Combining symmetric and assymetric encryption for transmitting data
First of all we will define what is symmetric and what asymmetric encryption. Symmetric Encryption is when a single key…
Adding JDBC Authentication in spring boot rest API
Assuming that you have already created a spring boot application which offer a Rest API. A simple guide can be…
How to create Rest API Documentation
What is Swagger for The definition comes from the http://swagger.io/getting-started/ and is very informative: “The goal of Swagger™ is to…
How to find the files last commited in git
git log --pretty=format: --name-only --since="350 days ago" | sort | uniq You can change the value 350 to any desired
How to find files by access and modification date / Time under Linux or UNIX
Assume that you want to find in your linux system the files that have been changed during a time period…
First steps on using docker
What is docker Docker allows you to package an application with all of its dependencies into a standardized unit for…
What other tech skills needed in a development team
Data Analysis, analysis of data come from application (usage etc) Software Testing, putting programs through a variety of tests to catch…
Profiling tomcat application
Snapshot Of heap using jmap & jhat jmap is a ‘memory map’ tool that prints heap memory for a jvm…
How to quickly find the directory size in Linux system
NCurses Disk Usage Ncdu is a disk usage analyzer with an ncurses interface. It is designed to find space hogs…