Modern Encryption is at risk: Understanding the Quantum Computing ThreatMost of us are relying heavily on public key cryptography systems such as RSA, Elliptic Curve Cryptography (ECC), and Diffie-Hellman (DH)…Apr 21Apr 21
Handling Java Memory Consistency with happens-before relationshipIf you are developing multi-threaded applications in Java, you need to have an understanding of how the shared variables are handled…Dec 31, 2018A response icon2Dec 31, 2018A response icon2
Java Lambda ExpressionsLambda expressions are known to be the biggest feature introduced with Java 8. This was the Java’s first step to Functional Programming.Dec 29, 2018A response icon3Dec 29, 2018A response icon3
Garbage Collection: How it’s done?If you are familiar with the basics of the memory allocation in programming languages, you know that there are two parts in the memory…Dec 26, 2018A response icon4Dec 26, 2018A response icon4
SSL Handshake explainedIf you have ever browsed an HTTPS URL through a browser, you have experienced the SSL handshake. Even though might not notice it, the…Oct 10, 2018A response icon5Oct 10, 2018A response icon5
Using the Maven Assembly Plugin to build a ZIP distributionIf you have been creating Java programs you are surely familiar with Maven. Maven [1] is a project build and management tool that can be…Jun 30, 2018A response icon5Jun 30, 2018A response icon5
Session Management in Java using Servlet Filters and Cookies(If you are not familiar with Servlets and JSP, please refer my previous post on Sample Java Web Application using Servlets and JSP)Dec 17, 2017A response icon4Dec 17, 2017A response icon4
Java Servlet FiltersServlet Filters are used to intercept a request and conduct pre-processing or post-processing on that request. It is useful in implementing…Dec 17, 2017A response icon3Dec 17, 2017A response icon3
Implementing and Testing HTTP Public Key Pinning (HPKP)With HTTPS we use encryption to secure the communication with a server and a client. This encryption consists of two types known as…Sep 24, 2017A response icon1Sep 24, 2017A response icon1
How to store passwords securely with PBKDF2Passwords can be the most valuable data to an attacker because stolen passwords can provide attackers the ability to bypass most of the…Jul 3, 2017A response icon3Jul 3, 2017A response icon3