This is not Java but several newbie developers ask the same question, how to use GIT and how does GIT works so here it goes…
Have you ever work in SVN? Well forget everything you know and lets start over 🙂
What is a GIT repo?
In general there are two mirror repos. Your local repo and the remote repo. Yes TWO REPOS. Everyone in the team has an actual copy of the whole repo so even if your remote server dies you can set it up again and just push (spoiler) your repo to the repote server.
Continue reading “Git Essentials Crash Course”
To make a long story short, you should not use transactions within a parallel stream. This is because each thread in the parallel stream has its own name thus it does participate in the transaction.
The Streams API is designed to work correctly under certain guidelines. In practice, to benefit from parallelism, each operation is not allowed to change the state of shared objects (such operations are called side-effect-free). Provided you follow this guideline, the internal implementation of parallel streams cleverly splits the data, assigns different parts to independent threads, and merges the final result.
Continue reading “Can/Should I use parallel streams in a transaction context?”
The Apache NetBeans proudly announced the long expected release of Apache NetBeans 11.1 that has a plethora of exciting new features including Payara integration out of the box for the first time, with thanks to the Payara team!
Continue reading “Apache NetBeans 11.1 Just released!”
This article is originally posted by me in Java Code Geeks with title
The Transient Keyword in Java and Its Use
I recently came a cross in a study project of one of my friends that are studding the basics of programming in Java some forgotten sensitive information printed in text files and remembered the transient keyword in Java.
The transient keyword in Java plays an important role in terms of security and can be very useful in “accidents” like the one above as it will prevent the transmission of sensitive information like for example passwords to files, JSON messages etc that will require serialization.
To cut the long story short, if you define any variable as transient, it will not be serialized unless you define it as static or final.
Lets see some examples bellow. Continue reading “The Transient Keyword in Java and Its Use”
Malicious users are exploiting a vulnerability in Oracle WebLogic CVE-2019-2725 to install a ransomware called Sodinokibi.
Once executed, the Trojan creates the followoing file:
[PATH TO ENCRYPTED FILES]\[RANDOM EXTENSION]-HOW-TO-DECRYPT.txt and deletes Shadow Volume Copies and disables Windows startup repair.
Next, the Trojan encrypts files on the compromised server. The Trojan appends a random extension to encrypted files that is unique for each compromised computer and creates the a ransom note file in each folder containing encrypted files: [PATH TO ENCRYPTED FILES]\[RANDOM EXTENSION]-HOW-TO-DECRYPT.txt
The ransom note informs the user their files have been encrypted and provides instructions on how they may pay to have the files decrypted.
Unfortunately CVE-2019-2725 is very easy for attackers to exploit, as anyone with HTTP access to a WebLogic server could carry out an attack. Because of this, the bug has a CVSS v3.0 Base Score: 9.8 CRITICAL.
So how safe are you feeling when vising a Weblogic server app these days? :/
The Apache NetBeans proudly announced the release of Apache NetBeans (incubating) 10.0.
You can download it here: https://netbeans.apache.org/download/nb100/nb100.html
New features of the 10.0 Release:
Continue reading “Apache NetBeans (incubating) 10.0 Released”
We decided to switch the blogs main language to english. Why?
Because programmers MUST know English!
To be able to act in a community or group we must able to share our ideas. Whether we like it or now English is the glue that ties all people together, hence we decided to adopt it here.
So sorry guys but we need to change 🙂
Η ομάδα του Apache Tomcat έχει πρόσφατα επιδιορθώσει πολλές ευπάθειες ασφάλειας. Μια από αυτές θα μπορούσε να επιτρέψει σε έναν μη εξουσιοδοτημένο εισβολέα να εκτελέσει από απόσταση κακόβουλο κώδικα σε επηρεαζόμενους διακομιστές.
Continue reading “Apache Tomcat – Critical Remote Code Execution (RCE) vulnerability (CVE-2017-12617)”
Τι θα τυπώσει ο παρακάτω κώδικας?
-Δεν θα κάνει compile
Αιτιολογήστε το στα σχόλια
Continue reading “Java Quiz no2”