I always forget the quantity prefixes above “tera”. Even more interestingly, one rarely thinks about the numbers’ names. For example,[…]
Read moreAuthor: Robert Broeckelmann
JVM process Virtual Memory Usage (Resident Set Size) On A Linux 2.6.25 Kernel
Introduction This article expands on the previous Virtual Memory post by exploring Resident Set Size growth while running a Java[…]
Read moreGoogle Browser Security Handbook
Google has released a Browser Security Handbook online. It can be found here. thinkmiddleware.com usually focuses on server-side topics, but[…]
Read moreVirtual Memory — Linux
Introduction It has been a couple of weeks since the last article was published. Recently, I had to dig into[…]
Read moreDumping the contents of a JAAS Subject
In the last article, JAAS was introduced. An authenticated calling-entity (perhaps a user), has a JAAS Subject. This JAAS Subject[…]
Read moreJAAS Authentication — An Introduction
Introduction This article introduces JAAS authentication via a relatively simple example. The example presented here is based upon the Sun[…]
Read moreAn Openldap Directory Server
Introduction The recent JNDI article and an upcoming JAAS article require an LDAP server. This tutorial will walk through the[…]
Read moreJNDI — Java Naming & Directory Interface
Introduction While researching an upcoming JAAS article, the decision was made to use JNDI to interact with the Openldap server[…]
Read moreAnt — Build Control
Introduction I’ve mentioned that for larger projects/examples on thinkmiddleware.com, Ant would be used. The Java Security Manager article was the[…]
Read moreThe Java Security Manager
Introduction In the last post, the Java Standard Edition and Java Enterprise Edition security features were introduced. This is the[…]
Read more