Similar Articles |
|
JavaWorld April 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... |
JavaWorld February 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. |
JavaWorld March 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. |
JavaWorld January 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... |
JavaWorld November 2000 Geoff Friesen |
Applications, applets, and hybrids This article establishes our bearings and sets sail to the land of applications, applets, and hybrids (an unusual category of Java programs)... |
New Architect August 2002 Al Williams |
Unsafe At Any Speed? C#'s relaxed security model may not be the best fit for your business. |
JavaWorld December 2000 Raghavan N. Srinivas |
Java security evolution and concepts, Part 3: Applet security This article will take a look at the challenges of security for, and the deployment of, applets... |
JavaWorld October 2001 Tony Loton |
JavaMail quick start This article shows the first steps on the road to building Java-based email applications. If you fancy building your own email client to replace Microsoft Outlook, or a Web-based email system to rival Hotmail, this is the place to start... |
JavaWorld August 2001 Todd Sundsted |
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... |
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
JavaWorld September 26, 2003 Sam Mefford |
Overcome Java 1.3-1.4 incompatibilities API version incompatibilities that force you to maintain separate codebases for newer versions can exponentially increase your frustration level. This article demonstrates techniques for overcoming interface version incompatibilities, charting a course for a single codebase. |
JavaWorld June 2002 Michael Juntao Yuan & Ju Long |
Java readies itself for wireless Web services The future world of pervasive computing demands powerful and flexible development platforms. Is Java up to the task? Can Java provide end-to-end solutions for wireless Web services networks? The authors discuss the definition, importance, and architecture of wireless Web services. |
JavaWorld June 2000 Tim Fielden, InfoWorld Test Center |
Java 2 poised to take over the desktop Version 1.3 of the Java 2 Platform, Standard Edition has enhanced performance, beefed-up security, and Web deployment features that represent significant improvement over previous versions. Plus: The three flavors of Java. |
InternetNews June 28, 2004 Michael Singer |
J2SE 1.5: A Tiger By the Tail The Standard Edition is slated for a fall release via the Java Development Kit (JDK). J2SE 1.5 introduces several revisions to the core XML platform. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
JavaWorld February 2003 Laurence Vanhelsuwe |
Unwrap the package statement's potential The package statement is a very powerful Java language feature. Yet most Java programmers, even experienced ones, fail to correctly exploit this power. Intrigued? Read on and see how a simple language feature can have massive repercussions downstream. |
Fast Company Glenn Fleishman |
The Worst Thing About Lenovo's Adware Isn't The Adware Full understanding of what happened requires further explanation by Lenovo. But even the least alarming scenario is a great big deal. |
InternetNews July 30, 2009 |
Kaminsky Warns of SSL Vulnerabilities Security researcher Dan Kaminsky made waves last year with his dramatic DNS security flaw that could have undermined the security of the Internet. This year at Black Hat, he's back with another critical issue affecting the security certificates that secure Web sites. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
JavaWorld August 22, 2003 Michael Juntao Yuan |
"Java everywhere" is for world domination The author explains the "Java everywhere" vision and its relationship with traditional Java philosophies, and then discusses its impact on developers, especially today's enterprise developers. |
InternetNews December 16, 2005 Sean Michael Kerner |
Who is The SSL Certification Leader? GeoTrust said this week that it is growing faster than anyone else. And then VeriSign said it is the undisputed leader in the SSL certificate market. |
InternetNews December 31, 2003 Susan Kuchinskas |
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? |
InternetNews December 31, 2008 Richard Adhikari |
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. |
JavaWorld July 2000 Raghavan N. Srinivas |
Java security evolution and concepts, Part 2: Java security Since Java code can originate from anywhere in the network, code-centric security is very important for Java development. This article will examine the challenges associated with running Java code securely over the network. |
PC World March 22, 2001 Cameron Crouch |
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... |
InternetNews July 9, 2004 Sean Michael Kerner |
GeoTrust vs. VeriSign: An SSL Controversy Survey results ignite debate over who has the biggest chops in the SSL certificate arena. |