By
| Security Article Published 02-Aug-12
Grails Spring Security is a great plugin that allows you to set up authorization for your app with just a few lines in Grails configuration. Users can register to your website, click on a confirmation link received by e-mail and login with the username and password.
By Sean Michael Kerner
| Security Article Published 10-Oct-11
New release of Coverity 5.5 static analysis tool integrates FindBugs and Jenkins to expand continuous build and test workflow.
By Sean Michael Kerner
| Security Article Published 27-May-11
Application vulnerability testing toolkit finally stabilizes with new PHP static analysis tools.
By Sean Michael Kerner
| Security Article Published 02-Aug-10
New tools announced at Black Hat will enable Google and Bing search queries for security vulnerability detection.
By Jason Gilmore
| Security Article Published 12-Jul-10
Need a simple way to manage access to your Web content? The open source Apache Web server and MySQL database have everything you need.
By Sean Michael Kerner
| Security Article Published 03-Jun-10
Over 60 bugs were reported in PHP in May, should PHP users and developers be worried?
By Jason Gilmore
| Security Article Published 26-May-10
These 10 powerful security procedures will help protect your Linux, Apache, MySQL and PHP-driven website against common attacks.
By Sean Michael Kerner
| Security Article Published 22-Feb-10
Partnership between HP and code scanning vendor Fortify provides a view of application security from development code to runtime server.
By Thomas Valentine
| Security Article Published 16-Jan-09
See how you can tighten security gaps using JavaScript and practices such as the Same Origin Policy, Data Tainting, and Signed Scripts.
By David Thurmond
| Security Article Published 01-Dec-08
Learn how to check message integrity with message authentication and the Java Cryptography Extension.
By Gustavo Velez
| Security Article Published 21-Nov-08
The Records Center is an important MOSS (Microsoft Office SharePoint Server) component for companies that need to save critical or legally sensitive information. Discover how to create a Records Center then secure its contents with the MOSS Object Model and one of its default WebServices.
By David Thurmond
| Security Article Published 15-Oct-08
Learn about cryptography and how to encrypt and decrypt data with the Java Cryptography Extension.
By Scott Nelson
| Security Article Published 22-Sep-08
The WebLogic Portal provides a highly flexible and customizable security framework. Knowing your options will help you plan the security implementation that is usable, reliable and maintainable.
By Irina Medvinskaya
| Security Article Published 23-Jul-08
Discover the basic principles of Application Security and how it relates to various government and industry regulations and standards. Also, learn about internal and external Information Security threats and how to protect systems and applications better.
By Marcia Gulesian
| Security Article Published 05-May-08
You need both technical expertise and business savvy to create and maintain a successful streaming media site.
By Marcia Gulesian
| Security Article Published 18-Mar-08
People are building desktop applications for the web that are unlike any web-based application anyone has ever seen before. Adobe is leading this movement with a cross-operating system runtime that enables you to create rich applications that can run either online or offline, when appropriate or necessary.
By Jason Gilmore
| Security Article Published 26-Nov-07
Use Rails' Active Record validation callbacks to exercise greater control over user input.
By Vlad Kofman
| Security Article Published 15-Nov-07
Discover a unique approach to implementing anti-virus scanning in your Java applications.
By Rosemarie Graham
| Security Article Published 11-Oct-07
Do you use Java 2 Platform, Standard Edition? One of the 11 areas of vulnerabilities reported this month may effect you.
By Paul Kimmel
| Security Article Published 10-Oct-07
See how a setup project with a custom action lets the user define the connection string using the Data Links dialog and encrypt that connection string using RSA encryption.
By Rosemarie Graham
| Security Article Published 01-Oct-07
Help Developer.com choose the best of the best for the upcoming year.
By Jani Järvinen
| Security Article Published 26-Sep-07
Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.
By Matt Weisfeld
| Security Article Published 06-Sep-07
One of the advantages of using object-oriented languages is that much of the error/exception handling is built directly into the language itself. Thus, many of these issues can be handled during the design of the applicationand not when the application crashes in the hands of a user.
By Matt Weisfeld
| Security Article Published 06-Aug-07
When things go wrong in an application, what should the code do?
By Jani Järvinen
| Security Article Published 27-Jul-07
Learn how to use cryptography to improve the security of your applications. Discover the basic building blocks for encryption and hashing using C#.