security共590篇
The Fallout From log4j and What We Can Learn From It-拾光赋

The Fallout From log4j and What We Can Learn From It

The Fallout From log4j and What We Can Learn From It,By now most people who work in software or IT have heard about the vulnerability in log4j that was disclosed last week. This ha...
kity的头像-拾光赋kity4年前
04810
Use Client Certificate Authentication with Java and RestTemplate-拾光赋

Use Client Certificate Authentication with Java and RestTemplate

Use Client Certificate Authentication with Java and RestTemplate,As a follow up of the Convert PFX certificate to JKS, P12, CRT we now have a keystore and a truststore (if anyone n...
kity的头像-拾光赋kity6年前
03710
Uncovering critical data access using AppMaps-拾光赋

Uncovering critical data access using AppMaps

Uncovering critical data access using AppMaps,As part of a recent hackathon project, I pulled together some data insights from AppMap data. For those unfamiliar, the AppMap framewo...
kity的头像-拾光赋kity5年前
03511
Scan your Java projects and fix any Apache log4j vulnerability NOW-拾光赋

Scan your Java projects and fix any Apache log4j vulnerability NOW

Scan your Java projects and fix any Apache log4j vulnerability NOW,Scan your Java projects and fix any #Apache #log4j #vulnerability NOW ! See more at https://blog.cloudflare.com/i...
kity的头像-拾光赋kity4年前
0517
Securely Containerize a Python Application with Chainguard Images-拾光赋

Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images, Overview Containerization technologies such as Docker have revolutionized the development to production pipeline,...
kity的头像-拾光赋kity11个月前
03213
Spring Security Persistent OAuth2 Client-拾光赋

Spring Security Persistent OAuth2 Client

Spring Security Persistent OAuth2 Client,In previous article, it is introduced that the client requests authorization from the authorization server (using Spring Authorization Serv...
kity的头像-拾光赋kity2年前
03014
pedumper: A new tool for dumping PE files-拾光赋

pedumper: A new tool for dumping PE files

pedumper: A new tool for dumping PE files, Summary I have published a new tool for dumping PE files in the target memory on Windows The tool name is pedumper. Here is a link for th...
kity的头像-拾光赋kity3年前
04215
Implementing a Dynamic RBAC System for Enterprise Applications - Simplified-拾光赋

Implementing a Dynamic RBAC System for Enterprise Applications – Simplified

Implementing a Dynamic RBAC System for Enterprise Applications - Simplified, Introduction In today’s digital landscape, effective access management is critical for securing resour...
kity的头像-拾光赋kity7个月前
03915
Public Key Cryptography Simply Explained-拾光赋

Public Key Cryptography Simply Explained

Public Key Cryptography Simply Explained,Public key cryptography seems magical to everyone, even those who understand it. In this post, I’m going to explain public key cryptograph...
kity的头像-拾光赋kity6年前
0245
Using the Snyk API with Python-拾光赋

Using the Snyk API with Python

Using the Snyk API with Python,Shortly after I started at Snyk last year, I started experimenting with the Snyk API. I picked Python for those experiments, and ended up writing a n...
kity的头像-拾光赋kity5年前
0468
Withdraw and modify restriction in password django application-拾光赋

Withdraw and modify restriction in password django application

Withdraw and modify restriction in password django application,Forcing user to make strong password always a good practice. But for making a simple web application, too much restri...
kity的头像-拾光赋kity3年前
0388
Are the numbers we generate truly random?-拾光赋

Are the numbers we generate truly random?

Are the numbers we generate truly random?, Introduction Whenever we need our code to produce a random number, we usually call a method from a library to generate it for us. But are...
kity的头像-拾光赋kity3年前
04415