Saturday, January 19, 2019

REST (Representational State Transfer) : Key Concepts and Best Practices

12:14 AM

In this post I will explain key concepts and best Practices about REST, Representational State Transfer, abbreviated as REST, is not a technology, a library, nor an architecture, but a model to be used for designing distributed software architectures based on network communication.

Wednesday, December 26, 2018

Java Security cacerts file and Some Useful Keytool Commands

12:00 AM

In this post I will explain about Java cacerts keystore file, cacerts is where Java stores public certificates of root CAs. Java uses cacerts to authenticate the servers. Keystore is where Java stores the private keys of the clients so that it can share it to the server when the server requests client authentication.

Sunday, December 16, 2018

Java Properties : How to Read/Write properties file in Java?

11:06 PM
A .properties file is a simple collection of key-value pairs that can be parsed by the java.util.Properties class. Properties files are widely used for many purposes in all kinds of Java/j2ee applications, often to store configuration or localization data. And all over the project scripts can then use those properties easily.

Tuesday, December 11, 2018

Struts2 : Handling double submission /CSRF attack using token interceptor

3:03 PM
Recently I was working on J2EE Application Security related job tasks to address security vulnerabilities. so we given solutions and worked to address top 10 Web Application Vulnerabilities in J2EE. In this post explains you how to prevent multiple/duplicate form submissions and a Cross Site Request Forgery (CSRF) attack in a Struts2 web application by including a random token with each form submission request.

Tuesday, December 4, 2018

How To Enable/ Disable USB Ports On Windows PC?

12:50 PM

There are multiple ways to protect your data on Windows  computers. One of them is to disable or enable USB ports on your computer. If you are wondering how to block USB drives to control which devices are connected to your PC, then you have come to the right place.
In order to protect copying data to connected USB drives by unauthorized login from your/shared PC we can use various blocking methods.