Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
308 Chapter 7 • Securing Your Java Code
The first thing we are going to try is creating a keystore file and
generating a key-pair for ourselves.The simplest way to do this is by
using the -genkey argument with no other parameters.The keytool will
prompt you for all the information it needs (see Figure 7.18).The
downside of using no other arguments is that everything is given default
values, except for the information it requests. For example, the certificate
is only good for 90 days and the keystore uses an alias of “mykey.”
After it has finished executing, it will have created a keystore file in
your user.home directory.This keystore file will contain y
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312