top-image

Tag archives for File

Java : Avoid Unauthorized File Downloading, Use of Token, Download File Servlet
Hello, I would like to expose a home-made solution in order to avoid the unauthorized file downloading via the generation and use of unique token (PART I). The second part (PART II) contains an example of download file servlet allowing several methods of writing file's content to client.   PART I Here, a singleton named AntiDownloadSingleton used on server side to: generate an ...more»
Java – Crypto : Example, Use of SecretKey, PrivateKey, PublicKey, CSV file (CryptoTools, GenericObfuscationFile)
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
Java – Crypto : Encryption with PBEWithMD5AndDES (Encryption of files)
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
Java – Crypto : Encryption with AES/CBC, AES/EBC (Encryption of files)
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
bottom-img
Copyright ® 2012 Huseyin Ozveren. No reproduction, even partial, can be used from this site and all its contents including text, documents, images, etc.. without the express permission of the author.