Cipher Downgrade: How a Tomcat Update Could Weaken Your TLS Configuration
Table of Contents What's the risk?Who is AffectedThe FixHow to VerifyRecommendation A recent update to Apache Tomcat introduced a subtle but significant change to how TLS cipher suites are configured. If your Spring Boot application explicitly configures TLS ciphers, particularly ...
-
From Spring Boot To Jakarta EE 11: How Payara Starter Eases The Transition
Table of Contents Starting with Jakarta EE Doesn’t Have to be Slow Meet Payara Starter: The Equivalent to Spring Initializr for Jakarta EEPayara Starter vs. Spring Initializr: Same Comfort, Different StackPayara Starter and Spring Initializr Side by SideStep-by-Step: Starting a Jakarta …
-
Micrometer & Prometheus in Spring Boot: Kafka Burger Orders🍔📨
Learn Micrometer and Prometheus in Spring Boot by building a Kafka Burger Orders app that emits metrics. Step-by-step guide with code and takeaways.
-
Robust AI Applications with LangChain4j Guardrails and Spring Boot
Table of Contents Understanding LangChain4j GuardrailsSetting Up a Spring Boot Project with LangChain4jImplementing Input GuardrailsContent Safety Input GuardrailSmart Context-Aware GuardrailIntelligent Input SanitizerImplementing Output GuardrailsProfessional Tone Output GuardrailHallucination Detection GuardrailTesting Your GuardrailsCreating AI Services with GuardrailsRest endpointDemoConclusion As AI applications become …
-
🚀 Document Your Spring Boot APIs with Redocusaurus in Minutes 🦕
Document Your Spring Boot APIs with Redocusaurus in Minutes
-
Spring Boot + Kafka Streams: Event Routing & Testing
Learn how to do Kafka Stream with Spring Boot! 🍃 With a city tour visits system…
-
Semantic Search with Spring Boot & Redis
Table of Contents Redis as a Vector DatabaseRedis OM SpringDatasetBuilding the Application0. GitHub Repository1. Add the required dependencies2. Define the Movie entity3. Repository Interface4. Search Service5. Movie Service for Data Loading5. Search Controller6. Application Bootstrap7. Sample RequestsWrapping upMore AI ResourcesStay …
-
Improving Maven’s dependency:analyze… or not
Table of Contents The mvn dependency:analyze commandSpring Boot startersBringing the maven-dependency-analyzer into the modern ageConclusion Recently, my good friend Richard Fichtner advised using the mvn dependency:analyze command to get rid of declared but unused dependencies: There is another use case …
-
Pull request testing on Kubernetes: testing locally and on GitHub workflows
Table of Contents Unit testing vs. integration testingTestcontainersUse-case: application with database”Unit” testing”Integration” testingThe GitHub workflowAlternative “Unit testing” on GitHubConclusion Imagine an organization with the following practices: Commits code on GitHub Runs its CI/CD pipelines with GitHub Actions Runs its production …
-
The Proper Way to Define Configuration Properties in Spring
Upgrading from Spring Boot 2 to 3 forced me to define my configuration properties in a better way.
-
Prevent LDAP injection in Java with SpringBoot
In this article, we dive into the basics of LDAP (Lightweight Directory Access Protocol)—a powerful protocol used to manage directory information like user authentication, authorization, and centralized account management in IT systems. 🌐👨💻
We also explore LDAP Injection, a common security vulnerability 🛡️ where attackers manipulate LDAP queries to:
⚠️ Bypass authentication
⚠️ Access unauthorized data
⚠️ Modify directory entriesLearn how these attacks work, the risks they pose, and, most importantly, how to protect your systems with secure coding practices like input sanitization and parameterized queries. ✅💻
Whether you’re an IT professional, developer, or just curious about cybersecurity, this article is your crash course on LDAP and LDAP Injection! 🚀✨