Tagged articles
23 articles
Page 1 of 1
SuanNi
SuanNi
Apr 22, 2026 · Information Security

How ClawLess Secures Autonomous AI Agents with Formal System‑Call Isolation

The ClawLess framework, developed by researchers from Southern University of Science and Technology and Hong Kong University of Science and Technology, combines formal security policies, physical sandboxing, user‑space kernels and BPF‑based system‑call interception to protect highly autonomous AI agents from rogue behavior and external attacks.

AI SafetyBPFcontainer isolation
0 likes · 11 min read
How ClawLess Secures Autonomous AI Agents with Formal System‑Call Isolation
Raymond Ops
Raymond Ops
Oct 30, 2025 · Information Security

Master Linux System Security: Account Hardening, Boot Controls, and Vulnerability Scanning

This guide walks through essential Linux security practices, covering account cleanup and password policies, BIOS and GRUB boot protections, command‑history sanitization, automatic logout settings, weak‑password detection with John the Ripper, and network scanning using Nmap to help harden servers against common threats.

Account HardeningGRUBJohn the Ripper
0 likes · 18 min read
Master Linux System Security: Account Hardening, Boot Controls, and Vulnerability Scanning
IT Services Circle
IT Services Circle
Oct 11, 2025 · Information Security

How Microsoft Is Turning Windows and Azure Safer with Rust

Microsoft is rapidly rewriting critical Windows kernel components, Azure services, Office data systems, cryptographic libraries, and driver frameworks in Rust to improve memory safety, reduce bugs, and enable safer code execution across its entire infrastructure.

AzureMicrosoftRust
0 likes · 10 min read
How Microsoft Is Turning Windows and Azure Safer with Rust
macrozheng
macrozheng
Aug 31, 2025 · Backend Development

Why Using "null" as a Username Breaks Systems and How to Fix It

The article explains the meaning of null in programming, why users registering with "null" can crash backend logic, and offers practical front‑end validation, back‑end safeguards, and logging strategies to prevent such human‑driven edge cases from breaking applications.

BackendNULLedge case
0 likes · 5 min read
Why Using "null" as a Username Breaks Systems and How to Fix It
MaGe Linux Operations
MaGe Linux Operations
May 4, 2025 · Information Security

Essential Linux System Security: Account Hardening, Password Policies, and Vulnerability Scanning

This guide covers Linux system security fundamentals, including account cleanup, password aging and locking, command‑history protection, BIOS/GRUB boot hardening, login restrictions, weak‑password detection with John the Ripper, and network port scanning using Nmap, providing practical commands and configuration steps for each topic.

Account ManagementJohn the RipperPassword Policies
0 likes · 18 min read
Essential Linux System Security: Account Hardening, Password Policies, and Vulnerability Scanning
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2024 · Information Security

How to Detect and Remove Linux Mining Malware: Step-by-Step Guide

This guide explains how to identify high CPU usage caused by mining trojans on Linux servers, isolate and block malicious network traffic, clean scheduled tasks, startup services, compromised libraries, SSH keys, and finally terminate and delete the malicious processes and files.

LinuxMalware Removalcron
0 likes · 9 min read
How to Detect and Remove Linux Mining Malware: Step-by-Step Guide
Huolala Tech
Huolala Tech
Nov 8, 2024 · Backend Development

How Huolala Built a Scalable Real‑Time Reconciliation Platform for Millions of Daily Transactions

Huolala’s real‑time reconciliation platform tackles massive daily transaction volumes by addressing distributed system consistency, high‑throughput data ingestion, dynamic cluster scaling, and security safeguards, enabling sub‑second settlement verification across hundreds of services.

Backend ArchitectureData ConsistencyDistributed Systems
0 likes · 10 min read
How Huolala Built a Scalable Real‑Time Reconciliation Platform for Millions of Daily Transactions
NetEase Yanxuan Technology Product Team
NetEase Yanxuan Technology Product Team
Oct 24, 2022 · Operations

PAM Authentication Troubleshooting: Real-World Linux Server Failure Cases and Solutions

Real‑world Linux server failures show that missing PAM support in SSH prevents ulimit changes, misordered pam_faillock entries break cron authentication, and custom pam_script setups for Squid require careful configuration, highlighting that module order, thorough testing, and proper hardening are essential for reliable PAM authentication.

LinuxLinux authenticationpam
0 likes · 11 min read
PAM Authentication Troubleshooting: Real-World Linux Server Failure Cases and Solutions
Liangxu Linux
Liangxu Linux
Sep 25, 2022 · Information Security

10 Most Dangerous Linux Commands You Should Never Run

This article explains why certain Linux commands—such as rm -rf /*, overwriting partitions, moving data to /dev/null, formatting disks, fork bombs, and malicious script execution—are extremely hazardous, illustrates their destructive effects with examples, and offers practical safety recommendations to protect your system.

