Security
- _index
-
Attack Methods Against Model-Relay Services
Friday, July 11, 2025 in Security
Categories:
Avoiding public routers—especially free Wi-Fi—has become common sense in recent years, yet many people still don’t understand why, leaving them vulnerable to new variants of the same trick. Due to Anthropic’s corporate policy, users in China cannot …
-
The Risks of AI Model-Relay Services
Thursday, July 10, 2025 in Security
Categories:
Lately, in the comment threads on AI-related posts, you’ll see a flood of low-quality ads touting “cheap Claude Code relay” services. The business model is simple: Claude Code lets you supply your own API endpoint and key, including any vendor that’s …
-
How to Avoid Getting Doxxed
Wednesday, March 19, 2025 in Security
Categories:
Fragmented information is easily pieced together Personal information is dispersed and sensitive—easy to overlook. Yet the internet is not a safe harbor; countless people can stitch this information together using search engines and other tools. Take …
-
Security Best Practices for Personal Domains
Friday, January 17, 2025 in Security
Categories:
Preface In the Internet era, cyber attacks have become the norm. Every day, countless automated tools scan every corner of the web looking for vulnerabilities. Many believe only large corporations become targets, but due to lower attack costs and …
-
snort
Friday, June 28, 2024 in Security
Categories:
snort Snort https://www.snort.org/ Protect your network with the world’s most powerful Open Source detection software. What is Snort? Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of …
-
Trustworthy Design
Friday, June 28, 2024 in Security
Categories:
Security Architecture and Design Principles The Three Security Elements and Security Design Principles Integrity Availability Confidentiality Open Design Principle Open Design The design should not be secret; open designs are more secure. Security …
-
Huawei Trust Concept
Friday, June 28, 2024 in Security
Categories:
Huawei Trust Concept Security: The product has strong anti-attack capabilities to safeguard the confidentiality, integrity, and availability of services and data. Resilience: When under attack, the system maintains a defined operational state …
-
Huawei Intranet Security Analysis
Friday, June 28, 2024 in Security
Categories:
Huawei Intranet Security Analysis Huawei has plenty of excellent internal learning materials, and I have amassed a wealth of knowledge and experience myself; I have long wondered how to import them into my personal knowledge base. I am fully aware …
-
DDoS Defense
Friday, June 28, 2024 in Security
Categories:
DDoS Defense DDoS Definition Two kinds of DoS attacks: Crash the service Congest the network Attack Types Attack Type Attack Method Countermeasure Distributed DoS Multiple independent-IP machines begin attacking simultaneously 1. Degrade service 2. …