Tagged articles
81 articles
Page 1 of 1
Architect's Guide
Architect's Guide
Mar 2, 2026 · Information Security

Essential API Security Measures and How to Implement Them

This article outlines key API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist control, and data validation—and provides practical Java code examples and implementation guidelines for each technique.

API SecurityAppIddata validation
0 likes · 10 min read
Essential API Security Measures and How to Implement Them
Coder Trainee
Coder Trainee
Feb 19, 2026 · Fundamentals

Why Switch from UUID to ULID? Exploring Benefits and Features

The article explains why developers are moving from UUID to ULID, detailing ULID’s 128‑bit compatibility, massive per‑millisecond uniqueness, lexicographic sorting, compact 26‑character Base32 encoding, timestamp integration, strong randomness, and practical use cases such as distributed systems and database sharding.

Base32Distributed SystemsULID
0 likes · 3 min read
Why Switch from UUID to ULID? Exploring Benefits and Features
Senior Brother's Insights
Senior Brother's Insights
Dec 3, 2025 · Databases

Can MySQL Partition Tables Work When created_at Is NULL? Understanding Default Timestamp Partitioning

This article explains why MySQL partitions based on a timestamp column still function correctly even when the application does not explicitly set the column, by detailing the default CURRENT_TIMESTAMP behavior, partition key evaluation, and practical examples with table definitions and insert statements.

DEFAULT CURRENT_TIMESTAMPPartitioningSQL
0 likes · 6 min read
Can MySQL Partition Tables Work When created_at Is NULL? Understanding Default Timestamp Partitioning
Architect
Architect
Oct 1, 2025 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures

This article presents a comprehensive guide to designing secure third‑party APIs, covering the generation and management of Access Key/Secret Key pairs, signature creation, timestamp and nonce anti‑replay techniques, token handling, request throttling, IP whitelisting, idempotency, versioning, response standards, and practical code examples in Java and SQL.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 9, 2025 · Backend Development

Why Adding 2 Days Sometimes Results in a 3-Day Unblock? Java Date Precision Explained

A Java backend bug caused blacklist unblocking times to be stored one second later than expected due to mismatched Date and TIMESTAMP precision, daylight‑saving and timezone conversions, and millisecond rounding, which was diagnosed through code review, AI analysis, and batch testing, then fixed by normalising nanoseconds or adjusting database column precision.

JavaPostgreSQLTimezone
0 likes · 11 min read
Why Adding 2 Days Sometimes Results in a 3-Day Unblock? Java Date Precision Explained
Architect's Guide
Architect's Guide
Sep 4, 2025 · Information Security

How to Secure Public APIs: Essential Measures and Java Implementation Guide

This article outlines essential security measures for public APIs—including data encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—explaining why each is needed and providing concrete Java implementation examples such as HTTPS, MD5 signatures, token‑bucket algorithms, and RateLimiter usage.

API SecurityAppIdencryption
0 likes · 10 min read
How to Secure Public APIs: Essential Measures and Java Implementation Guide
php Courses
php Courses
Aug 14, 2025 · Backend Development

Master PHP Time Functions: Get, Format, Calculate, and Set Timezones

This tutorial explains how to use PHP's time(), date(), strtotime(), and date_default_timezone_set() functions to retrieve the current timestamp, format dates, perform date arithmetic, and configure timezones, providing practical code examples for each operation.

Date FormattingPHPTimezone
0 likes · 4 min read
Master PHP Time Functions: Get, Format, Calculate, and Set Timezones
Java Tech Enthusiast
Java Tech Enthusiast
Apr 23, 2025 · Databases

Choosing the Right Date/Time Storage in MySQL and PostgreSQL

When storing dates in MySQL or PostgreSQL, avoid VARCHAR fields and select between DATETIME (no time‑zone, larger range) and TIMESTAMP (UTC conversion, smaller range) based on whether automatic time‑zone handling and the 2038 limit suit your application, with Unix timestamps as a high‑performance alternative.

