|
You are here |
y4y.space | ||
| | | | |
foxglovesecurity.com
|
|
| | | | | By @breenmachine What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I'm about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. In fact, even though proof of concept code was released... | |
| | | | |
www.stackchief.com
|
|
| | | | | Java serialization in depth including what is serialization, why we need serialization in Java, how it works, the serializable interface, problems with serialization and examples. | |
| | | | |
inside.java
|
|
| | | | | While the concept of serialization is quite simple, it often gets complicated very quickly given the various customizations that can be applied. For records we wanted to keep things as simple and straightforward as possible... | |
| | | | |
www.ayoy.se
|
|
| | | In almost all projects where we develop software for our customers we use some kind of open source components. It's therefore extemely importent to check the licenses of those components. | ||