Tagged articles
21 articles
Page 1 of 1
21CTO
21CTO
Sep 24, 2025 · Information Security

How GitHub’s New npm Security Measures Aim to Stop Supply‑Chain Worms

GitHub is tightening npm security by removing infected packages, enforcing two‑factor authentication for publishing, shortening token lifespans, and expanding trusted publishing to curb the Shai‑Hulud worm and protect the open‑source supply chain.

GitHubSoftware SecurityTwo-Factor Authentication
0 likes · 3 min read
How GitHub’s New npm Security Measures Aim to Stop Supply‑Chain Worms
MaGe Linux Operations
MaGe Linux Operations
Jul 30, 2025 · Information Security

7 Proven Ways to Harden SSH and Block Brute‑Force Attacks

This guide walks you through seven practical SSH hardening techniques—from changing the default port and disabling password logins to deploying Fail2ban, IP whitelisting, connection limits, two‑factor authentication, and a honeypot—showing why each step matters and how to implement it securely.

Port ObfuscationPublic Key AuthenticationSSH Security
0 likes · 12 min read
7 Proven Ways to Harden SSH and Block Brute‑Force Attacks
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Raymond Ops
Raymond Ops
Jan 24, 2025 · Information Security

Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide

This tutorial explains how to enhance SSH security by integrating Google Authenticator for two‑factor authentication, covering SSH basics, Google Authenticator overview, Linux installation steps, PAM configuration, client setup on Android, browsers, and Python, with complete command examples.

Google AuthenticatorLinuxSSH
0 likes · 9 min read
Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide
IT Services Circle
IT Services Circle
Oct 21, 2024 · Information Security

Understanding Microsoft Account Fatigue Attacks and Security Recommendations

The article explains how fatigue attacks target Microsoft accounts by repeatedly sending login prompts, describes Microsoft's new numeric verification safeguard, and offers practical security measures such as changing passwords, using passkeys, switching to alternative authenticators, and updating the linked email to protect personal data.

Fatigue AttackMicrosoftPasskey
0 likes · 5 min read
Understanding Microsoft Account Fatigue Attacks and Security Recommendations
Liangxu Linux
Liangxu Linux
Nov 27, 2023 · Information Security

How TOTP Secures Your Accounts: Theory, Applications, and Python Demo

This article explains the TOTP algorithm behind time‑based one‑time passwords, outlines its security benefits and common use cases such as online logins, VPNs, and hardware tokens, and provides a practical Python implementation with code examples using the pyotp library.

OTPPythonSecurity
0 likes · 6 min read
How TOTP Secures Your Accounts: Theory, Applications, and Python Demo
Programmer DD
Programmer DD
Sep 25, 2023 · Information Security

How to Bypass Missing China Option and Enable GitHub 2FA Easily

This guide explains why GitHub’s 2FA setup may lack a China option, shows a JavaScript workaround that no longer works, and details the reliable method of completing verification using authenticator apps and a QR code.

2FAAuthenticator AppsGitHub
0 likes · 3 min read
How to Bypass Missing China Option and Enable GitHub 2FA Easily
Selected Java Interview Questions
Selected Java Interview Questions
May 25, 2023 · Information Security

Implementing Two-Factor Authentication in Spring Security with Google Authenticator, Authy, and Custom TOTP

This article explains how to add two‑factor authentication to a Spring Security‑based Java web application by integrating Google Authenticator, Authy, or a custom TOTP module, covering required dependencies, service implementations, security configuration, and testing procedures.

AuthyGoogle AuthenticatorJava
0 likes · 29 min read
Implementing Two-Factor Authentication in Spring Security with Google Authenticator, Authy, and Custom TOTP
php Courses
php Courses
May 20, 2023 · Information Security

Preventing Brute‑Force Attacks in PHP Applications

This article explains what brute‑force attacks are, why they threaten PHP applications, and presents three practical defenses—two‑factor authentication, enforced password policies, and brute‑force mitigation techniques—along with complete PHP code examples for each method.

