Mar Java Mit Java Blog

How does SSL handshake work

How a Website Owner Generates and Uses SSL/TLS Certificates 1. Generating the Certificate 2. Storing the Certificate and Private Key 3. Configuring the Web Server 4. Browser Verification of the Certificate 5. Encrypting and Decrypting Data Summary This process...

Certificate pinning for secure connection

In certificate pinning, the client maintains a list of valid certificate fingerprints (or hashes) that are compared against the server’s certificate during the TLS handshake to ensure its authenticity. Below is a simple example...

Guide: Secure Key Management and Digital Signature Validation

Introduction In modern secure systems, digital signatures are critical for ensuring data authenticity and integrity. This guide will walk you through the steps to: 1. Generating the Private and Public Keys To begin, you...

How to Detect EKS, GKE, and AKS in Your Application

In modern cloud-native application development, it’s essential to understand the environment where your application is running, especially when working with container orchestration platforms like Kubernetes. Platforms such as EKS (Amazon Elastic Kubernetes Service), GKE...

Detecting AWS Fargate in Java

Amazon Web Services (AWS) Fargate is a serverless compute engine that allows developers to run containers without managing the underlying infrastructure. This makes it a popular choice for deploying containerized applications. However, there are...