Blog ►

List News Background articles Commentaries Development/Java IT Security Computer Guides & Tips

HissenIT Blog: Programming, Software Development, Java

You can follow this blog through this news feed or our social media channels.
Previous publications can be found in the publication archive.

Secure Programming of Web Applications: Authentification

Added on 12/28/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: Session-Hijacking

Added on 12/21/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: Clickjacking

Added on 12/15/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: Remote File Inclusion (RFI) and Local File Inclusion (LFI) resp. Directory/Path Traversal

Added on 12/08/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: Open Redirection

Added on 12/01/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: Cross-Site Scripting (XSS)

Added on 11/27/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: Cross-Site Request Forgery (CSRF)

Added on 11/20/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

Secure Programming of Web Applications: SQL Code Injection

Added on 11/14/2020 by Frank Hissen

We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access. ...

JavaFX WebView / WebKit error at JavaScript to Java communication (Java 8)

Added on 12/04/2017 by Frank Hissen

We are using Java for nearly two decades to build products. When an integrated WebKit was finally introduced to the Java platform - coming with JavaFX - development opportunities were boosted tremendously, because now you are able to integrate HTML5 web technologies into your desktop application easily. ...

Say no to plain passwords: Secure Password Hashing

Added on 11/02/2015 by Frank Hissen

Plaintext passwords should not be used anymore. You are probably using a web shop software framework that takes already care of this. Most application frameworks in the world do not use plain passwords anymore but password hashes instead. ...

Encryption background: What is key wrapping?

Added on 10/07/2015 by Frank Hissen

Key wrapping is a simple technique in cryptography that is used in almost all common encryption technologies. ...

Open-Source and Security: Why Open-Source is not insecure

Added on 10/06/2015 by Frank Hissen

Recently, I received the question if it would not be dangerous, when the source code for an encryption software is publicly available. An answer... ...

Password-based Encryption made easy

Added on 09/28/2015 by Frank Hissen

Here is a simple example for using strong password-based encryption for non-cryptographers with CrococryptLib. ...

Easy encryption for Android apps – CrococryptLib 1.4 released

Added on 09/25/2015 by Frank Hissen

CrococryptLib 1.4 for Android released: A library for mobile apps that allows the most easiest integration of password-based encryption, hashes and other cryptography operations. No in-depth cryptography knowledge is required to integrate encryption into Android apps. ...

The easiest way to integrate encryption into enterprise applications – HissenIT released CrococryptLib

Added on 08/24/2015 by Frank Hissen

HissenIT recently released CrococryptLib for Java: A library for Java back-end, desktop and mobile applications that allows the most easiest integration of encryption and other cryptography operations. No in-depth cryptography knowledge is required to integrate encryption into enterprise applications or software products. ...


About HissenIT's Blog & News

This blog is written by Frank Hissen (Computer Scientist). The majority of posts is about HissenIT, new software and other topics within the areas of software development and IT security.