排序
The Fallout From log4j and What We Can Learn From It
The Fallout From log4j and What We Can Learn From It,By now most people who work in software or IT have heard about the vulnerability in log4j that was disclosed last week. This ha...
Use Client Certificate Authentication with Java and RestTemplate
Use Client Certificate Authentication with Java and RestTemplate,As a follow up of the Convert PFX certificate to JKS, P12, CRT we now have a keystore and a truststore (if anyone n...
Uncovering critical data access using AppMaps
Uncovering critical data access using AppMaps,As part of a recent hackathon project, I pulled together some data insights from AppMap data. For those unfamiliar, the AppMap framewo...
Scan your Java projects and fix any Apache log4j vulnerability NOW
Scan your Java projects and fix any Apache log4j vulnerability NOW,Scan your Java projects and fix any #Apache #log4j #vulnerability NOW ! See more at https://blog.cloudflare.com/i...
Securely Containerize a Python Application with Chainguard Images
Securely Containerize a Python Application with Chainguard Images, Overview Containerization technologies such as Docker have revolutionized the development to production pipeline,...
Spring Security Persistent OAuth2 Client
Spring Security Persistent OAuth2 Client,In previous article, it is introduced that the client requests authorization from the authorization server (using Spring Authorization Serv...
pedumper: A new tool for dumping PE files
pedumper: A new tool for dumping PE files, Summary I have published a new tool for dumping PE files in the target memory on Windows The tool name is pedumper. Here is a link for th...
Implementing a Dynamic RBAC System for Enterprise Applications – Simplified
Implementing a Dynamic RBAC System for Enterprise Applications - Simplified, Introduction In today’s digital landscape, effective access management is critical for securing resour...
Public Key Cryptography Simply Explained
Public Key Cryptography Simply Explained,Public key cryptography seems magical to everyone, even those who understand it. In this post, I’m going to explain public key cryptograph...
Using the Snyk API with Python
Using the Snyk API with Python,Shortly after I started at Snyk last year, I started experimenting with the Snyk API. I picked Python for those experiments, and ended up writing a n...
Withdraw and modify restriction in password django application
Withdraw and modify restriction in password django application,Forcing user to make strong password always a good practice. But for making a simple web application, too much restri...
Are the numbers we generate truly random?
Are the numbers we generate truly random?, Introduction Whenever we need our code to produce a random number, we usually call a method from a library to generate it for us. But are...