Regular Expressions are a key element in programming. There are times that you can save a lot of time with a simple Regex. As a lot of my teachers said while I was studying, it is an important thing that you should be familiar with. Regular Expressions are designed to help you define a pattern to search for in a String. You can use it to check whether a parameter is valid or to find a specific pattern of text in a large file. In Java, you’ll be using java.util.regex package to implement Regex logics to your project.Read More »Regular Expressions In Java
Search Results for: java
I am sure If you’re interested enough to read this blog, you are familiar with the zero-day exploit discovered recently in the log4j library which allows remote code execution. I believe we can agree that it is the most dangerous type of vulnerability. In this post, we’ll examine which applications are vulnerable, how this exploit works (with a demo application), and what actions you can take to protect yourself.Read More »Understanding Log4Shell -A Log4J Zero-Day Exploit
Sorting data efficiently has always been a challenging task in computer science but there is also another challenge you will encounter after you tackle the sorting. Keeping your data sorted while updating it.
Imagine having a CONTENT table that stores thousands of contents and you allow content management users to manipulate the order of the contents. For example, a cms user might move content from the 5002nd row to the 13th row. To provide this feature, there are a couple of options you can choose from.Read More »Lexorank — Managing Sorted Tables With Ease
Circuit Breakers are one of the best tools in our toolbox to use while creating a backend structure with dependent modules. In this post, I will try to set up a basic Hystrix Circuit Breaker example and demonstrate some different configurations.
For demonstrating this concept I’ve created two Spring Boot applications called producer and consumer. The producer returns an integer counter and increases the value after each request but when the counter is between 5 and 20 it will wait for 5000 ms before returning the counter.Read More »Basic Hystrix Circuit Breaker Implementation
While Whatsappocalypse continues to grow at a rapid pace I’ve decided to take it to the next level and help you pay attention to a different aspect of mobile privacy. Many apps we’re using are collecting information about our devices and what’s in them. This might sound less creepy than WhatsApp spying on your chat but I can assure you it is not in the slightest way less important. I am talking about location, installed applications, device name, device model, etc. It might not feel very important but how would you feel if someone grabs your phone and views a list of installed applications, photos, downloaded files, and whatnot. But there is an option like Run Android Apps In Sandbox!Read More »Run Android Apps In Sandbox For Privacy [With Island]