PHPSecurityTwo-Factor Authentication
0 likes · 4 min read
Preventing Brute‑Force Attacks in PHP Applications
Programmer DD
Programmer DD
Mar 12, 2023 · Information Security

GitHub’s 2FA Mandate: Boosting Software Supply Chain Security

Starting March 13, 2023, GitHub will enforce two‑factor authentication for all contributors, rolling out the requirement gradually based on activity and project impact, to strengthen the global software supply chain against account takeover attacks and align with broader cybersecurity policies.

Developer SecurityGitHubTwo-Factor Authentication
0 likes · 6 min read
GitHub’s 2FA Mandate: Boosting Software Supply Chain Security
21CTO
21CTO
May 6, 2022 · Information Security

Why GitHub Is Mandating Two-Factor Authentication for All Contributors by End‑2023

GitHub announced that, starting in 2023, every code contributor must enable two‑factor authentication or lose the ability to push code, a move aimed at strengthening account security across its massive developer ecosystem despite low current adoption rates.

Developer PracticesGitHubSoftware Security
0 likes · 4 min read
Why GitHub Is Mandating Two-Factor Authentication for All Contributors by End‑2023
21CTO
21CTO
Feb 4, 2022 · Information Security

5 Essential SSH Best Practices to Harden Your Linux Server

This guide outlines five practical SSH security measures—including two‑factor authentication, changing default settings, certificate‑based login, bastion host deployment, and firewall configuration—to significantly improve the baseline protection of Linux servers.

Bastion HostLinux securitySSH
0 likes · 7 min read
5 Essential SSH Best Practices to Harden Your Linux Server
Open Source Linux
Open Source Linux
Dec 28, 2021 · Information Security

Secure Your Linux Server with Google Authenticator Two-Factor Authentication: A Complete Guide

This guide walks you through installing PAM modules, generating Google Authenticator codes, configuring SSH and sudo for two-factor authentication, setting up Fail2ban to block brute-force attempts, and recovering from lockouts, providing all commands and configuration steps for a hardened Linux server.

Fail2banGoogle AuthenticatorTwo-Factor Authentication
0 likes · 5 min read
Secure Your Linux Server with Google Authenticator Two-Factor Authentication: A Complete Guide
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Java High-Performance Architecture
Java High-Performance Architecture
Sep 29, 2021 · Information Security

How Authelia Enables Open‑Source Two‑Factor SSO for Your Apps

This article introduces Authelia, an open‑source authentication and authorization server that provides two‑factor authentication and single sign‑on, explains how it integrates with reverse proxies like Nginx, Traefik or HAProxy, outlines installation options, showcases its UI and key security features, and shares its GitHub statistics and link.

AutheliaSSOSecurity
0 likes · 4 min read
How Authelia Enables Open‑Source Two‑Factor SSO for Your Apps
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
High Availability Architecture
High Availability Architecture
Jul 30, 2015 · Information Security

Web Application Security Threats and Mitigation Strategies

This article outlines the most common web application security threats—including XSS, SQL injection, CSRF, transmission hijacking, credential leaks, brute‑force attacks, and token theft—and provides practical mitigation techniques such as proper escaping, CSP, parameterized queries, CSRF tokens, HTTPS, HSTS, HPKP, encrypted password storage, two‑factor authentication, and robust token handling.

CSPCSRFHTTPS
0 likes · 26 min read
Web Application Security Threats and Mitigation Strategies
Baidu Tech Salon
Baidu Tech Salon
Oct 23, 2014 · Information Security

Designing Two-Factor Authentication Using WeChat: Balancing Security and User Experience

The article outlines a WeChat‑based two‑factor authentication design that binds user accounts via QR codes, leverages WeChat push messages to avoid SMS reliability issues, addresses daily‑message limits and mobile scanning constraints, and demonstrates how this approach can enhance security while preserving a seamless user experience.

Two-Factor AuthenticationUser experienceWeChat
0 likes · 13 min read
Designing Two-Factor Authentication Using WeChat: Balancing Security and User Experience
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2014 · Information Security

Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup

This tutorial explains how to protect SSH logins by installing Google Authenticator, generating a secret key, configuring PAM and sshd, and using an Android device to provide time‑based one‑time passwords, complete with installation commands, troubleshooting tips, and verification steps.

Google AuthenticatorLinuxSSH
0 likes · 8 min read
Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup