Sign in

Originally published at https://www.handracs.info.

Photo by toine G on Unsplash

In this post, we are going to run through a step by step approach to creating a containerised native Spring Boot application. It is assumed that you already have basic familiarity with Spring Boot. We are going to use Gradle as the build system and Kotlin…


Originally published at https://www.handracs.info.

Photo by James Harrison on Unsplash

Integrate OWASP Dependency Check with Maven

In this post, we are going to look at how to integrate OWASP dependency check with Maven. I will not go deep into what Maven is, assuming that all readers have some sort of familiarity with Maven.

Background

Anyone who works with Java, especially those who are…


Photo by Gary Chan on Unsplash

Originally published at https://www.handracs.info.

In this post, we are going to learn on how to check certificate revocation status by using Certificate Revocation List (CRL). CRL though is not the only way for us to check for certificate revocation status. There is another protocol called Online Certificate Status Protocol (OCSP)…


Photo by Luke Chesser on Unsplash

Originally published at https://www.handracs.info.

In this post, we are going to learn how can we monitor an application developed using the SpringBoot framework using Prometheus and Grafana. We will deploy all the components using docker for simplicity. We will start the blog with a simple, non-exhaustive, introduction to the components…


Photo by Kelvin Ang on Unsplash

In this post, we are going to run through the process of creating gRPC client/server that is secured using mutual TLS authentication (mTLS). We will start with a little bit of introduction on mTLS and gRPC, that is just enough for the sake of understanding this post. …


Photo by Clément H on Unsplash

Originally published at https://www.handracs.info.

In this post, we are going to do a comparison between Hotspot and OpenJ9. For those of you who are already familiar with Java, you must already be familiar with the term Hotspot as well. Hotspot is the Java Virtual Machine (JVM) implementation developed by Oracle…


Photo by Kelly Sikkema on Unsplash

In this post, we are going to run through the steps necessary to extract a PKCS#12 digital certificate to TWO (2) separate files. At the end, we will have a pem file that contains the public certificate and a key file that contains the private key of the certificate.

Before…


Photo by Rahul Chakraborty on Unsplash

Sometimes, there can be a need to pull the latest images of all the docker images that we have in our installation. Unfortunately, docker does not provide a simple command for us to be able to update all the pulled docker images.

Luckily, with the power of bash, we will…


Photo by vipul uthaiah on Unsplash

A new vulnerability discovered by Promon named StrandHogg has been actively attacking Android devices. The bad thing is, it has capability to attack both rooted and un-rooted devices.

This vulnerability is so dangerous that even knowledgeable users can be tricked to submit their credentials, which will then be stolen and…


Photo by Andrew Ridley on Unsplash

String tokenisation or sometimes called string splitting is one of the most common string operations to be performed when we are doing programming. Take a CSV (Comma Separated Value) for example, which practically separates content based on the use of comma (,) character as separator.

Java makes it very easy…

Handra

I am a software engineer focusing on Java programming language and Public Key Infrastructure (PKI). Loves Linux and open-source technology.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store