Jasypt: Java simplified encryption - How to e...
Almost all modern web applications need, in one way or another, to encrypt their ... We could say that, from the moment that an application has users, and ...
http://www.jasypt.org/howtoencryptuserpasswords.html
popularity:
security
java
encryption
password
programming
howto
passwords
cryptography
development
tips
|
Java examples (example source code) Organized by topic
Provide collection Swing controls. [Commercial] ... Copyright 2009 - 12 Demo Source and Support. All rights reserved. All other trademarks are property of their ...
similarity:
popularity:
java
programming
examples
code
reference
tutorial
source
example
development
javascript
|
Convert Java to EXE - Why, When, When Not and How
Helps you choose the best tool for transforming your Java apps into native executables, and considers alternative ways to simplify Java application deployment.
similarity:
popularity:
java
exe
programming
deployment
tools
development
howto
article
windows
tutorial
|
Overview (Java 2 Platform SE 5.0)
This document is the API specification for the Java 2 Platform Standard Edition ... Provides the classes necessary to create an applet and the classes an ...
similarity:
popularity:
java
api
programming
reference
javadoc
documentation
development
j2se
docs
software
|
truelicense: The TrueLicense Library Collection Homepage
No information avaiable
similarity:
popularity:
java
licensing
license
security
library
opensource
tool
development
programming
software
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
ONJava.com: The Independent Source for Enterprise Java -- java development, open and emerging enterp
O'Reilly Network's ONJava site offers comprehensive and enterprise Java, JSP, ... We've expanded our Java news coverage and improved our search! ...
similarity:
popularity:
java
programming
development
news
j2ee
oreilly
articles
blog
reference
tutorial
|
Javalobby - Sun Java, JSP and J2EE technology programming forums, software downloads, jobs and tutorials
Represents the needs and concerns of the Java developer and user community to companies and organizations who influence the evolution of Java.
similarity:
popularity:
java
programming
development
news
community
j2ee
daily
forum
blog
articles
|
Default Password List
User can access/change operational setting but not security settings. 3COM ... This will recover a lost password and reset the switch config to Factory Default ...
similarity:
popularity:
password
security
router
reference
default
hacking
list
hardware
passwords
hack
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Linux: How to Encrypt and decrypt files with a password
It is an encryption and signing tool for Linux/UNIX like operating system such ... GnuPG stands for GNU Privacy Guard and is GNU's tool for secure communication ...
similarity:
popularity:
linux
encryption
gpg
security
howto
encrypt
password
cryptography
files
decrypt
|