Security

Scala-IOT: Getting started with RaspberryPi without Monitor or Screen.

Reading Time: 7 minutes Hey folks, We are back again ! ( Did you miss me? ) A big Moriarty Fan ! ­čÖé So where we left was, now we have a basic understanding of IOT i.e. Internet of things and we know which protocol it uses i.e. MQTT and why it uses it ? If you didn’t follow us till here you can check out our previous blogs Continue Reading

Vulnerability scanning with metasploit

Reading Time: 3 minutes Hola!! As you all aware of that┬ávulnerabilities can cost you much more and as a developer you don’t need your website to have┬ávulnerabilities (at least I am ­čśŤ ). And for testing for loopholes in your application can be painful, So here I am to show you a quick demo on how to test your web application for these┬ávulnerabilities. So we will use a known Continue Reading

Play framework security with Silhouette

Reading Time: 6 minutes Silhouette is a security library for Play framework. Its basically a core only fork of Secure Social, which is another security library for play framework. Secure Social is a great framework for lots of user but my experience with secure social is not that good, nor with some of my friends and colleagues who use Play framework in their application. It’s been thrown out from Continue Reading

Configure SSL on jetty server to run it with https

Reading Time: 2 minutes We can run our application with http as well as with https. We use https for secure communication over the computer network. Technically, https is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. In this blog, Continue Reading