Open in app

Sign In

Write

Sign In

Sathya Bandara
Sathya Bandara

275 Followers

Home

About

Jul 11, 2022

SQL Injections Demystified

SQL which stands for Structured Query Language is a programming language that was specifically designed to communicate with relational databases. It is a “command” that is sent to the database in order to retrieve a set of records, insert/update records or perform a certain action. For example: SELECT name, cost…

Sql

3 min read

SQL Injections Demystified
SQL Injections Demystified
Sql

3 min read


Feb 22, 2022

How to Configure Flyway for Seamless Database Migration

Flyway is a tool that supports database migrations on multiple types of relational databases. It is open-source and licensed under Apache 2.0 License. What are the Advantages? Facilitates seamless updates to a database schema from one version to another as an application evolves with the code. Keeps a record of the updates applied on…

Flyway

3 min read

Flyway

3 min read


Jan 30, 2022

Hello, Kotlin!

I was working as a java software engineer for more than 4 years. Recently I joined a firm that uses Kotlin instead of Java and I have been learning Kotlin for the past few weeks. Learning Kotlin has been fun and interesting. Also, I feel it is fairly easy for…

Kotlin

5 min read

Hello, Kotlin!
Hello, Kotlin!
Kotlin

5 min read


Published in Identity Beyond Borders

·Feb 4, 2020

Best practices in Identifying the Authorization Context of an OAuth2 Token

In this post, we’ll discuss the best practices of identifying the authorized user of an access token and what approach we recommend in doing so. WSO2 Identity Server supports OAuth2 and OpenID Connect frameworks that define standard protocols on authorizing third-party applications when accessing user identities such that access to…

Oauth2

3 min read

Oauth2

3 min read


Jan 26, 2020

An Introduction to Helm Charts

What is Helm? When deploying an application on Kubernetes, it is required to define and manage several Kubernetes resources such as pods, services, deployments, and replicasets. Each of these require to write a group of manifest files in YAML format. In the context of a complex application deployment it becomes a difficult task…

Helm

4 min read

An Introduction to Helm Charts
An Introduction to Helm Charts
Helm

4 min read


Jul 24, 2019

Mitigating CSRF in IDP Initiated OpenID Connect

CSRF (Cross-Site Request Forgery) can allow an attacker to coerce a user into unknowingly and unintentionally dispatch responses to an application. …

Oauth

3 min read

CSRF in IDP Initiated OpenID Connect
CSRF in IDP Initiated OpenID Connect
Oauth

3 min read


Jun 27, 2019

TLS Handshake : Under The Hood

TLS which is the successor of SSL is a protocol that provides a secure mechanism for authentication using x509 certificates. It also provides a two-way encrypted channel between two parties. …

Security

9 min read

TLS Handshake : Under The Hood
TLS Handshake : Under The Hood
Security

9 min read


Jun 25, 2019

Ensuring Message Integrity with HTTP Signatures

In the present day, the most common approach for protecting APIs is by using shared secrets. Every time the API is called, this secret must be presented which is not that secure. Then there are other mechanisms such as OAuth which is used to enforce access control on APIs. However…

API

4 min read

Ensuring Message Integrity with HTTP Signatures
Ensuring Message Integrity with HTTP Signatures
API

4 min read


Jun 22, 2019

Host name verification failed for Host

When using HTTP Requester to establish HTTPS connection to remote server, you may be encountering the following exception. ERROR — TargetHandler I/O error: Host name verification failed for host : 172.20.5.110 javax.net.ssl.SSLException: Host name verification failed for host : <host-name> at org.apache.synapse.transport.http.conn.ClientSSLSetupHandler.verify(ClientSSLSetupHandler.java:152) at org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake(SSLIOSession.java:285)

Ssl

2 min read

Ssl

2 min read


Jun 22, 2019

GC Allocation Failures

When you are running a Java application, if you add these JVM arguments, it would log the Java Garbage collection details to a log file. -Xloggc:gc_memory_logs.log -XX:+PrintGCDetails -XX:+PrintGCTimeStamps Typically these logs would looks like this. 1.703: [GC [PSYoungGen: 132096K->16897K(153600K)] 132096K->16905K(503296K), 0.0171210 secs] [Times: user=0.05 sys=0.01, real=0.01 secs] 3.162: [GC [PSYoungGen…

Programming

3 min read

GC Allocation Failures
GC Allocation Failures
Programming

3 min read

Sathya Bandara

Sathya Bandara

275 Followers

Software Engineer | GSoC Intern | CSE Graduate

Following
  • Arslan Ahmad

    Arslan Ahmad

  • Netflix Technology Blog

    Netflix Technology Blog

  • Carlos Arguelles

    Carlos Arguelles

  • Prabath Siriwardena

    Prabath Siriwardena

  • Auth0

    Auth0

See all (9)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech