MNMilan Nikicinsecuritydepth.hashnode.devAuthentication Vulnerabilities in Java: Session Management & Advanced Security (Part 3) In Part 1, we discussed the requirements of passwords according to NIST recommendations, various methods of rate limiting using sliding window and exponential backoff, and ways to avoid enumeration of2d ago·22 min read
TTuanhdotnetintuanhnet.hashnode.devHow to Add Custom Properties to a Spring Boot App During Initialization (Without Losing Your Mind)Source: How to Add Custom Properties to a Spring Boot App During Initialization (Without Losing Your Mind) 1. Why “during initialization” is the only time custom properties actually feel magical Most Spring Boot configuration stories start the...3d ago·10 min read
TTuanhdotnetintuanhnet.hashnode.devHow Do You Implement Multi-Factor Authentication (MFA) in Spring Security Without Getting Stuck in Redirect Loops, Broken Sessions, and “Invalid Code” NightmaresSource: How Do You Implement Multi-Factor Authentication (MFA) in Spring Security Without Getting Stuck in Redirect Loops, Broken Sessions, and “Invalid Code” Nightmares 1. The quiet truth about MFA bugs in Spring Security Most MFA “implementa...4d ago·13 min read
MNMilan Nikicinsecuritydepth.hashnode.devAuthentication Vulnerabilities in Java: Credential Transmission & Password Reset (Part 2)In Part 1, we have already discussed the password policies based on the guidelines provided by the NIST, rate limiting for preventing brute-force attacks, and preventing username enumeration through cMar 3·19 min read
TSThomas Schillingintschuehly.deSvelte 5 Islands in Spring Boot with Kotlin: The Preact AlternativeSvelte 5 Islands in Spring Boot with Kotlin: The Preact Alternative In my previous post I showed how to use Preact Islands to handle the 5% of interactions where Alpine.js falls apart. Preact works grFeb 25·16 min read
MNMilan Nikicinsecuritydepth.hashnode.devAuthentication Vulnerabilities in Java: Password Security & Rate Limiting (Part 1)Authentication is the most critical security boundary within a web application. A user claims to be Alice: the application has to validate that claim before granting access. Despite the long history oFeb 23·17 min read
TSThomas Schillingintschuehly.dePreact Islands in Spring Boot with htmx: When Alpine.js Isn't Enough AnymoreI build my webserver-rendered web applications with Spring Boot, Thymeleaf, and HTMX. I sprinkle some Alpine.js on top for dropdowns and toggles. And for 95% of interactions, this stack is perfect. But then you hit that one feature – a kanban board w...Feb 18·16 min read
DRDMV Real Estate Photographyindmvrpmedia.hashnode.dev3D Tours & Drone Media in Silver Spring, MDThe Power of Immersive Property Experiences In today’s fast-moving real estate market, buyers expect more than static images. They want to explore homes digitally before scheduling in-person visits. This is where 3D Virtual Tours Services in Silver S...Feb 16·6 min read
NWNeha Waddiinspringboot-learning.hashnode.dev#6 Ways to Create a Spring Boot Applicationwe can create a Spring Boot app in 3 main ways: Spring Initializr (Web Client) Official website:👉 https://start.spring.io You choose: Project: Maven / Gradle Language: Java Spring Boot version Group Artifact Dependencies (Web, JPA, etc.) ...Feb 12·2 min read
MNMilan Nikicinsecuritydepth.hashnode.devSQL Injection in Java: Defense Strategies and Detection (Part 2)Welcome to Part 2 of this SQL injection in Java blog series. In Part 1, we introduced SQL injection and learned about secure coding best practices for SQL injections in JDBC, JPA/Hibernate, and Spring Data JPA. The second part will discuss the securi...Feb 10·16 min read