Entering its third decade, the popular Java programming language sails in a sea of question marks. With the OpenJDK vs Oracle JDK controversy roiling, developers now wonder where to place their bets. To navigate this challenge, it is instructive to learn how Java’s past may shape its future. Java: Sun Micro Brews a Software Success…
Continue ReadingIs Docker Secure?
Docker is a well-known open source container platform used for development and production worldwide. Approximately 13 million developers download 13 billion container images each month. This technology allows developers to write fully executable software packaged with everything needed to run it, from the code to system tools, runtime libraries, and settings. That means that from…
Continue ReadingBest Eclipse Plugins To Add to Your Toolkit
Developers tend to favor the integrated development environment that works best for them. That means finding the right tools to perform necessary functions that work seamlessly with their particular environment. There are numerous available plugins for those who prefer the Eclipse IDE, inspiring many lists of the best Eclipse plugins. Because narrowing them down can…
Continue ReadingDocker Security Best Practices?
Using containers and open-source applications, web developers can churn out programs faster than ever and bring large-scale projects into rough operation in a fraction of the time. Unfortunately, the use of OSS also brings more security issues into the mix. Development now requires Docker security best practices to build more secure containers and ensure safe…
Continue ReadingDocker Security Scanning Guide
Docker is changing the way developers are creating applications and continues to grow in popularity, as evidenced by its over 10 million users and over 242 billion pulled images. However, while the platform and its ingenious containerization methods dramatically accelerate application development, programmers are realizing a growing need for further security maintenance and increased demand…
Continue ReadingChange to an Older Version of Node?
The Node.js runtime environment extended the user-friendly JavaScript language from browser-based client tasks to server-side missions. Still gaining momentum after more than a decade, Node.js continues to introduce new technologies with successive versions. This pace poses a test for coders. Sooner or later, a developer will confront the change Node version challenge. In today’s web…
Continue ReadingWhat are the Best Node.js Classes for Mastering Node.js?
There is no programming language that is used more throughout the world than Javascript. The Node.js framework took JavaScript from client-side scripting to allowing developers to script dynamic web pages on the server-side. Node.js is rated the most popular JavaScript framework for developers. It allows the use of just one programming language, a boon to…
Continue ReadingUnderstanding the Latest Node.js Versions
As with all new Node.js versions, the April 2021 release of Version 16 brought a host of changes to the server-side runtime environment. Node v16 added a new integrated package manager, several developer wish-list features, and support for a new generation of microprocessors. With Node v17’s release in October 2021, Node v16 moves to Long-Term…
Continue ReadingHow To Use OWASP Top 10 To Secure Your Organization?
Over two decades, the Open Web Application Security Project’s top-10 list has become an essential report card for software security professionals. OWASP compiles its list of authentication vulnerabilities and other issues using Common Weakness Enumeration reports from a worldwide community of developers. Beginning with its 2017 effort, the group augmented the CWE reports with a…
Continue Readinglog4j Vulnerability / log4Shell – Sends Tech World Scrambling
The log4J zero day vulnerability being referred to as “Log4Shell” (CVE-2021-44228) was firsts discovered on December 9th, 2021, and is getting a lot of well-deserved attention because of its wide-reach and high severity. This log4J vulnerability allows for unauthenticated remote code execution and can be weaponized to allow the complete takeover of a vulnerable system….
Continue Reading