Security

  • _index
Posts in 2025
  • Attack Methods Against Model-Relay Services

    Friday, July 11, 2025 in Security

    Avoiding public routers—especially free Wi-Fi—has become common sense in recent years, yet many people still don’t understand why, leaving them vulnerable to new variants of the same trick. Due to Anthropic’s corporate policy, users in China cannot …

    Read more

  • The Risks of AI Model-Relay Services

    Thursday, July 10, 2025 in Security

    Lately, in the comment threads on AI-related posts, you’ll see a flood of low-quality ads touting “cheap Claude Code relay” services. The business model is simple: Claude Code lets you supply your own API endpoint and key, including any vendor that’s …

    Read more

  • How to Avoid Getting Doxxed

    Wednesday, March 19, 2025 in Security

    Fragmented information is easily pieced together Personal information is dispersed and sensitive—easy to overlook. Yet the internet is not a safe harbor; countless people can stitch this information together using search engines and other tools. Take …

    Read more

  • Security Best Practices for Personal Domains

    Friday, January 17, 2025 in Security

    Preface In the Internet era, cyber attacks have become the norm. Every day, countless automated tools scan every corner of the web looking for vulnerabilities. Many believe only large corporations become targets, but due to lower attack costs and …

    Read more

Posts in 2024
  • snort

    Friday, June 28, 2024 in Security

    snort Snort https://www.snort.org/ Protect your network with the world’s most powerful Open Source detection software. What is Snort? Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of …

    Read more

  • Trustworthy Design

    Friday, June 28, 2024 in Security

    Security Architecture and Design Principles The Three Security Elements and Security Design Principles Integrity Availability Confidentiality Open Design Principle Open Design The design should not be secret; open designs are more secure. Security …

    Read more

  • Huawei Trust Concept

    Friday, June 28, 2024 in Security

    Huawei Trust Concept Security: The product has strong anti-attack capabilities to safeguard the confidentiality, integrity, and availability of services and data. Resilience: When under attack, the system maintains a defined operational state …

    Read more

  • Huawei Intranet Security Analysis

    Friday, June 28, 2024 in Security

    Huawei Intranet Security Analysis Huawei has plenty of excellent internal learning materials, and I have amassed a wealth of knowledge and experience myself; I have long wondered how to import them into my personal knowledge base. I am fully aware …

    Read more

  • DDoS Defense

    Friday, June 28, 2024 in Security

    DDoS Defense DDoS Definition Two kinds of DoS attacks: Crash the service Congest the network Attack Types Attack Type Attack Method Countermeasure Distributed DoS Multiple independent-IP machines begin attacking simultaneously 1. Degrade service 2. …

    Read more