Category Archives: Security

Security, Cryptography

Security checklist notes

The security checklist makes it possible for developers to learn and practice properly. Type Descriptions IDS Unrestricted File Upload like Exitf, shell script attack. References:– Owasp Unrestricted_File_Upload– 5 ways to File upload vulnerability Exploitation– Protect FileUpload Against Malicious File– Input Validation and Data Sanitization (IDS) HTTP Headers – Content-Security-Policy– X-Frame-Options– X-XSS-Protection– X-Content-Type-Options– Referrer-Policy– Feature-Policy e.g For… Read More »

Install JCE Unlimited Strength Jurisdiction Policy Files

1. Problem. In order to secure sensitive data such as card number, user account, email, etc..that meet PCI standard, people usually employe Advanced Encryption Standard – Symmetric Encryption Algorithms (Stalling, Cryptography and Network Security) to make the data safely. AES was designed to be efficient in both hardware and software and supports a block length… Read More »

Asymmetric encryption by Java Cryptography

1. Overview In cryptography, there are two general categories of key based algorithms: Symmetric encryption algorithms: Symmetric algorithms use the same key for encryption and decryption such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) Asymmetric (or public key) encryption algorithms: Asymmetric algorithms use two separate keys for these two operations.… Read More »