SSL issues are common while working on enterprise applications, but their debugging is not easy. Mostly due to not having enough information in logs. For example, you will get an exception like this for various reasons – I/O error: java.security.NoSuchAlgorithmException: Error constructing implementation. An exception stack trace may look like this: com.howtodoinjava.aav.exception.SystemException: I/O error: java.lang.RuntimeException: […]
To disable or bypass SSL Certificate checking is never a recommended solution for SSL issues, but at test environment – sometimes you may need this.
Java support many secure encryption algorithms but some of them are weak to be used in security-intensive applications. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure; messages encrypted using DES have been decrypted by brute force within a single day by machines such as the Electronic Frontier Foundation’s (EFF) Deep […]
Knowledge of securing RESTful Web Services is as much important as to write them. Mostly RESTful APIs are HTTP protocol based, you any user having internet connection can connect to it, and so hackers as well. It’s very important to write secure APIs to protect the business. But before starting to secure RESTful APIs, let’s […]
In this tutorial, we will learn to set environment variables e.g. JAVA_HOME when you don’t have admin access to your development machine. This is very common scenario in companies with high security requirements like banks ( like mine :-) ). Open “User Accounts” Option You can locate this option by searching ‘accounts‘ or ‘user accounts‘ […]
A password hash is an encrypted sequence of characters obtained after applying certain algorithms and manipulations on user provided password, which are generally very weak and easy to guess. There are many such hashing algorithms in java also, which can prove really effective for password security. In this post, I will discuss some of them. […]