Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms …etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …)
Here, a homemade “securized” solution (questionable ??!!!) allowing the generic calls to Spring bean on server side from the client side with Ajax requests on the format: In fact, this
A simple post concerning a very good class ListUtils in the library commons-collections-3.2.jar of Apache for the collection’s manipulation. The method lazyList returns a “lazy” list whose elements will be