Timezonedatabasedatetime
0 likes · 11 min read
Choosing the Right Date/Time Storage in MySQL and PostgreSQL
IT Services Circle
IT Services Circle
Apr 10, 2025 · Databases

Choosing the Right Date/Time Storage Type in MySQL: DATETIME vs TIMESTAMP vs Unix Timestamp

This article explains why storing dates as strings is problematic, compares MySQL's DATETIME and TIMESTAMP types—including their storage size, range, and timezone behavior—provides practical SQL examples, discusses numeric Unix timestamps, and offers guidance on selecting the most suitable type for different scenarios.

mysqlperformancetimestamp
0 likes · 12 min read
Choosing the Right Date/Time Storage Type in MySQL: DATETIME vs TIMESTAMP vs Unix Timestamp
Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 25, 2025 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices

This guide details a secure third‑party API design, covering API key generation, request signing with timestamps and nonces, permission division, CRUD endpoint definitions, unified response structures, and best‑practice security measures such as HTTPS, IP whitelisting, rate limiting, logging, and idempotency handling.

API SecurityAuthenticationBackend
0 likes · 29 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices
Lobster Programming
Lobster Programming
Jan 9, 2025 · Information Security

5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas

Hotlinking attacks steal popular media by fetching resources from major platforms, but developers can protect assets using anti-leech methods such as Nginx referer checks, SpringBoot filters, token validation, timestamp verification, and graphical captchas, each with strengths and limitations against forged requests.

CaptchaNGINXSpringBoot
0 likes · 7 min read
5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 22, 2024 · Fundamentals

How RTP and NTP Timestamps Enable Precise Audio‑Video Sync in WebRTC

This article explains the structure and generation of RTP timestamps for audio and video, the role of NTP timestamps as a common time base, how RTP and NTP are correlated through Sender Reports and linear regression, and the calculations used to achieve accurate audio‑video synchronization and target delay management in WebRTC.

Audio-Video SyncNTPRTP
0 likes · 18 min read
How RTP and NTP Timestamps Enable Precise Audio‑Video Sync in WebRTC
php Courses
php Courses
Jun 11, 2024 · Backend Development

Using PHP filectime() to Retrieve File Creation Time

This article explains the PHP filectime() function, how it returns a file's creation timestamp, and provides a complete example showing file existence checking, timestamp conversion with date(), and output handling, while also mentioning related functions such as filemtime() and fileatime() for broader file time management.

PHPfile-handlingfilectime
0 likes · 4 min read
Using PHP filectime() to Retrieve File Creation Time
Architecture Digest
Architecture Digest
Apr 24, 2024 · Information Security

Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce

The article presents a comprehensive guide to designing secure third‑party APIs, covering access‑key/secret‑key generation, token management, signature algorithms, timestamp and nonce anti‑replay mechanisms, permission granularity, request logging, rate limiting, and example Java and SQL implementations.

Access KeySecret KeyToken
0 likes · 28 min read
Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 26, 2023 · Databases

Understanding MySQL 8.0 immediate_commit_timestamp and original_commit_timestamp in Binlog Replication

This article explains the meaning, generation process, and operational impact of the new immediate_commit_timestamp and original_commit_timestamp fields in MySQL 8.0 binlog events, including how they affect replication delay calculations, warning handling, and precise monitoring of transaction commit times.

GTIDmysqltimestamp
0 likes · 9 min read
Understanding MySQL 8.0 immediate_commit_timestamp and original_commit_timestamp in Binlog Replication
php Courses
php Courses
Oct 25, 2023 · Backend Development

Understanding and Using PHP date() Function for Date and Time Formatting

This article explains the PHP date() function, covering its syntax, required and optional parameters, common format characters for year, month, day, hour, minute and second, additional textual options, usage for timestamp conversion, and timezone considerations, helping developers handle date and time tasks efficiently.

PHPdate()datetime
0 likes · 5 min read
Understanding and Using PHP date() Function for Date and Time Formatting
Liangxu Linux
Liangxu Linux
Aug 20, 2023 · Fundamentals

Why Unix Chose a Simple Integer for Time and the Looming 2038 Problem

The article recounts how Ken Thompson and Dennis Ritchie invented the Unix epoch as a single integer counting seconds since 1970, explains its advantages, exposes the 32‑bit overflow issue known as the Y2K38 problem, and outlines the transition to 64‑bit timestamps in modern systems.

64-bitEpoch TimeOperating Systems
0 likes · 7 min read
Why Unix Chose a Simple Integer for Time and the Looming 2038 Problem
IT Services Circle
IT Services Circle
Jul 10, 2023 · Fundamentals

The Story Behind Unix Epoch Time and the Y2K38 Problem

This article recounts how Ken Thompson and Dennis Ritchie devised the Unix Epoch Time as a simple integer timestamp, explains its advantages, the 32‑bit limitation leading to the Y2K38 issue, and describes the transition to 64‑bit timestamps in modern systems.

