Maurice de Chateau: 'External' Quartz on JBoss 5.1
http://mauricedechateau.blogspot.com/2011/07/external-quartz-on-jboss-51.html How to include external quartz library into JBOSS 5.1
http://mauricedechateau.blogspot.com/2011/07/external-quartz-on-jboss-51.html How to include external quartz library into JBOSS 5.1
http://mauricedechateau.blogspot.com/2011/07/external-quartz-on-jboss-51.html How to include external quartz library into JBOSS 5.1
http://rmurphey.com/blog/2012/04/12/a-baseline-for-front-end-developers/ What it takes to be a good front-end web developer today, in 2012
http://rmurphey.com/blog/2012/04/12/a-baseline-for-front-end-developers/ What it takes to be a good front-end web developer today, in 2012
http://rmurphey.com/blog/2012/04/12/a-baseline-for-front-end-developers/ What it takes to be a good front-end web developer today, in 2012
http://pastebin.com/gAs4EkyG Example of perl exploit script that runs on a compromised web server and provides remote shell, http proxy and DDoS agent. Works on *nix and windows
http://pastebin.com/gAs4EkyG Example of perl exploit script that runs on a compromised web server and provides remote shell, http proxy and DDoS agent. Works on *nix and windows
http://mindprod.com/jgloss/cipher.html Here’s how to encrypt and decrypt a message using CipherOutputStream/ CipherInputStream The methods used are all part of Sun’s JCE. Sun’s JCE documenation is all but useless. You pretty well have to Google the web to find sample code to use these methods for particular algorithms and block modes. Pay attention to string encoding/decoding and padding issues.
http://mindprod.com/jgloss/cipher.html Here’s how to encrypt and decrypt a message using CipherOutputStream/ CipherInputStream The methods used are all part of Sun’s JCE. Sun’s JCE documenation is all but useless. You pretty well have to Google the web to find sample code to use these methods for particular algorithms and block modes. Pay attention to string encoding/decoding and padding issues.
http://www.xaprb.com/blog/2011/01/29/how-innodb-performs-a-checkpoint/