dcsimg

Security

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications.   More>>

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications. [FAQ Previously managed by John Mitchell and Lennart Jorelid.]"   <<Less

SUBSCRIBE       NEW TOPIC
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
 
Can we use encryption/decryption using form based authentication using Tomcat?
Tue 05/11/04
06:55:24AM
 
1
Wed 04/28/04
10:38:16PM
128
 
 
Iam searcing for 128 bit Encryption Code to encrypt/ decrypt Credit Card Information. RC2, RC4 suppo...
Thu 07/19/01
02:56:09PM
 
1
Wed 06/20/01
10:28:56AM
414
 
 
How to check whether the computer to which we are logged in is a primary domain controller or backup...
Wed 02/20/02
12:02:21AM
 
0
Wed 02/20/02
12:02:21AM
129
 
 
Hi, I want to access a servlet via HTTPS and post some data to it using a standalone client. h...
Mon 06/27/05
01:32:57PM
 
0
Mon 06/27/05
01:32:57PM
200
 
 
Hi, When a web-application uses "j_security_check" , where does it store the name of the origin...
Wed 02/23/05
02:48:04AM
 
0
Wed 02/23/05
02:48:04AM
127
 
 
 
I am running UBBThreads (www.infopop.com) in my web site. It is a web-based threading-like discussi...
Wed 03/06/02
05:13:40AM
 
0
Wed 03/06/02
05:13:40AM
167
 
 
How to prevent an user(legitimate user to the website, but he/she doesnot have access to some links...
Wed 12/24/08
03:59:06AM
 
0
Wed 12/24/08
03:59:06AM
432
 
 
We are in the process of implementing single sign on for a java based intranet application using (NT...
Mon 08/19/02
01:18:47AM
 
1
Mon 08/12/02
07:33:51AM
129
 
 
Hi! I am trying to implement the Login Module of JAAS with a datasource (Sql Server), but not gett...
Mon 07/12/04
08:25:00AM
 
0
Mon 07/12/04
08:25:00AM
148
 
 
How do I implement Kerberose to build a secure login module. How do I set up the Key Distribution ce...
Sun 08/08/04
10:18:04PM
 
0
Sun 08/08/04
10:18:04PM
144
 
 
 
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
"Security" is moderated by Moderators:  SAdmin
About | Sitemap | Contact