This article represents top 4 security vulnerabilities related coding practice to avoid while you are programming withJava language. Recently, I came across few Java projects where these instances were found. Please feel free to comment/suggest if I…
This article represents top 5 coding practices related with Java exception handling that you may want to watch out for or better say, avoid, while doing coding for exception handling. Recently, I have been involved with code review of multiple Java p…
A NullPointerException in Java application is best way to solve it and that is also key to write robust programs which can work smoothly. As it said “prevention is better than cure”, same is true with nasty NullPointerException. Thankfully by applyin…
1)内存空间安全.2)参量级别数据安全:3)通信级别数据安全:4)数据访问控制:5)通信对象身份确认. https://developer.apple.com/library/content/documentation/Security/Conceptual/SecureCodingGuide/Articles/TypesSecVuln.html#//apple_ref/doc/uid/TP40002529-SW2 Most software security vulnerabilities f…
JDK Tools and Utilities Basic Tools These tools are the foundation of the JDK. They are the tools you use to create and build applications. Tool Name Brief Description appletviewer Run and debug applets without a web browser. extcheck Utility to dete…
删除package-lock.json并同步到git 定义的依赖项./package-lock.json具有已知的安全漏洞 找到一个叫做.gitignore,把package-lock.json贴在这个文件里 [外链图片转存失败(img-V8oNIMvg-1563449856873)(https://upload-images.jianshu.io/upload_images/11158618-bbf13db2abeca79b.png?imageMogr2/auto-orient/strip|i…
How Will Java Technology Change My Life? We can't promise you fame, fortune, or even a job if you learn the Java programming language. Still, it is likely to make your programs better and requires less effort than other languages. We believe that Jav…
BlackArch-Tools 简介 安装在ArchLinux之上添加存储库从blackarch存储库安装工具替代安装方法BlackArch Linux Complete Tools List 简介 BlackArch Linux是针对渗透测试人员和安全研究人员的基于Arch Linux的渗透测试分发版.BlackArch Linux预装有上千种专用工具以用于渗透测试和计算机取证分析.BlackArch Linux与现有的Arch安装兼容.您可以单独或成组安装工具.https://blackar…
Handling memory leaks in Java programs Find out when memory leaks are a concern and how to prevent them   Published on February 01, 2001 How memory leaks manifest themselves in Java programs Most programmers know that one of the beauties of using a p…
https://en.wikipedia.org/wiki/Memory_leak In computer science, a memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations[1] in such a way that memory which is no longer needed is not released.…