Vulnerability Scan as part of Continuous Integration
Have you ever imagined how many vulnerabilities exist in your applications since it was created? And how many of them come from its dependencies?
Have you ever imagined how many vulnerabilities exist in your applications since it was created? And how many of them come from its dependencies?
This post is about creating PKCS #12 to serve e.g. your content via HTTPS in your application itself or in another web container (such a Tomcat or another application server). The PKCS #12 format is a binary format for storing cryptography objects. It usually contains the server certificate, any intermediate certificates (i.e. […]