dcsimg

Security

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications.   More>>

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications. [FAQ Previously managed by John Mitchell and Lennart Jorelid.]"   <<Less

SUBSCRIBE       NEW TOPIC
Results  21 to 30 of 1093  « Prev 1 2 3 4 5 6 7 8 9 10 ... 110 Next » 
 
How can we open HTTP Connection from swing application
Wed 03/19/03
10:58:57PM
 
1
Fri 03/14/03
02:30:12AM
117
 
 
I use Orion J2EE server(but the qn could be answered generically) If I use the principals.xml for st...
Wed 07/16/03
11:41:34AM
 
0
Wed 07/16/03
11:41:34AM
117
 
 
Hi everyone, I have little problem on establishing a connection between my standalone application (...
Thu 03/14/02
02:14:46AM
 
1
Thu 03/14/02
12:12:30AM
117
 
 
The test-application consists of two pages. An admin-page that allows an administrator to alter da...
Fri 04/26/02
12:42:21PM
 
1
Tue 04/23/02
02:20:56AM
118
 
 
How to track of a source file's development and to prevent it from being altered by more than one p...
Wed 01/30/02
02:29:49AM
 
1
Tue 01/29/02
08:18:26PM
118
 
 
 
How do I create a login page using Tomcat 3.2.3 which will read a table of users and authenticate th...
Tue 10/09/01
01:14:37PM
 
1
Tue 10/09/01
12:29:44PM
118
 
 
i need a code that can encrypt and decrypt data of oracle using jce technology
Tue 03/16/04
07:33:12PM
 
1
Tue 03/09/04
08:13:27AM
118
 
 
I generated the key pairs using the following: keytool -genkey -keypass ######## -storepass #####...
Sun 01/04/04
06:11:14PM
 
1
Sun 01/04/04
05:08:49PM
118
 
 
I want to create a logging system that handles the user logging, Database logging, application serve...
Thu 09/20/01
03:05:39AM
 
1
Thu 09/20/01
01:44:32AM
118
 
 
can anyone please let me know how to implement klog authentication mechanism of kerberos using java...
Mon 03/03/03
11:09:15AM
 
1
Fri 02/28/03
11:22:35AM
118
 
 
 
Results  21 to 30 of 1093  « Prev 1 2 3 4 5 6 7 8 9 10 ... 110 Next » 
"Security" is moderated by Moderators:  SAdmin
About | Sitemap | Contact