Pages classified as Website Security

Install Tomcat on AWS Ubuntu and IDE

Install Tomcat on | Ubuntu | Windows | Amazon EC2 | Docker | Intellij | Jenkins To install Tomcat 7, Tomcat 8 and Tomcat 9 is a habitual task because Tomcat is synonymous with Java web application development. You install Apache Tomcat on a local Windows or Linux (Ubuntu) Server on the Amazon AWS cloud EC2 machines within Docker and

Read more

AWS EC2 | Open Route to Install Middleware Services Behind Apache

This page describes the procedure for opening and locking ports during a middleware services installation. Middleware Service Installation When installing middleware services behind the Apache Web Server on Amazon Web Services (EC2) you sometimes need to allow traffic to flow temporarily on one of the unsecure ports. The way described does not pose a security threat primarily because you are

Read more

How to Setup Archiva Behind Apache

For those who need an industry grade Archiva installation and http://localhost:8181/ is not good enough. Apache Archiva Behind Mummy Apache We want to install Apache Archiva so that an Apache Web Server acts to proxy the requests received from the internet. We benefit from a cleaner URL and HTTPS (SSL) becomes an option when hiding behind Apache’s huge skirts. https://www.build-business-websites.co.uk/artifacts/

Read more

How to Install WordPress Multi-Site Plugins

To deploy a plugin into a WordPress Multisite installation is not intuitive. 1. Where is the Add New Plugin Button? There is no Add New plugin button when you go to the “Plugins” menu option of any WordPress site in your multi-site setup. To find the Add New button navigate to the My Sites link on the top left hover

Read more

Don’t Install WordPress Plugins Until You Read This

WordPress Plugin Hell High cloud costs from resource usage, damaged reputation, blacklisted, data loss, days spent firefighting, and months of good SEO practices gone down the drain – thanks to reputation sapping backlinks you never even knew you had. From bitter experience website developers keep WordPress plugins at arms length. WordPress plugins are a bit like fire, useful at times,

Read more

Route Jenkins SSL Traffic Via an Apache Proxy Server

How to Route Jenkins HTTP Requests Through Apache Mapping SSL traffic destined for Jenkins via an Apache proxy server is a continuation of Routing Jenkins HTTP Requests Through Apache. Jenkins 2 Admin Password Requires SSL If your Jenkins server is out in the big wide internet, it needs protection. Jenkins 2 brings administrator passwords – if you use plain HTTP

Read more

Subversion Repository Security | 4 Security Configurations | Choose One

Subversion Repository Security Configuration We've outlined 4 security configurations to help you secure your Subversion repository (or other similar middleware services). a Maximum Security Configuration a Good Security Configuration an Open Source Security Configuration a Weak (But Simple) Security Configuration Maximum Security Configuration For maximum read/write security to a repository in a cloud you should access it by setting up

Read more

How to Encrypt and Decrypt Files using JAVA and AES (Advanced Encryption Standard)

Encrypt and Decrypt Files using JAVA The JAVA Cryptographic Extensions provides the core support necessary to encrypt and decrypt files. The Advanced Encryption Standard is the API that ensures business strength encryption. The encryption described here uses a 128 Bit key. For commercial purposes this is “good enough”. Download PDF File with Details of Encryption and Decryption using JAVA

Read more
1 2 3