Welcome!

Frank Jennings

Subscribe to Frank Jennings: eMailAlertsEmail Alerts
Get Frank Jennings via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Frank Jennings
After setting up a LAN for your company, the next step is to build a secure Internet gateway for sharing your Internet connection. Fortunately, you don't have to be a geek to set up a gateway and build firewall rules, as it involves minimal open-source software and minor kernel configu...
When it comes to securing your classes, Frank Jennings presents two different techniques.
Network systems based on service discovery can provide a consistent view of their distributed components even during changing network conditions. The ability of a system to heal itself during a network catastrophe, including architectural change and system breakdown, will help the syst...
While designing Enterprise frameworks, you ought to be very cautious about exposing runtime instances of classes encompassing secure transaction or management core, outlining Intellectual Property of the enterprise.
(October 11, 2002) - Often it is necessary to encrypt confidential messages and send them across a stream for better Data veracity. With JCE, you can encrypt streams of data and decrypt them using public/private key pair or using a single signature key file. The technique involves asso...
When I was casually examining my server log few months back, I noticed something was going off beam. To my horror, the primary server crashed, unable to take the load. Usually, I don't get that much traffic. Months later, I realized that I was the victim of a DDOS attack. Being a hacke...