Tag archives for Security

Java – Crypto : The principles of Hardware Security Module HSM
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
Protected: Documentum : IRM :  Apply IRM security, job dm_DMClean
There is no excerpt because this is a protected post.
Java / Security : Cross Site Scripting (XSS) and SQL injection
Hi, A simple post concerning the Cross Site Scripting (XSS) and SQL injection which are types of security vulnerability used in Web applications. In SQL-Injection the vulnerability is exploited by injecting SQL Queries as user inputs. In XSS, Javascript code is injected (basically client side scripting) to the remote server (persistente or non-persistent). For more information, Wikipedia is a good source ...more»
Java/Spring3: Spring Security, authentication provider, override authentication token
Hi, I would write an article concerning the overridden of the token of Spring 3 Security. In this post, we will follow several points: creation of a simple Spring MVC Web application (controller, JSP pages,...), securization with Spring security via custom login form, override the authentication components (provider, token,...). Creation of Spring MVC Web application Create a simple Dynamic Web Module in Eclipse ...more»
Copyright ® 2012 Hüseyin Özveren. No reproduction, even partial, can be used from this site and all its contents including text, documents, images, etc.. without the express permission of the author.