MySQL Backup and Recovery: Protecting Data Security and Business Continuity

1. Quote MySQL is a widely used relational database management system. For any enterprise or individual, data security and continuity are crucial. Backup and recovery are one of the important means to protect data security and achieve business continuity. This article will introduce the importance of MySQL backup and recovery, the selection of backup strategies, […]

How to understand and select optimistic locks and pessimistic locks during back-end development?

The author was asked this practical question when participating in a soft opening interview at a bank, so I came here to learn and summarize it. To get straight to the point, when choosing between pessimistic locks and optimistic locks, you need to consider the specific application scenarios: Pessimistic locking is suitable for scenarios where […]

iManager&cloud suite supports configuring kingbase

Author yangjunlin Foreword More and more secret-related units have gradually increased their requirements for the Xinchuang environment, and service applications are also increasingly dependent on domestic databases. The open source database in the SuperGraph iManager for k8s product is replaced with domestic databases such as Kingbase. Customer needs and scenarios will follow. Therefore, this article […]

SpringSecurity front-end and back-end separation

1. Create the vue front-end framework http://t.csdnimg.cn/jRcInhttp://t.csdnimg.cn/jRcIn After creation, use the tool to open and download axios, element-ui Then import axios and element-ui in the global configuration. I also have interceptors and paging plug-ins. import axios from “axios”; import ElementUI from ‘element-ui’; import ‘element-ui/lib/theme-chalk/index.css’; // For back-end projects http://localhost:8080 //axios sets a default path // […]

RABC permission model and Spring Security

Today, I’m going to take you into an area full of strategy and excitement-permission battles. In this battle, our protagonists are the RABC permission model (Role-Based Access Control) and Spring Security. Together, they will create a safe and stable world for us. Permission model: the maker of game rules First, we compare the permission model […]

Interface test series – interface security test

The “Open Source Web Application Security Project” (OWASP) released the top ten API security risks “OWASP API Security Top 10” in 2019: failed object-level authorization, failed user authentication, excessive data exposure, lack of resources and rate limits, Broken function-level authorization, bulk allocation, security misconfigurations, injections, improper asset management, and insufficient logging and monitoring are among […]

React technical principles and code development practice: Configuring and using Webpack in React projects

Author: Zen and the Art of Computer Programming 1. Background Introduction React is one of the most popular front-end frameworks at the moment, and some basic knowledge about it has been released on its official website. React developers are increasingly joining the ranks. There are a large number of articles involving React in many places, […]

WEB Security (Command Execution) Note 2

Foreword A command execution vulnerability is a security vulnerability that allows an attacker to execute malicious system commands. This vulnerability typically occurs when an application or system does not properly validate user input, allowing the user to execute system commands by entering specific data. The occurrence of vulnerabilities is usually related to the following factors: […]