Tag

Security

0 views collected around this technical thread.

OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 30, 2022 · Information Security

Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)

The article examines three Android Bluetooth stack flaws—CVE‑2020‑27024 in the SMP pairing protocol, CVE‑2021‑0918 in GATT notifications, and CVE‑2021‑39805 in L2CAP signaling—detailing their out‑of‑bounds memory errors, underlying code issues, and implications for future Rust‑based stack security.

AndroidBluetoothCVE
0 likes · 15 min read
Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)
vivo Internet Technology
vivo Internet Technology
Aug 17, 2022 · Information Security

Implementing Database Field Encryption with a MyBatis Plugin

The article demonstrates how to implement lightweight field-level encryption in MyBatis by adding encrypted columns, creating a custom interceptor that encrypts annotated parameters on write and decrypts them on read, handling executor, statement, parameter, and result set processing, and addressing pagination count queries.

Database EncryptionMyBatisORM
0 likes · 18 min read
Implementing Database Field Encryption with a MyBatis Plugin
vivo Internet Technology
vivo Internet Technology
Aug 3, 2022 · Frontend Development

Desktop Development with Electron: Technology Selection, Build Process, Performance Optimization, Quality Assurance, and Security

The guide details selecting Electron for cross‑platform desktop apps, then outlines a TypeScript‑Vue‑Vite stack with pnpm‑Turbo, explains build and packaging strategies, performance tweaks, update mechanisms, automated testing, crash handling, and layered security measures including native Rust modules and source‑code protection.

Desktop DevelopmentElectronIPC
0 likes · 19 min read
Desktop Development with Electron: Technology Selection, Build Process, Performance Optimization, Quality Assurance, and Security
Tencent Cloud Developer
Tencent Cloud Developer
Oct 26, 2020 · Databases

Database Auditing: Concepts, Methods, and TXSQL Implementation

Database auditing records user actions to detect illegal operations, with approaches ranging from application‑layer and transport‑layer monitoring to kernel‑level and plugin solutions; TXSQL’s MySQL‑compatible audit plugin offers both synchronous and asynchronous modes, delivering flexible rule configuration and only 3‑6 % performance overhead, making it a low‑impact, feature‑rich choice for compliance and forensics.

Audit ArchitectureMySQLPerformance
0 likes · 12 min read
Database Auditing: Concepts, Methods, and TXSQL Implementation
Tencent Cloud Developer
Tencent Cloud Developer
Mar 3, 2017 · Cloud Computing

Understanding VPC vs Classic Network in Public Cloud

After a mis‑configured security group in a classic network exposed a neighboring Alibaba Cloud user, developers highlighted the risks of shared internal networks and advocated moving to isolated Virtual Private Clouds, which offer customizable subnets, fine‑grained security, hybrid connectivity, and are now favored across major public‑cloud providers.

Cloud NetworkingNetwork MigrationSecurity
0 likes · 7 min read
Understanding VPC vs Classic Network in Public Cloud