Hello, After my post about the Fake SMTP Server/SMTP4DEV, today, I would present a solution for the sending of email in your java applications. So, we will consider sending emails
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms …etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …)
Hi, A simple post concerning the Cross Site Scripting (XSS) and SQL injection which are types of security vulnerability used in Web applications. In SQL-Injection the vulnerability is exploited by