32-bit64-bitEpoch Time
0 likes · 6 min read
The Story Behind Unix Epoch Time and the Y2K38 Problem
Architect's Guide
Architect's Guide
Apr 22, 2023 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—and provides practical Java implementation examples for each technique.

API SecurityJavaencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
Liangxu Linux
Liangxu Linux
Apr 2, 2023 · Information Security

How to Use Shell Scripts to Manipulate Linux File Timestamps and Hide Traces

This guide explains how attackers can use Linux shell commands such as touch, stat, and ls, combined with custom Bash scripts, to record, modify, and restore file timestamps, enabling them to conceal evidence of intrusion and automate timestamp manipulation on compromised servers.

BashForensicstimestamp
0 likes · 8 min read
How to Use Shell Scripts to Manipulate Linux File Timestamps and Hide Traces
Liangxu Linux
Liangxu Linux
Aug 17, 2022 · Information Security

How to Hide Linux File Timestamps with a Bash Script

This guide explains how attackers can conceal their activities on a Linux system by manipulating file timestamps using the touch, stat, and ls commands and by automating the process with a Bash script that saves, restores, and reapplies timestamps to hide evidence of compromise.

Forensicsscripttimestamp
0 likes · 8 min read
How to Hide Linux File Timestamps with a Bash Script
ITPUB
ITPUB
Jul 4, 2022 · Information Security

10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

This article outlines ten practical methods for protecting API data, covering transmission encryption, digital signatures, token authentication, timestamp and nonce mechanisms, rate limiting, blacklist/whitelist controls, data masking, and parameter validation to ensure comprehensive interface security.

API SecurityParameter Validationdata masking
0 likes · 14 min read
10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More
Bin's Tech Cabin
Bin's Tech Cabin
Jun 24, 2022 · Backend Development

When Timestamp Caching Backfires: Sentinel’s Adaptive Solution Explained

The article examines how naive timestamp caching can increase CPU usage under high concurrency, analyzes implementations in Alibaba’s Cobar and Sentinel, presents performance test results, and explains Sentinel’s adaptive algorithm that switches between cached and direct timestamps based on QPS.

BackendGolangcaching
0 likes · 12 min read
When Timestamp Caching Backfires: Sentinel’s Adaptive Solution Explained
Laravel Tech Community
Laravel Tech Community
May 16, 2022 · Information Security

Preventing Replay Attacks with Timestamps and Nonces in PHP

The article explains replay attacks, describes how using a timestamp, a nonce, or a combination of both can protect API requests, and provides complete PHP code examples for signing and verifying requests to ensure each call is accepted only once.

PHPReplay attacknonce
0 likes · 7 min read
Preventing Replay Attacks with Timestamps and Nonces in PHP
360 Quality & Efficiency
360 Quality & Efficiency
Mar 25, 2022 · Information Security

Adding a Graphical Seal and Network Timestamp Electronic Signature to PDF Documents with Java and Spire

This tutorial demonstrates how to programmatically embed a graphical seal and a trusted network timestamp electronic signature into a PDF using Java, the Spire library, and a .pfx certificate, covering preparation, signature creation, positioning, timestamp configuration, visual settings, and final saving.

Electronic SealPDFSpire
0 likes · 5 min read
Adding a Graphical Seal and Network Timestamp Electronic Signature to PDF Documents with Java and Spire
IT Services Circle
IT Services Circle
Mar 24, 2022 · Fundamentals

Comprehensive Guide to Python Time Handling with calendar, time, and datetime Modules

This article provides a detailed tutorial on Python's time‑related classes and functions, covering Unix timestamps, conversion tools, and the practical use of the calendar, time, and datetime modules with examples of formatting, timezone conversion, and common time‑conversion tricks for everyday programming tasks.

