Security
-
Core Java
Using Cryptography in Java Applications
This post describes how to use the Java Cryptography Architecture (JCA) that allows you to use cryptographic services in your…
Read More » -
Enterprise Java
SQL Injection in Java Application
In this post we will discuss what is an SQL Injection attack. and how its may affect any web application its…
Read More » -
Enterprise Java
Database Encryption Using JPA Listeners
I recently had to add database encryption to a few fields and discovered a lot of bad advice out there.…
Read More » -
Core Java
Database and Webapp Security
Threat Model This is a discussions on database and webapp security loosely based on the quick reference page on my…
Read More » -
Enterprise Java
Permissions in OSGi
In a previous post, we looked at implementing a sandbox for Java applications in which we can securely run mobile…
Read More » -
Core Java
Sandboxing Java Code
In a previous post, we looked at securing mobile Java code. One of the options for doing so is to…
Read More » -
Core Java
Signing Java Code
In a previous post, we discussed how to secure mobile code. One of the measures mentioned was signing code. This…
Read More » -
Agile
Building Both Security and Quality In
One of the important things in a Security Development Lifecycle (SDL) is to feed back information about vulnerabilities to developers.…
Read More » -
Software Development
What is HMAC Authentication and why is it useful?
To start with a little background, then I will outline the options for authentication of HTTP based server APIs with…
Read More »