ConceptThe key is an indispensable part of the encryption algorithm and is vital to the security system. As its name suggests, the key is pr... Full text

May 5, 2017 14:34 PM from Board - Security

I. Beginning of the storyOne day in mid-December 2014, a customer contacted us. As the customer’s storage period of cabinets would expire in... Full text

Mar 22, 2017 9:41 AM from Board - E-Commerce

“You security teams do not hinder business development”, “This security policy impairs user experience and conversion rate” - the security d... Full text

Jan 18, 2017 13:27 PM from Board - Security

0x00 ForewordThere have been an increasing number of protections with increasing complexity on iOS as Apple carries on its years of R&D ... Full text

Jan 9, 2017 15:53 PM from Board - Security

Having worked in JD, I would like to introduce the technical teams of JD first. The overall status of technical teams in JD is not high, as ... Full text

Jan 4, 2017 9:45 AM from Board - E-Commerce

How to protect DNS - the heart of internetDyn, a US-based DNS service provider, suffered massive DDoS attacks at 19:11 on Oct 21, 2016, Beij... Full text

Dec 9, 2016 15:50 PM from Board - Security

Business is taking off. You are hiring new people, expanding your customer base and you have just bought a new work van to handle the recent... Full text

Dec 7, 2016 13:13 PM from Board - Security


Latest visit