Tagged articles
3 articles
Page 1 of 1
Tech Freedom Circle
Tech Freedom Circle
Jan 24, 2026 · Operations

How to Tackle Excess Connections, DDoS/DoS, CORS and XSS Attacks – A Complete Practical Guide

This article walks through a systematic, production‑grade approach to diagnosing and mitigating connection‑overload, DoS/DDoS, XSS and cross‑origin attacks, covering log analysis, Linux kernel tuning, Nginx rate‑limiting, CDN/DDoS‑protection layers, WAF rules, safe rendering practices, and a hardened CORS configuration template.

BackendCORSDDoS mitigation
0 likes · 48 min read
How to Tackle Excess Connections, DDoS/DoS, CORS and XSS Attacks – A Complete Practical Guide
Architect
Architect
Mar 13, 2024 · Information Security

11 Essential Practices to Secure Your APIs – From Validation to Risk Control

This article outlines eleven practical techniques for protecting API endpoints, covering parameter validation, unified response wrapping, XSS escaping, captcha integration, rate limiting, IP whitelisting, sensitive‑word checks, HTTPS adoption, data encryption, and comprehensive risk control measures, each illustrated with concrete code snippets and step‑by‑step workflows.

API SecurityHTTPSParameter Validation
0 likes · 18 min read
11 Essential Practices to Secure Your APIs – From Validation to Risk Control