Recent Posts
Categories
- Design (2)
- Elasticsearch (3)
- Golang (5)
- hadoop (2)
- Java (12)
- Kubernetes (1)
- linux (1)
- Maven (1)
- Openshift (1)
- Performance (1)
- Scala (2)
- Security (3)
- Spark (2)
- Spring (3)
- Spring Batch (1)
- Spring Boot (2)
- sqoop (1)
- UI (1)
- unix (1)
- Vim (2)
Tags
annotation
apache hive 3
build
cdp
cloudera
commands
CORS
design
design pattern
DNS
elastic
elasticsearch
go
golang
hadoop
hdfs
hive
http
ip
java
jms
junit
maven
mq
mysql
nginx
oracle
proxy
proxy_pass
queue
rdbms
Repository
resolution
resolver
reverseproxy
scala
spark
spring
spring boot
springboot
sqoop
string
time zone
upstream
vim
Recent Posts
Categories
- Design (2)
- Elasticsearch (3)
- Golang (5)
- hadoop (2)
- Java (12)
- Kubernetes (1)
- linux (1)
- Maven (1)
- Openshift (1)
- Performance (1)
- Scala (2)
- Security (3)
- Spark (2)
- Spring (3)
- Spring Batch (1)
- Spring Boot (2)
- sqoop (1)
- UI (1)
- unix (1)
- Vim (2)
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
To find out more, including how to control cookies, see here: Cookie Policy
Tags
annotation
apache hive 3
build
cdp
cloudera
commands
CORS
design
design pattern
DNS
elastic
elasticsearch
go
golang
hadoop
hdfs
hive
http
ip
java
jms
junit
maven
mq
mysql
nginx
oracle
proxy
proxy_pass
queue
rdbms
Repository
resolution
resolver
reverseproxy
scala
spark
spring
spring boot
springboot
sqoop
string
time zone
upstream
vim
Find Us
Address
123 Main Street
New York, NY 10001
Hours
Monday–Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM
%d
Most common openssl commands
This post is a collection of most common and helpful openssl commands which we need to use to deal with tasks like generating keys, CSRs, certificates. # Verify or check content Verify. read more…
Share this:
Like this:
Continue Reading
How is data secure over https?
Everyone of us have heard that data transferred over HTTPS is secured. As a result we provide our highly confidential information like bank details, credit card details to a website which runs. read more…
Share this:
Like this:
Continue Reading
Secure way of doing OAuth for SPA & Native Apps
When clients like mobile, desktop, single page applications allows the user to sign-in using a third party application (google, facebook, twitter etc), one of the first choice is to use. read more…
Share this:
Like this:
Continue Reading