Combining symmetric and assymetric encryption for transmitting data
First of all we will define what is symmetric and what asymmetric encryption. Symmetric Encryption is when a single key…
First of all we will define what is symmetric and what asymmetric encryption. Symmetric Encryption is when a single key…
Assuming that you have already created a spring boot application which offer a Rest API. A simple guide can be…
What is Swagger for The definition comes from the http://swagger.io/getting-started/ and is very informative: “The goal of Swagger™ is to…
git log --pretty=format: --name-only --since="350 days ago" | sort | uniq You can change the value 350 to any desired
Assume that you want to find in your linux system the files that have been changed during a time period…
What is docker Docker allows you to package an application with all of its dependencies into a standardized unit for…
Data Analysis, analysis of data come from application (usage etc) Software Testing, putting programs through a variety of tests to catch…
Snapshot Of heap using jmap & jhat jmap is a ‘memory map’ tool that prints heap memory for a jvm…
NCurses Disk Usage Ncdu is a disk usage analyzer with an ncurses interface. It is designed to find space hogs…