Security

Security. Tutorials & Tips. Java. Scripts from Hot Scripts. Review before you use or buy a script! Let Hot Scripts uncover the best free, open source and commercial hot-scripts Security scripts for your web site.

Results 1 - 6 of 6

«
»
More Options
  • This can come in very handy, if you need to compare 2 different projects or envs. For example Development server against prod, to ensure they both have same certs stored in cacerts (sampled by java among others). Code to generate list of certs,

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Implementing a customized security library is expensive and unsuitable for medium and small applications. The Java Cryptography Extension, while the accepted standard for these apps, brings up a host of other problems. This article analyzes those

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Follow along as Java architect Abhijit Belapurkar leads this detailed, behind-the-scenes introduction to two distinctly different (yet related) models of authorization: the code-centric model of the Java 2 platform security architecture and the

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • A core requirement of any non-trivial P2P application is secure communication between peers. While the details of the security depend on how the application will be used and on what it will protect, it's often possible to implement strong,

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Weblets are Java programs that run in a browser, using DirectDOM to directly manipulate displayed documents. Like most Web-based programs, weblets pose a threat to system security if they're mishandled. Fortunately, weblets come with built-in security in

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose

Results 1 - 6 of 6

«
»