
Tag archives for Security
Hello,
Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc:
PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …)
The principles of SSL
The principles of Signature and Certificate
The principles of Hardware Security Module HSM
Encoding with base64, base64url, rfc-4648
Encryption with Blowfish (Anonymization)
Encryption with AES/CBC, AES/EBC (Encryption of files)
Encryption with PBEWithMD5AndDES (Encryption of files)
Encryption ...more»
Hi,
I would like to expose you a simple example of interaction with the IRM server in order to encrypt and apply the IRM security on CONTENT files of a document. The IRM configuration is out of scope of this article.
IRM
Briefly, EMC Documentum Information Rights Management (IRM): Unauthorized access prevention to secured content, enabling organizations to maintain control of information ...more»
Hi,
A simple post concerning the Cross Site Scripting (XSS) and SQL injection which are types of security vulnerability used in Web applications. In SQL-Injection the vulnerability is exploited by injecting SQL Queries as user inputs. In XSS, Javascript code is injected (basically client side scripting) to the remote server (persistente or non-persistent). For more information, Wikipedia is a good source ...more»
Hi,
I would write an article concerning the overridden of the token of Spring 3 Security. In this post, we will follow several points: creation of a simple Spring MVC Web application (controller, JSP pages,...), securization with Spring security via custom login form, override the authentication components (provider, token,...).
Creation of Spring MVC Web application
Create a simple Dynamic Web Module in Eclipse ...more»
