Security

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications.   More>>

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications. [FAQ Previously managed by John Mitchell and Lennart Jorelid.]"   <<Less

SUBSCRIBE       NEW TOPIC
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
 
Can we use encryption/decryption using form based authentication using Tomcat?
Tue 05/11/04
06:55:24AM
 
1
Wed 04/28/04
10:38:16PM
105
 
 
Iam searcing for 128 bit Encryption Code to encrypt/ decrypt Credit Card Information. RC2, RC4 suppo...
Thu 07/19/01
02:56:09PM
 
1
Wed 06/20/01
10:28:56AM
339
 
 
How to check whether the computer to which we are logged in is a primary domain controller or backup...
Wed 02/20/02
12:02:21AM
 
0
Wed 02/20/02
12:02:21AM
106
 
 
Hi, I want to access a servlet via HTTPS and post some data to it using a standalone client. h...
Mon 06/27/05
01:32:57PM
 
0
Mon 06/27/05
01:32:57PM
162
 
 
Hi, When a web-application uses "j_security_check" , where does it store the name of the origin...
Wed 02/23/05
02:48:04AM
 
0
Wed 02/23/05
02:48:04AM
104
 
 
 
I am running UBBThreads (www.infopop.com) in my web site. It is a web-based threading-like discussi...
Wed 03/06/02
05:13:40AM
 
0
Wed 03/06/02
05:13:40AM
137
 
 
How to prevent an user(legitimate user to the website, but he/she doesnot have access to some links...
Wed 12/24/08
03:59:06AM
 
0
Wed 12/24/08
03:59:06AM
352
 
 
We are in the process of implementing single sign on for a java based intranet application using (NT...
Mon 08/19/02
01:18:47AM
 
1
Mon 08/12/02
07:33:51AM
109
 
 
Hi! I am trying to implement the Login Module of JAAS with a datasource (Sql Server), but not gett...
Mon 07/12/04
08:25:00AM
 
0
Mon 07/12/04
08:25:00AM
124
 
 
How do I implement Kerberose to build a secure login module. How do I set up the Key Distribution ce...
Sun 08/08/04
10:18:04PM
 
0
Sun 08/08/04
10:18:04PM
114
 
 
 
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
"Security" is moderated by Moderators:  SAdmin
About | Sitemap | Contact