AdminLinuxdangerous-commands
0 likes · 10 min read
10 Most Dangerous Linux Commands You Should Never Run
dbaplus Community
dbaplus Community
Jun 30, 2022 · Information Security

Beware These Linux Commands That Can Wipe Your System

The article lists several destructive Linux commands—such as rm -rf, fork bomb, direct writes to block devices, and hidden shellcode—explains their catastrophic effects, provides exact syntax examples, and warns readers to understand and test them carefully before execution.

Linuxdangerous-commandsfork bomb
0 likes · 6 min read
Beware These Linux Commands That Can Wipe Your System
Laravel Tech Community
Laravel Tech Community
Jun 19, 2022 · Information Security

Destructive Linux Commands and Their Potential System Impact

The article lists several dangerous Linux commands—including rm -rf, fork bomb, direct writes to block devices, and disguised payloads—explaining their syntax, destructive effects, and the importance of understanding and avoiding their execution to prevent irreversible system damage.

Linuxdangerous-commandsfork bomb
0 likes · 5 min read
Destructive Linux Commands and Their Potential System Impact
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
Open Source Linux
Open Source Linux
Mar 25, 2022 · Information Security

Beware These Dangerous Linux Commands That Can Wipe Your System

This article warns about several destructive Linux commands—such as rm ‑rf, fork bombs, overwriting block devices, and hidden shellcode—explaining their effects, providing example usages, and emphasizing the importance of understanding and testing commands in a safe environment before execution.

Linuxdangerous-commandsdata destruction
0 likes · 5 min read
Beware These Dangerous Linux Commands That Can Wipe Your System
Efficient Ops
Efficient Ops
Mar 3, 2021 · Information Security

How to Efficiently Audit Linux System Operations Without Overloading Logs

This article explains why detailed system operation logs are essential for security audits and troubleshooting, outlines filtering guidelines to avoid noisy data, and compares five Linux auditing methods—history, custom bash, snoopy, auditd, and eBPF—highlighting their strengths, limitations, and practical configuration examples.

AuditdLinuxaudit
0 likes · 13 min read
How to Efficiently Audit Linux System Operations Without Overloading Logs
Open Source Linux
Open Source Linux
Jan 26, 2021 · Information Security

10 Linux Commands That Can Wipe Your System – How to Stay Safe

This article lists ten dangerous Linux commands—including variations of rm, fork bombs, raw device writes, and hidden hex‑encoded scripts—explains how each can cause irreversible data loss or system crashes, and offers practical safeguards such as using aliases and testing only in virtual environments.

BashData losscommand-line
0 likes · 7 min read
10 Linux Commands That Can Wipe Your System – How to Stay Safe
Youzan Coder
Youzan Coder
Feb 27, 2020 · Information Security

System Stability and Security Measures in SaaS: Yazan's Approach

Yazan’s SaaS platform maintains 99.99% uptime through robust IaaS infrastructure, dedicated DBA and network teams, while defending against DDoS attacks and data breaches with ISO‑27001 and CSA C*STAR‑aligned security controls, employing multi‑cloud real‑time and cold backups and offering compensation for outage‑related business impacts.

DDoS protectionSaaSbusiness continuity
0 likes · 17 min read
System Stability and Security Measures in SaaS: Yazan's Approach
MaGe Linux Operations
MaGe Linux Operations
Jan 12, 2018 · Information Security

How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks

This guide walks through eleven hands‑on techniques for uncovering UNIX or Solaris intrusions, from inspecting password files and processes to verifying daemon configurations, network sockets, logs, core dumps, hidden files, file integrity, kernel modules, and the limits of manual detection versus IDS solutions.

Network Monitoringintrusion detectionkernel integrity
0 likes · 14 min read
How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks
MaGe Linux Operations
MaGe Linux Operations
Oct 5, 2017 · Information Security

Which Linux Commands Can Destroy Your System? Safety Tips Inside

This article warns that seemingly harmless Linux commands—such as recursive rm, mkfs, dd, fork loops, malicious scripts, and arbitrary data writes—can irreversibly destroy filesystems, and offers practical advice like avoiding root for daily tasks, understanding commands before execution, verifying sources, and regularly backing up data.

$rootdangerous-commandssystem security
0 likes · 7 min read
Which Linux Commands Can Destroy Your System? Safety Tips Inside
ITPUB
ITPUB
Jul 9, 2016 · Operations

Secure Linux Virtual Consoles with vlock: Install and Use Guide

This guide explains what vlock is, how to install it on various Linux distributions, and demonstrates the most common command‑line options for locking individual or all virtual console sessions securely.

session locksystem securityvirtual console
0 likes · 5 min read
Secure Linux Virtual Consoles with vlock: Install and Use Guide