Tags » Authentication

Tutorial: Spring Boot Series, Part 2: Spring Security and Authentication

Part 2 of my Spring Boot series. Adding various security options to a Spring Boot application with REST API and AngularJS frontend. 3,072 more words

How To

Wearable banking? What, a magic ring?

When I read this article this morning, I had to laugh.  Because most millennials I know never wear a watch, and tell the time via their phones.  115 more words


change PasswordAuthentication no to yes

$ sudo vi /etc/ssh/sshd_config
PasswordAuthentication yes

restart ssh

$ sudo service restart ssh

if above line doesn’t work, try this…

181 more words

Hold for authentication on OSX with a network printer

Well this baffled be for a few minutes and I’m really just capturing this for my own knowledge later. If this happens to you it’s most likely your network password has changed or expired or something. 24 more words


LINE Screen Lock Authentication Bypass

By: Tabish Ali (connect.tabishali@gmail.com)

Welcome Readers !

Meticulous bug is in attendance at all LINE versions till now.  The vulnerability is basically a design flaw in LINE that shows Pop-up notifications prior to the Locking mechanism on the device. 138 more words

Penetration Testing

Gmail: "Warning! That email was not sent through an encrypted connection."

Google has announced plans to tell Gmail users which emails have been sent through an encrypted connection and which have not.

In a recent announcement, Google said that it would issue a warning to a user if they had received a message through a non-encrypted connection. 490 more words


Authentication Vs Authorization Vs Encryption


  • Authentication is used by a server when the server needs to know exactly who is accessing their information or site.
  • Authentication is used by a client when the client needs to know that the server is system it claims to be.
  • 798 more words