Blog

Posts in 2024
  • Getting Started with Copilot

    Friday, June 28, 2024 in Blog

    Video Sharing Copilot Labs Capabilities What is Copilot Understand Suggest Debug Review Refactor Document Using Custom to Extend Copilot Boundaries Getting More Professional Suggestions Plain Text Suggestions Settings Data Security FAQ GitHub Copilot …

    Read more

  • ChatGPT User Guide

    Friday, June 28, 2024 in Blog

    Overview ChatGPT is a chatbot developed by OpenAI based on a large language model (LLM). Its core value lies in understanding natural language and generating text responses with logical coherence. This guide aims to provide a systematic methodology …

    Read more

  • Trustworthy Design

    Friday, June 28, 2024 in Blog

    Security Architecture and Design Principles The Three Security Elements and Security Design Principles Integrity Availability Confidentiality Open Design Principle Open Design The design should not be secret; open designs are more secure. Security …

    Read more

  • Huawei's Trustworthiness Concept

    Friday, June 28, 2024 in Blog

    Huawei’s Trustworthiness Concept Security: The product has strong attack resistance capabilities, protecting the confidentiality, integrity, and availability of services and data. Resilience: The ability to maintain a defined operational state …

    Read more

  • Huawei Intranet Security Analysis

    Friday, June 28, 2024 in Blog

    Huawei Intranet Security Analysis Huawei has a lot of great learning materials internally, and I have also summarized a lot of knowledge and experience. I’ve always been thinking about how to import them into my personal knowledge base. I am …

    Read more

  • Child Online Protection

    Friday, June 28, 2024 in Blog

    With the increasing prevalence of the internet, children have more opportunities to access online resources. While the digital world offers abundant opportunities, it also harbors potential risks. Due to their immature cognitive development, children …

    Read more

  • DoS Prevention

    Friday, June 28, 2024 in Blog

    DDoS Prevention DDoS Definition Two types of DoS attacks: Cause service crashes Cause network congestion Attack Types Attack Type Attack Method Response Method Distributed DoS Multiple machines with independent IPs attack simultaneously 1. Degrade …

    Read more

  • ingress-nginx and nginx ingress are not the same thing

    Tuesday, June 18, 2024 in Blog

    After two weeks of reading the documentation, I finally realized that Ingress-Nginx and Nginx Ingress are not the same thing. Their functionality and implementation methods are different. There is even documentation to guide migration. Migrating from …

    Read more

  • Using Alibaba Cloud Distributed Storage in Self-built K8S Clusters

    Friday, June 14, 2024 in Blog

    Introduction This article was written on 2024.06.14, introducing how to use Alibaba Cloud distributed storage in self-built clusters on Alibaba Cloud. Relevant documentation links are provided at the end. The official Alibaba Cloud documentation is …

    Read more

  • Using DNS to Gracefully Switch Network Services

    Wednesday, June 12, 2024 in Blog

    Assume the service domain name is example.domain, the original server IP is A, and the new server IP is B after migration or IP change. To keep users unaware, we can use DNS to gracefully switch network services. Original state: example.domain …

    Read more