This article was originally published in the April 2014 issue of NFJS the Magazine. This article begins an introductory series on the Go programming language. Go is a language optimized for large-scale software engineering and is rapidly becoming the language of choice for building cloud services. It does this in a very interesting way, optimizing for simplicity rather than complexity and taking a “less is exponentially more” approach. This series will focus on learning Go from the perspective of Java developers. We’ll begin with design ideas informed by Go’s primary method of abstraction: interfaces.
Laravel packages help you become more productive by spending less time writing boilerplate code and giving you more time writing specific code for your application. We’ve taken a look into 10 extremely popular Laravel packages.
Security is not an afterthought. It has to be an integral part of any development project. The same applies to APIs as well. API security has evolved significantly in the past five years. The growth of standards to date has been exponential. OAuth is the most widely adopted standard, and is possibly now the de-facto standard for API security. To learn more, read the Build an API Security Ecosystem white paper.
You will do a much better job if you start thinking about security from the beginning, when you are working out requirements and user stories. Always think about what data needs to be protected, and about which key business features could be abused by bad guys.
Spring Security offers an authentication replacement feature, often referred to as Run-As, that can replace the current user's authentication (and thus permissions) during a single secured object invocation. Using this feature makes sense when a backend system invoked during request processing requires different privileges than the current application.
If you're working with Active Record and PostgreSQL, you may want to be aware of a pair of SQL injection vulnerabilities publicized by Rafael Mendonça França. According to his mailing list email, the vulnerabilities affect PostgreSQL versions above 2.0, and rely on unconventional data types found in Postgres.
Welcome to codefeeds.com
Stay current by checking the top programming feeds in one convenient location.