CalendarPythondate-time conversion
0 likes · 18 min read
Comprehensive Guide to Python Time Handling with calendar, time, and datetime Modules
Aikesheng Open Source Community
Aikesheng Open Source Community
Nov 3, 2021 · Databases

Why MySQL TIMESTAMP Columns May Fail with “cannot be null” After Migration

The article explains how MySQL's explicit_defaults_for_timestamp setting and strict SQL mode cause TIMESTAMP columns with default CURRENT_TIMESTAMP to produce "Invalid default value" errors during migration from 5.7.28 to 5.7.20, especially when synchronization tools omit NULL and DEFAULT attributes.

explicit_defaults_for_timestampinvalid default valuemigration
0 likes · 7 min read
Why MySQL TIMESTAMP Columns May Fail with “cannot be null” After Migration
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 26, 2021 · Databases

Understanding MySQL explicit_defaults_for_timestamp and Its Impact on TIMESTAMP Columns

This article explains how the MySQL system variable explicit_defaults_for_timestamp controls the default and NULL handling of TIMESTAMP columns, demonstrates the differences between OFF and ON settings with practical tests, and discusses why the parameter is being deprecated for stricter time‑data management.

NULLSQLdatabase migration
0 likes · 10 min read
Understanding MySQL explicit_defaults_for_timestamp and Its Impact on TIMESTAMP Columns
Java Backend Technology
Java Backend Technology
Jun 3, 2021 · Databases

Why MySQL TIMESTAMP Is a Hidden Pitfall and How to Avoid It

This article explains MySQL's three time types, highlights the quirks and automatic defaults of TIMESTAMP—including the 2038 problem, high‑concurrency issues, and unexpected behavior in non‑strict mode—provides practical examples, and offers guidance on configuring server variables or switching to DATETIME for safer handling.

2038 problemSQLTimezone
0 likes · 11 min read
Why MySQL TIMESTAMP Is a Hidden Pitfall and How to Avoid It
Liangxu Linux
Liangxu Linux
Jun 2, 2021 · Operations

How to Find Files by Timestamp Using the Linux find Command

This guide explains the three Unix file timestamps, shows how to view them with stat, and demonstrates using the find command’s ‑newerXY option to locate files modified, accessed, or status‑changed after a specific date and time.

File SearchLinuxUnix
0 likes · 5 min read
How to Find Files by Timestamp Using the Linux find Command
php Courses
php Courses
Feb 8, 2021 · Backend Development

How to Obtain Millisecond‑Precision Timestamps in PHP: 13‑Digit, Float, and Custom 14‑Digit Formats

This article demonstrates three PHP techniques for obtaining millisecond‑precision timestamps—13‑digit integer, floating‑point value, and a custom 14‑digit format—providing full code examples and usage illustrations. It also shows how to integrate the timestamp into request data structures for payment APIs.

millisecondphp7timestamp
0 likes · 3 min read
How to Obtain Millisecond‑Precision Timestamps in PHP: 13‑Digit, Float, and Custom 14‑Digit Formats
Top Architect
Top Architect
Oct 2, 2020 · Information Security

Designing Simple API Authentication for Internal Services

The article explores practical approaches for authenticating internal service APIs, comparing plain token usage, IP whitelisting, and salted signature schemes with timestamps, and explains their implementation details, security trade‑offs, and suitability for a B2B cloud‑operated platform.

API authenticationBackend SecurityIP whitelist
0 likes · 7 min read
Designing Simple API Authentication for Internal Services
Programmer DD
Programmer DD
Jul 25, 2020 · Backend Development

Designing Simple Yet Secure API Authentication for Internal Services

This article walks through practical methods for securing internal API calls—starting with simple token checks, then enhancing security with IP whitelisting, salted signatures, and timestamped requests—while weighing trade‑offs like HTTPS overhead and time synchronization.

API authenticationBackend SecurityToken
0 likes · 6 min read
Designing Simple Yet Secure API Authentication for Internal Services
Programmer DD
Programmer DD
May 30, 2020 · Databases

Which Date/Time Type Should You Use in Databases? A Practical Guide

This article examines common date and time storage options in databases—string, DateTime, Timestamp, and Unix timestamp—highlighting their characteristics, timezone handling, performance implications, and best-use scenarios, with Java code examples and migration tips.

Timezonedatetimetimestamp
0 likes · 7 min read
Which Date/Time Type Should You Use in Databases? A Practical Guide
Senior Brother's Insights
Senior Brother's Insights
May 20, 2020 · Databases

How to Choose the Right Date/Time Storage: Strings, DATETIME, TIMESTAMP, or Unix Timestamp

This article compares common database date‑time storage options—string fields, DATETIME, TIMESTAMP, and Unix timestamps—explaining their formats, range limits, timezone handling, performance implications, and provides Java code examples and SQL conversion tips to help developers select the most suitable approach for their systems.

databasesdate-timetimestamp
0 likes · 6 min read
How to Choose the Right Date/Time Storage: Strings, DATETIME, TIMESTAMP, or Unix Timestamp
Java Captain
Java Captain
May 17, 2020 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamps, AppId authentication, rate limiting, blacklisting, and data validation—and provides practical Java implementation examples and code snippets.

AppIdBlacklistencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
Sohu Tech Products
Sohu Tech Products
Nov 13, 2019 · Backend Development

Understanding Date and Time Handling in Java: From System.currentTimeMillis to Java 8 Date/Time API

This article explains the physical and philosophical notions of time, the challenges of representing time in computing, and provides a comprehensive guide to Java's date‑time APIs—including System.currentTimeMillis, System.nanoTime, java.util.Date, java.sql.Timestamp, Calendar, SimpleDateFormat, and the modern Java 8 classes such as Instant, LocalDate/Time, ZonedDateTime, and DateTimeFormatter—while highlighting common pitfalls and best practices.

Timezonedatetimejava8
0 likes · 23 min read
Understanding Date and Time Handling in Java: From System.currentTimeMillis to Java 8 Date/Time API
Java High-Performance Architecture
Java High-Performance Architecture
Nov 8, 2019 · Databases

How to Prevent Redis Key Race Conditions: Optimistic Locks, Distributed Locks, Timestamps & Queues

This article explains the Redis concurrent key competition problem, illustrates typical scenarios where multiple clients modify the same key, and presents four practical solutions—optimistic locking with WATCH/EXEC, distributed locks, timestamp ordering, and message‑queue serialization—to ensure data correctness under high concurrency.

Message Queueconcurrencydistributed-lock
0 likes · 5 min read
How to Prevent Redis Key Race Conditions: Optimistic Locks, Distributed Locks, Timestamps & Queues
FunTester
FunTester
Sep 28, 2019 · Backend Development

When VIP Expiration Hits 2038: Uncovering MySQL INT Overflow

A bug was discovered where a user's VIP expiration date could not extend beyond a specific day in 2038 because the timestamp was stored in a signed INT column, whose maximum value (2147483647) corresponds to 2038‑01‑19 11:14:07, causing the system to fail to save later dates.

INT overflowVIP expirationbackend bug
0 likes · 3 min read
When VIP Expiration Hits 2038: Uncovering MySQL INT Overflow
Programmer DD
Programmer DD
Sep 16, 2019 · Databases

Why MySQL DATETIME Misses Milliseconds: Connector Bugs and Practical Fixes

This article explores common MySQL DATETIME timestamp precision issues caused by mismatched mysql‑connector‑java and server versions, demonstrates three practical solutions, and provides a step‑by‑step case study with code examples to help developers choose the right time field type and avoid timezone pitfalls.

JavaTimezonemysql
0 likes · 7 min read
Why MySQL DATETIME Misses Milliseconds: Connector Bugs and Practical Fixes
Liangxu Linux
Liangxu Linux
Nov 7, 2018 · Operations

Mastering the Linux date Command: Formats, Calculations & Timestamp Conversions

This guide explains why accurate date‑time handling matters for tasks like log naming, introduces the common date format specifiers, and provides step‑by‑step shell examples for retrieving the current time, custom‑formatted dates, relative dates such as yesterday or one hour ago, and converting between human‑readable dates and Unix timestamps.

Bashdate commandtime formatting
0 likes · 5 min read
Mastering the Linux date Command: Formats, Calculations & Timestamp Conversions
Senior Brother's Insights
Senior Brother's Insights
Oct 12, 2017 · Blockchain

How to Retrieve and Convert Blockchain Block Timestamps in Java

This guide explains that blockchain block creation times are stored as Unix timestamps in seconds, describes the Unix time concept, shows how to convert timestamps in Java from milliseconds to seconds and back, and provides a concrete Ethereum example using Web3.js to fetch a block’s timestamp.

Unixtimestamp
0 likes · 2 min read
How to Retrieve and Convert Blockchain Block Timestamps in Java
Qunar Tech Salon
Qunar Tech Salon
Apr 6, 2017 · Databases

Understanding Timestamp and exec_time in MySQL Binlog Events

This article explains how MySQL binlog timestamps are derived from the THD start_time, why all events in a transaction share the same timestamp, how exec_time is calculated, and demonstrates the effect of autocommit and manual commit on binlog timing through concrete examples and source code analysis.

BinlogGTIDdatabase
0 likes · 10 min read
Understanding Timestamp and exec_time in MySQL Binlog Events