Quantcast
Channel: Developer Feed - Security
Browsing latest articles
Browse All 10 View Live

How is public-key cryptography used in SSL?

AnswerSSL uses public-key cryptography to authenticate the participants in an SSL connection and to ensure a private negotiation of parameters used to encrypt data sent over the SSL connection....

View Article



What are the elements of chiper suite?

AnswerA cipher suite is made up of three algorithms -- one each for key exchange-- bulk encryption-- message digest. For example, the cipher suite RSA_WITH_RC4_128_MD5 uses: read more

View Article

What are US Crytographic Regulations used in Weblogic Server?

The United States regulates the export of cryptographic software to other nations. "Strong" encryption can only be exported from the United States to qualifying customers. Because of these...

View Article

Why does OAuth include both an access token and an access token secret?

QuestionWhy does OAuth include both an access token and an access token secret?Answerread more

View Article

How to find footprint of a Certificate?

A certificate's fingerprint is not part of the certificate, but it can be computed from it. Browsers tend to display it as if it were part of the certificate. A fingerprint is the MD5 digest of the...

View Article


javax.net.ssl.SSLHandshakeException: Remote host closed connection during...

SolutionThis is a very common issue where the request is sent to non ssl port instead of ssl port. Example lets say Weblogic server is running on 7501 as the regular port and 7502 is the ssl port and...

View Article

How to clean file name for security reasons in PHP?

/**         * Clean the file name for security         *         * @access      public         * @param       string         * @return      string         */                    function...

View Article

Image may be NSFW.
Clik here to view.

What is a Phishing Email?

IssueAt times we get an error warning by our email client e.g. GMail in this case for an email that was recieved.This message may not be sent by....phishing scam?read more

View Article


What is CPNI?

What is CPNI?CPNI stands for Customer Proprietary Network Information. CPNI is confidential information about a customer's purchase and use of telecommunications services, such as:•         Where,...

View Article


Cannot make phone call from Android.

Issue03-23 23:18:41.381: E/DesiZindagi(767): AudioPlayerScreen$2:104-Failed to invoke call03-23 23:18:41.381: E/DesiZindagi(767): java.lang.SecurityException: Permission Denial: starting Intent {...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images