Advertisements
 
 Advertisements
musicappsios lifestyleappsios winapps appcolt

Security

Java authorization internals  Java authorization internals

 Java developers can use this tutorial who would like to know about the Java 2 platform and the JAAS authorization. In this tutorial, the author explains about the code centric authorization and user centric authorization. For code centric authorization, he considers Java2 and for user centric, he considers Java Authentication and authorization Service. The author tells the readers about the protection of domains, access policies, subject based access controls etc.,...

RSA Implementation for Java  RSA Implementation for Java

 RSA Implementation for Java is a simple online security program. Webmasters can use this script for generating both public and private key pair of specified length, and to encrypt and decrypt strings with those keys. This online java application is capable of implementing RSA encryptions in a single java class depending on the java.math.BigInteger class. Some of the important features of this software are custom padding functions, easy interface, simple configuration etc.,...
Tags: software, security, online, java, easy, encrypt, script, application, class, key, private, custom, simple, decrypt, onlinesecurity, configuration, for, features, public,

SSC - Somewhat Secure Communications  SSC - Somewhat Secure Communications

 SSC2 is a simple and efficient online java application that can be used to stretch the security features of various applications like network applications, communications, PC's etc., Using this online java application webmasters would be able to upgrade encryptions and transmissions of their files. Admin are provided with several security frameworks to make encryptions easy at the string level. This software can protect all your software projects from hackers by employing modulo randomization in complexing texts. Key features include platform independent and secured file encryptions....

What is IBM Tivoli Access Manager for Microsoft .NET?  What is IBM Tivoli Access Manager for Microsoft .NET?

 What is IBM Tivoli Access Manager for Microsoft .NET? is an online tutorial dealing with IBM's tivoli techniques. In this article the author has explained about the usage and functionalities of IBM tivoli access manager products for websites running on Microsoft .NET environment. You can learn how to intergrate and apply these products in arriving at an optimum security solutions for the huge enterprises. In this article the author has given a brief note on the functions of IBM's tivoli manager in providing securities for websites on .NET environments....

Secure communication between peers: SSL through JSSE  Secure communication between peers: SSL through JSSE

 A core requirement of any non-trivial P2P application is secure communication between peers. While the details of the security depend on how the application will be used and on what it will protect, it`s often possible to implement strong, general-purpose security using off-the-shelf technology such as SSL. This article demonstrates how to use SSL (via JSSE) in P2P security....
Tags:

Your guide to weblet security  Your guide to weblet security

 Weblets are Java programs that run in a browser, using DirectDOM to directly manipulate displayed documents. Like most Web-based programs, weblets pose a threat to system security if they`re mishandled. Fortunately, weblets come with built-in security in the form of the Java sandbox. This final installment of a three-part series on DirectDOM and weblet-based development shows you how to use the sandbox to your best advantage. With simple, working examples, this article demonstrates what a weblet can and can`t do by default, and also shows you how to get around the constraints of the sandbox when the situation calls for it....

A three-pronged solution for identifying users  A three-pronged solution for identifying users

 The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in combinations), and provides some examples of each....

Java 2 Platform and JAAS Authorization Architectures  Java 2 Platform and JAAS Authorization Architectures

 Follow along as Java architect Abhijit Belapurkar leads this detailed, behind-the-scenes introduction to two distinctly different (yet related) models of authorization: the code-centric model of the Java 2 platform security architecture and the user-centric model of the Java Authentication and Authorization Service....
Tags:

Secure a J2ME Environment with JCE  Secure a J2ME Environment with JCE

 Implementing a customized security library is expensive and unsuitable for medium and small applications. The Java Cryptography Extension, while the accepted standard for these apps, brings up a host of other problems. This article analyzes those problems and demonstrates how to solve them....

Comparing two JVM cacert files  Comparing two JVM cacert files

 This can come in very handy, if you need to compare 2 different projects or envs. For example Development server against prod, to ensure they both have same certs stored in cacerts (sampled by java among others). Code to generate list of certs, along with there alias, entry, owner and valid dates is supplied at the URL....

 

 

Pages :  1