Security companies and IT people constantly tells us that we should use complex and difficult... more »
A little under 18 months since work started on Tomcat 7 I am delighted to be able to say that... more »
In this first post of a four part Spring Security Java Configuration blog series, I discuss... more »
Naming your child... Injection style! :D
An in depth article of how digg wouldn't respond to my bug reports, how I exploited a... more »
SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres... more »
Life's certainties include death and taxes but also the advancement of the GNU/Linux... more »
One of the most significant changes U.S. Copyright Law relating to software was handed down... more »
A routine security update for a Microsoft Windows component installed on tens of millions of... more »
There has been three instances that I know of where a significant number of hacked account... more »
In this post, I will discuss how to configure method based security using Spring Security... more »
In this post, we will start off by walking through a very simple web security configuration.... more »
This full-screen takeover applet was clearly not what Sun had in mind when they thought up... more »
To learn more about Spring Security 3.2, I'd like to encourage you to view the new Spring... more »
A couple of weeks ago, a Google employee found a bug in Windows. Last week, he released it to... more »
Security in web development. Review of possible hack attacks methods. Explanation of possible protection.
Open standards always cause security problems and Google's OpenSocial API introduced last... more »
I don't usually do news and current events here, but I'm making an exception for the CWE/SANS... more »
Security is relative. Will these steps make your server “secure”? It will be more secure than... more »
Dilbert meets the security consultant...
About 10 years ago a friend of mine showed me an exploit. It was written in C and it tried to... more »
Google has announced its new project Google Chrome Native Client. This is a mega news. It is... more »
While chatting with Simon Phipps, I read through the Java security exploit that got so much... more »
Microsoft has a 22-page document which outlines how they store all your private data in their... more »
Show more links
Discover best practices and the most useful tools for building the ideal integration architecture.
Advertising - Terms of Service - Privacy - © 1997-2014, DZone, Inc.