diff --git a/backend/microservices/readme.md b/backend/microservices/readme.md index d2c7821..4d774f0 100644 --- a/backend/microservices/readme.md +++ b/backend/microservices/readme.md @@ -133,7 +133,7 @@ services: ``` ### 🚀 Solution Enforce the "Database per Service" pattern. Services must never share a single database or directly query another service's tables. Ensure independent scaling, deployment, and technology choices per domain. -## 🚀 3. Reliability Optimization +## 🛡️ 3. Reliability Optimization ### Resilience Patterns ### ❌ Bad Practice diff --git a/backend/nodejs/readme.md b/backend/nodejs/readme.md index bc898fe..459eb26 100644 --- a/backend/nodejs/readme.md +++ b/backend/nodejs/readme.md @@ -226,7 +226,7 @@ const user = await db.query('SELECT * FROM users WHERE email = $1', [value.email ### 🚀 Solution Never trust external data. Validate input strictly using schema definitions and always utilize parameterized queries or an ORM to prevent SQL/NoSQL Injection attacks. -## 9. 🚀 Utilizing Worker Threads for Heavy Tasks +## 9. ⚡ Utilizing Worker Threads for Heavy Tasks ### ❌ Bad Practice ```javascript diff --git a/backend/postgresql/readme.md b/backend/postgresql/readme.md index 428615a..63fb850 100644 --- a/backend/postgresql/readme.md +++ b/backend/postgresql/readme.md @@ -105,7 +105,7 @@ REVOKE DROP ON ALL TABLES IN SCHEMA public FROM app_user; ``` ### 🚀 Solution Enforce the Principle of Least Privilege (PoLP). Create specific, restricted database roles for application services. Implement Row-Level Security (RLS) for multi-tenant applications to isolate data strictly at the database layer. -## 🚀 3. Performance Optimization +## ⚡ 3. Performance Optimization ### Indexing Strategies ### ❌ Bad Practice diff --git a/backend/redis/readme.md b/backend/redis/readme.md index 4e94a9a..12de879 100644 --- a/backend/redis/readme.md +++ b/backend/redis/readme.md @@ -116,7 +116,7 @@ const redisClient = redis.createClient({ ``` ### 🚀 Solution Mandate TLS (Transport Layer Security) for encrypting all data in transit, ensuring that even if the internal network is compromised, the Redis traffic remains secure. -## 🚀 3. Performance Optimization +## ⚡ 3. Performance Optimization ### Command Usage ### ❌ Bad Practice