Learn about setting up InfluxDB and the TICK stack and fetching new tweets from the Streaming API in order to monitor cryptocurrency with InfluxDB and Telegraf. Read all
A security expert discusses some best practices to keep in mind when designing and executing a security testing system, and how to secure your test systems. Read all
Using Lombok, Spring Boot, MongoDB, and Spring 5's Reactive capabilities, let's create a web app with basic authentication and routing abilities. Read all
A tutorial on how to create several different types of secure login pages and authentication pages using Java and Spring Boot/Spring Security technology. Read all
When it comes to Dependency Injection, the OSGi framework and its associated bundles can make service listening and registering a quick, clean, simple process. Read all
While cyberattackers operate within the realm of the developer, their goals are less intellectual and more worldly. Read on for info on the costs of a breach. Read all
Security is important. But too much security can lead a company to paranoia, or shoot you in the foot. In this article, we take on log injection as an example. Read all