Author: marjavamitjava

Certificate pinning for secure connection

In certificate pinning, the client maintains a list of valid certificate fingerprints (or hashes) that are compared against the server’s certificate during the TLS handshake to ensure its authenticity. Below is a simple example...

Guide: Secure Key Management and Digital Signature Validation

Introduction In modern secure systems, digital signatures are critical for ensuring data authenticity and integrity. This guide will walk you through the steps to: 1. Generating the Private and Public Keys To begin, you...

How to Detect EKS, GKE, and AKS in Your Application

In modern cloud-native application development, it’s essential to understand the environment where your application is running, especially when working with container orchestration platforms like Kubernetes. Platforms such as EKS (Amazon Elastic Kubernetes Service), GKE...

Detecting AWS Fargate in Java

Amazon Web Services (AWS) Fargate is a serverless compute engine that allows developers to run containers without managing the underlying infrastructure. This makes it a popular choice for deploying containerized applications. However, there are...