Tagged articles
20 articles
Page 1 of 1
dbaplus Community
dbaplus Community
Apr 9, 2026 · Information Security

Designing Practical Encrypted Storage for Sensitive User Data

This article explains why encrypting sensitive fields like passwords, phone numbers, and ID numbers is essential, details a balanced approach using AES‑GCM encryption, HMAC indexes, and masked fields, and shares real‑world lessons from implementing the solution in a production system.

AES-GCMDatabase designHMAC
0 likes · 21 min read
Designing Practical Encrypted Storage for Sensitive User Data
Alibaba Cloud Native
Alibaba Cloud Native
Dec 11, 2024 · Information Security

How to Secure Cloud Logs: End‑to‑End Sensitive Data Scanning and Masking on Alibaba Cloud

This guide walks through why enterprises need to scan and protect sensitive log data, explains the regulatory background, and provides a step‑by‑step implementation on Alibaba Cloud using Data Security Center, Logtail, SPL, Ingest Processors, SDKs, StoreView queries and periodic scans to achieve comprehensive data security and governance.

Log Managementcloud-nativedata security
0 likes · 18 min read
How to Secure Cloud Logs: End‑to‑End Sensitive Data Scanning and Masking on Alibaba Cloud
macrozheng
macrozheng
Sep 5, 2024 · Information Security

How to Automatically Mask Sensitive Data in Spring Boot with Jackson Annotations

This article explains how to implement unified data desensitization in Java Spring Boot applications by creating custom annotations, enums, serializers, and utility methods that automatically mask personal information during JSON serialization, complete with code examples and test results.

JacksonSpring Bootbackend-development
0 likes · 13 min read
How to Automatically Mask Sensitive Data in Spring Boot with Jackson Annotations
Top Architect
Top Architect
Apr 15, 2024 · Backend Development

Implementing Data Masking in SQL, Java, and MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and personal information using SQL string functions, a Java library (sensitive‑plus), and the MyBatis‑Mate Sensitive Jackson plugin, providing complete code examples, configuration files, and test results for backend developers.

MyBatisbackend-developmentdata masking
0 likes · 11 min read
Implementing Data Masking in SQL, Java, and MyBatis‑Mate Sensitive Jackson
php Courses
php Courses
Oct 8, 2023 · Information Security

Common PHP Security Issues and Mitigation Techniques

This article outlines frequent PHP security vulnerabilities such as SQL injection, XSS, unsafe file uploads, and sensitive data exposure, and demonstrates how to mitigate them with prepared statements, input escaping, file validation, and secure configuration practices using concrete code examples.

PHPfile uploadsecurity
0 likes · 5 min read
Common PHP Security Issues and Mitigation Techniques
dbaplus Community
dbaplus Community
Dec 18, 2022 · Information Security

Simplify Large‑Scale Database Security: Discover, Classify & Encrypt Sensitive Data

This article outlines Vivo’s comprehensive approach to large‑scale database security, covering recent data‑leak incidents, legal compliance, the current challenges of sensitive data governance, a field‑level discovery method, classification standards, automated scoring, and multiple encryption solutions including Proxy, MyBatis, and ShardingSphere.

compliancedata classificationdata security
0 likes · 17 min read
Simplify Large‑Scale Database Security: Discover, Classify & Encrypt Sensitive Data
Architect
Architect
Jul 28, 2022 · Information Security

Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and emails in MySQL and Java applications by combining SQL string functions with the MyBatis‑Mate Sensitive Jackson plugin, providing complete configuration, custom strategies, and runnable Spring Boot examples.

MyBatisSpring Bootdata masking
0 likes · 9 min read
Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson
DevOps
DevOps
Jul 26, 2022 · Information Security

Detecting, Cleaning, and Preventing Sensitive Data in Git Repositories

This article explains how to identify, remove, and avoid committing sensitive information such as passwords, keys, or tokens in Git repositories by using git log searches, tools like Gitleaks and Detect‑Secrets, and scripts for history rewriting, while also describing preventive pre‑commit hook setups.

GitGitleaksdetect-secrets
0 likes · 7 min read
Detecting, Cleaning, and Preventing Sensitive Data in Git Repositories
Selected Java Interview Questions
Selected Java Interview Questions
Jul 4, 2022 · Backend Development

Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus

This article introduces MyBatis‑Mate, an official MyBatis‑Plus extension that provides enterprise‑grade capabilities such as dictionary binding, field encryption, data masking, dynamic table maintenance, audit logging, sharding, multi‑datasource switching, and customizable data‑scope handling, all illustrated with code examples.

MyBatisdata encryptionsensitive data
0 likes · 13 min read
Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus
Java Backend Technology
Java Backend Technology
Jun 11, 2022 · Information Security

How to Mask Sensitive Data in MySQL and Java with MyBatis‑Mate

This article demonstrates practical techniques for data masking, covering MySQL string functions for phone and ID masking, a Java library for various sensitive fields, and a MyBatis‑Mate extension that applies custom and built‑in masking strategies through annotations and REST endpoints.

MyBatisSpring Bootjava
0 likes · 8 min read
How to Mask Sensitive Data in MySQL and Java with MyBatis‑Mate
dbaplus Community
dbaplus Community
Oct 12, 2021 · Information Security

How d18n Enables Cross‑Platform Data Desensitization for Secure Databases

This article introduces d18n, a Go‑based, cross‑platform data‑desensitization tool that supports multiple databases and file formats, explains common desensitization scenarios, details its sensitive‑data identification techniques—including keyword, regex, and NLP‑based DFA—and outlines six practical masking algorithms with export and import workflows.

Database SecurityGod18n
0 likes · 11 min read
How d18n Enables Cross‑Platform Data Desensitization for Secure Databases
Laravel Tech Community
Laravel Tech Community
Jun 23, 2021 · Information Security

Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation

The article outlines typical ways PHP projects mishandle sensitive data—such as storing passwords in plain text, transmitting credentials without encryption, using weak hashing algorithms, and exposing server details—and provides practical configuration and coding measures to secure data at rest and in transit.

Configurationencryptionsecurity
0 likes · 6 min read
Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation
Architect's Tech Stack
Architect's Tech Stack
Apr 28, 2019 · Information Security

GSIL – GitHub Sensitive Information Leakage Monitoring Tool: Installation, Configuration, and Usage Guide

This article introduces GSIL, a near‑real‑time GitHub sensitive‑information‑leakage monitoring tool, and provides step‑by‑step instructions for installing the Python package, configuring email and GitHub token settings, defining scanning rules, and scheduling automated scans and reports via cron.

ConfigurationGitHubPython
0 likes · 6 min read
GSIL – GitHub Sensitive Information Leakage Monitoring Tool: Installation, Configuration, and Usage Guide