial Intelligencedevelopment-toolssecurity
0 likes · 6 min read
5 Free AI Tools to Boost PHP Development
JD Cloud Developers
JD Cloud Developers
Nov 28, 2023 · Backend Development

Choosing the Right Java Expression Engine: Performance, Security, and Community Insights

This article provides a comprehensive overview and comparative analysis of popular Java expression engines—including AviatorScript, MVEL, OGNL, SpEL, QLExpress, JEXL, JUEL, and Janino—covering their features, community support, size, performance benchmarks, security settings, usage cases, and syntax differences to guide developers in selecting the most suitable engine for their projects.

Expression Engineevaluationjava
0 likes · 23 min read
Choosing the Right Java Expression Engine: Performance, Security, and Community Insights
Liangxu Linux
Liangxu Linux
Nov 27, 2023 · Information Security

How TOTP Secures Your Accounts: Theory, Applications, and Python Demo

This article explains the TOTP algorithm behind time‑based one‑time passwords, outlines its security benefits and common use cases such as online logins, VPNs, and hardware tokens, and provides a practical Python implementation with code examples using the pyotp library.

OTPPythonTOTP
0 likes · 6 min read
How TOTP Secures Your Accounts: Theory, Applications, and Python Demo
DevOps Cloud Academy
DevOps Cloud Academy
Nov 27, 2023 · Operations

Implementing a DevSecOps CI/CD Pipeline for Multi‑Language Applications with Jenkins

This article walks through building a comprehensive DevSecOps CI/CD pipeline in Jenkins that integrates source control, static analysis, vulnerability scanning, multi‑language builds, Docker image creation, Trivy security checks, Kubernetes deployment, and ZAP DAST testing to securely deliver applications across various runtimes.

DevSecOpsDockerJenkins
0 likes · 18 min read
Implementing a DevSecOps CI/CD Pipeline for Multi‑Language Applications with Jenkins
Python Programming Learning Circle
Python Programming Learning Circle
Nov 23, 2023 · Artificial Intelligence

2023 GitHub Trends: Explosive Growth of Generative AI, Shifts in Programming Language Popularity, and Open‑Source Security

The 2023 GitHub report reveals a rapid mainstreaming of generative AI, a surge in AI‑driven projects and contributions, evolving programming language rankings, heightened CI/CD automation, and stronger security practices, illustrating how developers worldwide are reshaping software creation and open‑source ecosystems.

AIDevOpsGitHub
0 likes · 10 min read
2023 GitHub Trends: Explosive Growth of Generative AI, Shifts in Programming Language Popularity, and Open‑Source Security
php Courses
php Courses
Nov 23, 2023 · Backend Development

Common PHP Feature Implementations and Optimization Techniques

This article reviews essential PHP development practices—including user authentication, database interaction, file handling, front‑end/back‑end communication, and error logging—while offering concrete optimization tips such as password hashing, RBAC, indexing, caching, connection pooling, and proper logging to improve application quality and performance.

cachingdatabasesecurity
0 likes · 5 min read
Common PHP Feature Implementations and Optimization Techniques
Goodme Frontend Team
Goodme Frontend Team
Nov 19, 2023 · Frontend Development

How to Securely Add Page and Image Watermarks with Canvas and CSS

This article explains how to protect confidential business documents by implementing page‑level watermarks using canvas and pseudo‑elements, and how to add robust watermarks to images via OSS parameters or client‑side canvas processing, while preventing removal through MutationObserver.

CanvasJavaScriptOSS
0 likes · 16 min read
How to Securely Add Page and Image Watermarks with Canvas and CSS
Top Architecture Tech Stack
Top Architecture Tech Stack
Nov 17, 2023 · Fundamentals

Common Misconceptions in Architecture Design and Its Real Purpose, Illustrated with a Simple Complexity Analysis Case

The article explains common misconceptions about architecture design, outlines its true goals such as maintainability, scalability, reliability, and security, and demonstrates these principles through a detailed student‑management system case study that highlights complexity analysis and practical design decisions.

ReliabilityScalabilitySystem Design
0 likes · 12 min read
Common Misconceptions in Architecture Design and Its Real Purpose, Illustrated with a Simple Complexity Analysis Case
php Courses
php Courses
Nov 16, 2023 · Backend Development

Using PHP Caching (APC) to Improve Website Performance and Security

This article explains why caching is essential for web applications, introduces PHP caching options such as APC, Memcache, and Redis, and provides step‑by‑step installation and code examples showing how to implement APC caching to boost speed and protect site security.

