Security

How to Implement Validation for RESTful Services with Spring

November 13, 2018

Data validation is not a new topic in web application development and here we take a brief look at data validation in Java ecosystem in general and Spring Framework specifically. Java platform has de facto a standard for implementing data validation that is Bean Validation specification.

Read more

How to Reset or Change the Root Password in Linux

October 22, 2018

In Linux, root privileges (or root access) refers to a user account that has full access to all files, applications, and system functions.

Read more

How to Configure Windows Server 2012 Firewall

September 17, 2018

Firewalls have become an essential part of every network that has access to the Internet. Without firewalls, anyone would be able to access your network and servers and infect them with malicious software. Properly configured, a firewall can substantially decrease undesirable network communications in a local network.

Read more

OpenSSL Tutorial: How Do SSL Certificates, Private Keys, & CSRs Work?

September 11, 2018

Initially developed by Netscape in 1994 to support the internet’s e-commerce capabilities, Secure Socket Layer (SSL) has come a long way. Amidst all the cyber attacks, SSL certificates have become a regular necessity for any live website.

Read more
1 10 11 12