How To Prevent Brute Force Attacks With 8 Easy Tactics

December 3, 2018

A brute force attack is among the most straightforward and least sophisticated hacking method. As the name implies, brute force attacks are far from subtle. The theory behind such an attack is that if you take an infinite number of attempts to guess a password, you are bound to be right eventually.

Read more

How to Implement Validation for RESTful Services with Spring

November 13, 2018

Data validation is not a new topic in web application development and here we take a brief look at data validation in Java ecosystem in general and Spring Framework specifically. Java platform has de facto a standard for implementing data validation that is Bean Validation specification.

Read more

How to Configure Windows Server 2012 Firewall

September 17, 2018

Firewalls have become an essential part of every network that has access to the Internet. Without firewalls, anyone would be able to access your network and servers and infect them with malicious software. Properly configured, a firewall can substantially decrease undesirable network communications in a local network.

Read more

OpenSSL Tutorial: How Do SSL Certificates, Private Keys, & CSRs Work?

September 11, 2018

Initially developed by Netscape in 1994 to support the internet’s e-commerce capabilities, Secure Socket Layer (SSL) has come a long way. Amidst all the cyber attacks, SSL certificates have become a regular necessity for any live website.

Read more
1 10 11 12