BackendPHPapc
0 likes · 6 min read
Using PHP Caching (APC) to Improve Website Performance and Security
Architect
Architect
Nov 10, 2023 · Backend Development

Design and Implementation of a High‑Performance Short‑Link Platform

This article details the architecture, core algorithms, security measures, and performance optimizations of a high‑throughput short‑link service, covering hash‑based ID generation, Base62 encoding, distributed ID schemes, caching, database indexing, sharding, and monitoring to ensure efficient and secure URL shortening.

Backend Architecturebase62distributed-id
0 likes · 13 min read
Design and Implementation of a High‑Performance Short‑Link Platform
Open Source Linux
Open Source Linux
Nov 9, 2023 · Fundamentals

Essential Networking Q&A: From OSI Layers to VPNs

This comprehensive guide answers over one hundred fundamental networking questions, covering topics such as links, OSI model layers, backbone networks, LANs, routers, protocols, IP addressing, subnet masks, security measures, topologies, and many other core concepts essential for understanding computer networks.

NetworkingOSI modelProtocols
0 likes · 32 min read
Essential Networking Q&A: From OSI Layers to VPNs
Architect
Architect
Nov 5, 2023 · Backend Development

The Complete Backend Development Roadmap: From Fundamentals to Expert Architecture

This article presents a comprehensive, step‑by‑step roadmap for backend engineers, covering everything from basic Go language concepts, data structures, and OS fundamentals to advanced microservice design, high‑performance networking, scalability, reliability, security, DevOps practices, team and product management, and real‑world project execution.

BackendDevOpsGolang
0 likes · 28 min read
The Complete Backend Development Roadmap: From Fundamentals to Expert Architecture
Programmer DD
Programmer DD
Nov 3, 2023 · Backend Development

Why Java Remains Dominant: Insights from the 2023 State of Java Survey

The 2023 State of Java report, based on a survey of over 2,000 Java professionals, reveals that Java adoption stays strong with most companies using LTS versions, migrating to the cloud, confronting rising costs and security challenges, while Oracle's market share declines in favor of OpenJDK alternatives.

OpenJDKOraclecloud migration
0 likes · 5 min read
Why Java Remains Dominant: Insights from the 2023 State of Java Survey
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Oct 30, 2023 · Information Security

Building Effective Bot Management: Strategies, Architecture, and Best Practices

This article provides a comprehensive analysis of bot management, covering bot definitions, classification, current traffic trends, major vendor solutions, a four‑layer architecture, feature engineering, rule management, event operations, detection techniques, and practical steps for implementing a robust bot defense system.

B2B SecurityBot ManagementTraffic analysis
0 likes · 14 min read
Building Effective Bot Management: Strategies, Architecture, and Best Practices
Architects Research Society
Architects Research Society
Oct 29, 2023 · Information Security

Security Requirement Vision, Strategic Security Architecture Principles, and Formalizing Security Processes

The article explains how to define security requirements within business context, outlines strategic security architecture principles, distinguishes governance, management and operations, and describes the steps and components needed to formalize and prioritize effective security processes for an organization.

governanceprocessessecurity
0 likes · 9 min read
Security Requirement Vision, Strategic Security Architecture Principles, and Formalizing Security Processes
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 22, 2023 · Information Security

Understanding Compression Bombs and How to Prevent Them in Java

This article explains what a compression bomb is, outlines its potential harms such as resource exhaustion and system crashes, describes detection methods, and provides detailed Java code examples for preventing compression bomb attacks by limiting unzip size, using safe libraries, and applying security policies.

compression bombjavaresource exhaustion
0 likes · 16 min read
Understanding Compression Bombs and How to Prevent Them in Java
OPPO Amber Lab
OPPO Amber Lab
Oct 20, 2023 · Mobile Development

How Hybrid Apps Communicate: Mechanisms, Risks, and Secure Practices

This article explains the core principles of Hybrid app communication between WebView and native code, outlines common implementations such as Google’s JavaScriptInterface and JSBridge, identifies critical security risks, presents a real‑world vulnerability example, and offers practical mitigation and reverse‑engineering guidance.

Hybrid AppJSBridgeJavaScriptInterface
0 likes · 11 min read
How Hybrid Apps Communicate: Mechanisms, Risks, and Secure Practices