Security
Recent Posts
Categories
- Design (2)
- Elasticsearch (3)
- Golang (5)
- hadoop (2)
- Java (11)
- Kubernetes (1)
- linux (1)
- Maven (1)
- Openshift (1)
- Performance (1)
- Scala (2)
- Security (3)
- Spark (2)
- Spring (2)
- Spring Batch (1)
- Spring Boot (1)
- sqoop (1)
- UI (1)
- unix (1)
- Vim (2)
Tags
annotation
apache hive 3
cdp
cloudera
commands
CORS
cronjob
design pattern
DNS
elastic
elasticsearch
go
golang
hadoop
hdfs
hive
http
ip
java
jms
junit
Kubernetes
mq
mysql
nginx
Openshift
oracle
proxy
proxy_pass
queue
rdbms
resolution
resolver
reverseproxy
scala
server
spark
spring
springboot
spring boot
sqoop
string
timezone
upstream
vim
Recent Posts
Categories
- Design (2)
- Elasticsearch (3)
- Golang (5)
- hadoop (2)
- Java (11)
- Kubernetes (1)
- linux (1)
- Maven (1)
- Openshift (1)
- Performance (1)
- Scala (2)
- Security (3)
- Spark (2)
- Spring (2)
- Spring Batch (1)
- Spring Boot (1)
- sqoop (1)
- UI (1)
- unix (1)
- Vim (2)
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
To find out more, including how to control cookies, see here: Cookie Policy
Tags
annotation
apache hive 3
cdp
cloudera
commands
CORS
cronjob
design pattern
DNS
elastic
elasticsearch
go
golang
hadoop
hdfs
hive
http
ip
java
jms
junit
Kubernetes
mq
mysql
nginx
Openshift
oracle
proxy
proxy_pass
queue
rdbms
resolution
resolver
reverseproxy
scala
server
spark
spring
springboot
spring boot
sqoop
string
timezone
upstream
vim
Find Us
Address
123 Main Street
New York, NY 10001
Hours
Monday–Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM
%d
Most common openssl commands
This post is a collection of most common and helpful openssl commands which we need to use to deal with tasks like generating keys, CSRs, certificates. # Verify or check content Verify. read more…
Share this:
Like this:
Continue Reading
How is data secure over https?
Everyone of us have heard that data transferred over HTTPS is secured. As a result we provide our highly confidential information like bank details, credit card details to a website which runs. read more…
Share this:
Like this:
Continue Reading
Secure way of doing OAuth for SPA & Native Apps
When clients like mobile, desktop, single page applications allows the user to sign-in using a third party application (google, facebook, twitter etc), one of the first choice is to use. read more…
Share this:
Like this:
Continue Reading