Skip to content
mySoftKey
  • Home
  • java
    • jee
    • Webservices
    • design pattern
    • servlet
    • jsp
  • NOSQL
    • mongodb
    • cassandra
    • elastic
    • OrientDB
    • redis
    • spark
  • Spring
  • Hibernate
  • Misc
    • data structure algorithm
    • architecture
    • linux
    • Data Storage
    • data analytics
    • Security
    • digital payment
    • SQL
    • poetry
  • Tutorials
    • MongoDB Videos
  • Contact Us
    • about-us
    • Privacy Policy

SSL protocol overview

Ranjeet Jha / Security / 1 Comment

What is SSL protocol? Overview of SSL protocol. SSL: Secure Socket Layer is a handshake protocol that allows servers and clients to exchange different parameters in encrypted ways over a transport network.

SSL protocol overview Read More »

FTP upload of file using java

Ranjeet Jha / java / Leave a Comment

How to upload file into FTP server by FTP upload using Java. you will get java code for FTP connection and FTP upload in java.

FTP upload of file using java Read More »

Web Security Threats Challenges and Solutions

Ranjeet Jha / Security / 4 Comments

Learn web security threats challenges and solutions. Security attack possibilities, position of SSL in transport layers etc.

Web Security Threats Challenges and Solutions Read More »

Data Mining – Questions Answers

Ranjeet Jha / data analytics / 1 Comment

Data mining Questions and answers. Data mining FAQ. Data mining is a process of extracting knowledge from large amounts of data.

Data Mining – Questions Answers Read More »

Pages: 1 2

Spring RESTful Web Services – Brief Summary

Shubham Gupta / Spring / Leave a Comment

Spring RESTful Web Services – Brief Summary Read More »

Security of Digital Payments

Noopur Arora / Misc / 1 Comment

Security of Digital payments is essential and it can be achieved by using PCI-DSS certification. Security in online transactions is very critical for digital security.

Security of Digital Payments Read More »

How to Disable Weak Cipher

Shakti Yadav / Security / 6 Comments

How to Disable Weak Cipher as per time and business demand so taht a hacker not able to decrypt easyli.

How to Disable Weak Cipher Read More »

Euclidean algorithm to find gcd

Ranjeet Jha / data structure algorithm / 3 Comments

The euclidean algorithm is used to find GCD of numbers, which is being used in mathematics extensively but how can we find gcd in a programming language? we will learn in this article

Euclidean algorithm to find gcd Read More »

digital payment

Noopur Arora / Misc / 5 Comments

digital payment Read More »

How to generate signed hash for a file in window or linux env.

Shakti Yadav / linux / 3 Comments

How to generate signed hash for a file in a Windows or Linux environment learn step by step in this article.

How to generate signed hash for a file in window or linux env. Read More »

← Previous 1 … 3 4 5 … 28 Next →