Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- CONTENT SECURITY POLICY



  Different types of keystore in Java -- Windows-MY

Windows-MY is a type of keystore on Windows which is managed by the Windows operating system. It stores the user keys and certificates which can be used to perform cryptographic operations such as signature verification, data encryption etc. Since it's a kind of native keystore, Java doesn't have a general API to access it. To help Java applications access the keys and certificates stored in Windows-MY keystore, Java provides a separate API -- SunMSCAPI. The SunMSCAPI provider is ...

   JAVA,KEYSTORE,WINDOWS-MY,SUNMSCAPI     2016-01-09 05:45:59

  HTML Site vs. WordPress Theme: Which one is better?

Are you looking for a perfect platform to set up your website? Then, there might be a close competition between the simple HTML and the WordPress platform. In this blog post, we will try to explore some points that will help you in making the right decision. Let us overview at some advantages grasped by HTML and WordPress. 1. Security of a website It has been discovered that the website running on WordPress is more vulnerable to security threats and hackers. As we know, WordPress is open source...

   WORDPRESS,WORDPRESS BENEFITS,HTML TO WP CONVERSION,HTML TO WORDPRESS,HTML WEBSITE     2015-10-24 07:36:54

  Open source code libraries suffer from vulnerabilities

A study of how 31 popular open source code libraries were downloaded over the past 12 months found that more than a third of the 1,261 versions of these libraries had a known vulnerability and about a quarter of the downloads were tainted. The study was undertaken by Aspect Security, which evaluates software for vulnerabilities, with Sonatype, a firm that provides a central repository housing more than 300,000 libraries for downloading open source components and gets 4 billion requests pe...

   Open source,Security,Vulnerability     2012-03-28 06:10:19

  Signature sign/verification demo in Java

Digital signature is commonly used in areas where data authentication and integrity are required. It is extremely important to have signature while transferring sensitive data from one peer to other peers through network since there might be malicious applications or man-in-the-middle attacks which may alter the data along the way. Java provides some APIs to generate and verify digital signature. One important class is Signature.  When generating the signature, a private key needs to be pa...

   SECURITY,JAVA,SIGNATURE     2015-11-21 09:48:12

  TL;DR: Beyond Mobile

In his Beyond Mobile presentation at TL;DR Conference in San Francisco CA, Scott Jenson made the case for moving beyond mobile applications and illustrated what a future without apps could be. Here’s my notes from his talk: The history of mobile phones has been copying the desktop and then realizing it just doesn’t work right.Apps are a holdover from the desktop.There are a number of trends that highlight how we can move beyond apps on mobile.App Glut: are we going to have an a...

   Mobile,Beyond mobile     2012-04-01 04:20:30

  How Technology Can Prevent Casino Cheating

Cheating has been around as long as gambling itself, which is surely since the dawn on of time. Cheating in casinos, both land based and online, can prove a huge problem, not only for those playing against the cheater, but for the individual casino operators, as well as the industry in its entirety. Preventing cheating makes casino play fairer for all involved, both operators and their clients.Fortunately, in today's day and age, we have excellent, highly developed technology that can assist cas...

   Technology,Casino     2015-07-13 02:52:44

  Generate certificate in Java -- Self signed certificate

This is the first post in this series which I will show you how to generate SSL certificate in Java programmatically. Certificates are frequently used in SSL communication which requires the authentication of server to client. This is to make the client to trust that the server is actually the one it claims. Certificates are really important on the Internet. All HTTPS communications on the Internet need the server side to present their certificates signed by trusted CAs. The basic flow of a requ...

   Java,Certificate,X509     2014-07-30 07:42:18

  Why Memorizing is Ineffective

The information-age has burst into life, creating a wake of social change. Young people are growing up faster and more sophisticated, as raw information, tailored-entertainment, and branded-marketing are streamed into their rooms. But this technological exposure has not necessarily made them savvier or more capable of handling tomorrow’s challenges.The debates in public education over “school-choice” and standardized testing have missed the far more important issue. The real c...

   Memory,Memorization,Ineffective,Career     2011-11-19 02:13:41

  Alibaba subreddit has been banned from Reddit

The subreddit of Alibaba, the biggest e-commerce giant in China, has been banned from Reddit.The reason given is that this community has violated the Reddit rules. But no details about what rules are violated given by Reddit. If we now try to access https://www.reddit.com/r/alibaba, we will see below page. From the page, it says this subrredit has been banned 6 months ago. It's unknown whether this subreddit was created by Alibaba Group or by some other people. And it's unclear w...

   CHINA,ALIBABA,REDDIT     2015-09-28 03:20:12

  Should All Web Traffic Be Encrypted?

The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure. In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an accou...

   Web traffic,Security,HTTPS.Encryption,Wifi     2012-02-24 05:02:58