MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
JavaWorld
April 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... mark for My Articles similar articles
JavaWorld
February 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. mark for My Articles similar articles
JavaWorld
March 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. mark for My Articles similar articles
JavaWorld
January 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... mark for My Articles similar articles
JavaWorld
November 2000
Geoff Friesen
Applications, applets, and hybrids This article establishes our bearings and sets sail to the land of applications, applets, and hybrids (an unusual category of Java programs)... mark for My Articles similar articles
New Architect
August 2002
Al Williams
Unsafe At Any Speed? C#'s relaxed security model may not be the best fit for your business. mark for My Articles similar articles
JavaWorld
December 2000
Raghavan N. Srinivas
Java security evolution and concepts, Part 3: Applet security This article will take a look at the challenges of security for, and the deployment of, applets... mark for My Articles similar articles
JavaWorld
October 2001
Tony Loton
JavaMail quick start This article shows the first steps on the road to building Java-based email applications. If you fancy building your own email client to replace Microsoft Outlook, or a Web-based email system to rival Hotmail, this is the place to start... mark for My Articles similar articles
JavaWorld
August 2001
Todd Sundsted
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
JavaWorld
September 26, 2003
Sam Mefford
Overcome Java 1.3-1.4 incompatibilities API version incompatibilities that force you to maintain separate codebases for newer versions can exponentially increase your frustration level. This article demonstrates techniques for overcoming interface version incompatibilities, charting a course for a single codebase. mark for My Articles similar articles
JavaWorld
June 2002
Michael Juntao Yuan & Ju Long
Java readies itself for wireless Web services The future world of pervasive computing demands powerful and flexible development platforms. Is Java up to the task? Can Java provide end-to-end solutions for wireless Web services networks? The authors discuss the definition, importance, and architecture of wireless Web services. mark for My Articles similar articles
JavaWorld
June 2000
Tim Fielden, InfoWorld Test Center
Java 2 poised to take over the desktop Version 1.3 of the Java 2 Platform, Standard Edition has enhanced performance, beefed-up security, and Web deployment features that represent significant improvement over previous versions. Plus: The three flavors of Java. mark for My Articles similar articles
InternetNews
June 28, 2004
Michael Singer
J2SE 1.5: A Tiger By the Tail The Standard Edition is slated for a fall release via the Java Development Kit (JDK). J2SE 1.5 introduces several revisions to the core XML platform. mark for My Articles similar articles
RootPrompt.org
May 7, 2001
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... mark for My Articles similar articles
JavaWorld
February 2003
Laurence Vanhelsuwe
Unwrap the package statement's potential The package statement is a very powerful Java language feature. Yet most Java programmers, even experienced ones, fail to correctly exploit this power. Intrigued? Read on and see how a simple language feature can have massive repercussions downstream. mark for My Articles similar articles
Fast Company
Glenn Fleishman
The Worst Thing About Lenovo's Adware Isn't The Adware Full understanding of what happened requires further explanation by Lenovo. But even the least alarming scenario is a great big deal. mark for My Articles similar articles
InternetNews
July 30, 2009
Kaminsky Warns of SSL Vulnerabilities Security researcher Dan Kaminsky made waves last year with his dramatic DNS security flaw that could have undermined the security of the Internet. This year at Black Hat, he's back with another critical issue affecting the security certificates that secure Web sites. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
JavaWorld
August 22, 2003
Michael Juntao Yuan
"Java everywhere" is for world domination The author explains the "Java everywhere" vision and its relationship with traditional Java philosophies, and then discusses its impact on developers, especially today's enterprise developers. mark for My Articles similar articles
InternetNews
December 16, 2005
Sean Michael Kerner
Who is The SSL Certification Leader? GeoTrust said this week that it is growing faster than anyone else. And then VeriSign said it is the undisputed leader in the SSL certificate market. mark for My Articles similar articles
InternetNews
December 31, 2003
Susan Kuchinskas
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? mark for My Articles similar articles
InternetNews
December 31, 2008
Richard Adhikari
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. mark for My Articles similar articles
JavaWorld
July 2000
Raghavan N. Srinivas
Java security evolution and concepts, Part 2: Java security Since Java code can originate from anywhere in the network, code-centric security is very important for Java development. This article will examine the challenges associated with running Java code securely over the network. mark for My Articles similar articles
PC World
March 22, 2001
Cameron Crouch
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... mark for My Articles similar articles
InternetNews
July 9, 2004
Sean Michael Kerner
GeoTrust vs. VeriSign: An SSL Controversy Survey results ignite debate over who has the biggest chops in the SSL certificate arena. mark for My Articles similar articles