Bozho's tech blog

  • Developer tips
  • Opinions

Discovering an OSSEC/Wazuh Encryption Issue

Bozho October 12, 2020

I’m trying to get the Wazuh agent (a fork of OSSEC, one of the most popular open source security tools, used for intrusion detection) to talk to our custom backendContinue reading

OpenSSL Key and IV Padding

Bozho October 10, 2020

OpenSSL is an omnipresent tool when it comes to encryption. While in Java we are used to the native Java implementations of cryptographic primitives, most other languages rely on OpenSSL.Continue reading

ElasticSearch Multitenancy With Routing

Bozho September 28, 2020

Elasticsearch is great, but optimizing it for high load is always tricky. This won’t be yet another “Tips and tricks for optimizing Elasticsearch” article – there are many great onesContinue reading

Is It Really Two-Factor Authentication?

Bozho September 24, 2020

Terminology-wise, there is a clear distinction between two-factor authentication (multi-factor authentication) and two-step verification (authentication), as this article explains. 2FA/MFA is authentication using more than one factors, i.e. “something youContinue reading

Bulk vs Individual Compression

Bozho August 27, 2020

I’d like to share something very brief and very obvious – that compression works better with large amounts of data. That is, if you have to compress 100 sentences you’dContinue reading

Making Sense of the Information Security Landscape

Bozho August 18, 2020

There are hundreds of different information security solutions out there and choosing which one to pick can be hard. Usually decisions are driven by recommendations, vendor familiarity, successful upsells, complianceContinue reading

Encryption Overview [Webinar]

Bozho July 30, 2020

“Encryption” has turned into a buzzword, especially after privacy standards and regulation vaguely mention it and vendors rush to provide “encryption”. But what does it mean in practice? I didContinue reading

Blockchainizing Existing Databases

Bozho July 17, 2020

Blockchain has been a buzzword for the past several years and it hasn’t lived to its promises (yet). The value proposition usually includes vague claims about trust and unmodifiability, butContinue reading

Seven Legacy Integration Patterns

Bozho June 21, 2020

If we have to integrate two (or more) systems nowadays, we know – we either use an API or, more rarely, some message queue. Unfortunately, many systems in the worldContinue reading

Using Multiple Dynamic Caches With Spring

Bozho June 15, 2020

In a third post about cache managers in spring (over a long period of time), I’d like to expand on the previous two by showing how to configure multiple cacheContinue reading

Posts navigation

« 1 2 3 4 5 6 … 38 »
My projects

LogSentinel – a next-gen SIEM

SentienlDB – a GDPR-compliant datastore

Computoser – algorithmic music

GitHub profile

Search
About me
  • LinkedIn
  • Web CV
  • CV (pdf)


profile for Bozho at Stack Overflow, Q&A for professional and enthusiast programmers

RSS Recent posts
  • Anticorruption Principles For Public Sector Information Systems
  • Methodology for Return on Security Investment
  • Why I’m Not So Alarmed About AI And Jobs
  • Nothing Is Secure [slides]
  • Internally And Externally Facing Honeypots
  • A Security Issue in Android That Remains Unfixed – Pull-down Menu On Lock Screen

DZone MVB Java Code Geeks
Posts by date
September 2023
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  
« Aug    
License
Creative Commons License
This work by Bozhidar Bozhanov is licensed under a Creative Commons Attribution 3.0 Unported License.
Categories
  • Developer tips
  • Opinions

Copyright 2023 Bozho's tech blog | Designed by CodeGearThemes

Powered by WordPress