dcsimg

Security

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications.   More>>

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications. [FAQ Previously managed by John Mitchell and Lennart Jorelid.]"   <<Less

SUBSCRIBE       NEW TOPIC
Results  1 to 10 of 1093  « Prev 1 2 3 4 5 6 7 8 9 10 ... 110 Next » 
 
.NET applications can trivially enumerate the Win32 certificate store and use them for SSL client au...
Tue 10/01/02
02:21:23AM
 
0
Tue 10/01/02
02:21:23AM
117
 
 
Anyone know of a good site on how to secure an application in oc4j using jazn.jar? Also, get the fo...
Tue 07/09/02
12:47:08PM
 
0
Tue 07/09/02
12:47:08PM
117
 
 
Hello, A byteArray were generated after calling MessageDigest.digest(), can I decode that byte...
Thu 03/28/02
01:33:56AM
 
0
Thu 03/28/02
01:33:56AM
117
 
 
Once you have new X509Certificate in your own TrustManager - how do you save it to a file, loada...
Thu 02/15/01
01:38:00AM
 
0
Thu 02/15/01
01:38:00AM
117
 
 
How to create a SSL socket connection to a password protected https site thru a proxy?
Sun 01/28/01
04:19:39AM
 
0
Sun 01/28/01
04:19:39AM
117
 
 
 
Hello All, Is there a good reference on web about how to implement Secure Socket Layer secuity f...
Mon 10/07/02
01:24:52PM
 
0
Mon 10/07/02
01:24:52PM
117
 
 
The test-application consists of two pages. An admin-page that allows an administrator to alter da...
Fri 04/26/02
12:42:21PM
 
1
Tue 04/23/02
02:20:56AM
118
 
 
i need a code that can encrypt and decrypt data of oracle using jce technology
Tue 03/16/04
07:33:12PM
 
1
Tue 03/09/04
08:13:27AM
118
 
 
I generated the key pairs using the following: keytool -genkey -keypass ######## -storepass #####...
Sun 01/04/04
06:11:14PM
 
1
Sun 01/04/04
05:08:49PM
118
 
 
can anyone please let me know how to implement klog authentication mechanism of kerberos using java...
Mon 03/03/03
11:09:15AM
 
1
Fri 02/28/03
11:22:35AM
118
 
 
 
Results  1 to 10 of 1093  « Prev 1 2 3 4 5 6 7 8 9 10 ... 110 Next » 
"Security" is moderated by Moderators:  SAdmin
About | Sitemap | Contact