Secured Socket Layer (SSL) Configuration for Tomcat
Secured Socket Layer (SSL) Configuration for Tomcat Content1 Introduction2 Creating SSL Certificate3 Tomcat HTTPS Configuration4 Tomcat Redirect HTTP to HTTPS Introduction Secured Socket Layer (SSL) is the cryptography protocol to…
Technical Recommendations and Best Practices for Centron’s Tutorials
Technical Recommendations and Best Practices for Centron’s Tutorials Content1 Introduction2 Software Sources and Installation3 Software and System Maintenance4 Service Management5 Bootstrapping systems6 Logging and Troubleshooting7 User and Group Management8 Preferred…
Why String is immutable in Java
Why String is Immutable in Java? Why String is immutable in Java is one of the popular interview questions. The string is one of the most used classes in any…
MongoDB Encryption Guide: Secure Your Data
MongoDB Encryption Guide: Secure Your Data Protect your MongoDB data by encrypting it. We show you how to do this with examples. Content1 Securing Data in Transit2 Encryption at Rest and In…
MongoDB Security Best Practices for Network Access Control
MongoDB Security Best Practices for Network Access Control To ensure the security of data stored in MongoDB, it’s important to restrict network access to the server running the database. This post is intended…
Distinction between Free Software and Open Source Software
Distinction between Free Software and Open Source Software The terms “Free Software” and “Open Source Software” both refer to software with few restrictions on its use and distribution. However, there…