We are in an era of online businesses and for good or bad, we are in a path of becoming an online life form. Meanwhile, cybercrimes and attacks are becoming more of a threat to businesses at each passing day.
If you are an online business owner or stakeholder, one of your main goals is to create a trusted environment for your consumers. You have to win the faith of customers that their money and sensitive details are secured with you. …
I recently earned my first online certificate from edX. Cheers to me.
The program I chose to follow is called Data Science: R Basics. It is the first step of the Data Science professional certificate series offered by the HaravdX.
You may wonder what is HarvardX. Of course, you have heard about Harvard University. HarvardX is the term using for the online initiative of the Harvard University running via edX.
This program is instructed by Professor Rafael Irizarry. He is a Professor of Biostatistics at Harvard T.H Chan School of Public Health. …
It’s a great time to discuss how to secure a connection between the Artemis broker and the Wso2 EI. The weather is clear and sunny.
This is the third post regarding the Artemis broker and each post is interconnected.
The first post explained about Artemis basics and how to make it up and running . The second post was an extension of it and explained how to create an Inbound Endpoint in the EI that listens to a JMS Queue in Artemis .
Is the post already confusing? Don’t worry. Just read previous posts.
In previous posts …
Here we are going to talk about connecting the Apache ActiveMQ Artemis with the Wso2 EI.
We will be creating to create a JMS Inbound Endpoint at the EI which will listen to an Artemis JMS Queue. Then the Queue can be used to publish messages to the Inbound Endpoint and do whatever you want with it.
If you are unfamiliar with the Artemis broker, it’s the time to read my previous blog titled ‘Apache ActiveMQ Artemis 101’. It will walk you through basic details about this broker such as:
Has ActiveMQ changed its name? Or has it finally decided to go with the family name ‘Artemis’?
The answer is NOPE.
Then what the hell is ActiveMQ Artemis?
The ActiveMQ Artemis is just a mask. The real person hidden underneath it is HornetQ.
So what happened to HornetQ?
Well, the Apache Foundation received the HornetQ code and they decided to re-title it as ‘Artemis’.
From now on, I will use the term ‘Artemis’ for the Apache ActiveMQ Artemis and call it’s elder brother as ActiveMQ.
At the moment they are two different products. However, according to the ActiveMQ website, the…
First of all, let’s break down the topic.
There are two main keywords: Kubernetes and DevSecOps.
I assume that you have the basic idea of what is Kubernetes and how it works. If you haven’t, this is the Wikipedia introduction for Kubernetes:
Kubernetes (commonly stylized as k8s) is an open-source container orchestration system for automating application deployment, scaling, and management .
Explaining the Kubernetes is a topic for another post. So let’s move forward.
Then what is DevSecOps?
It is the short term for Development, Security and Operations. If you are an IT guy or even remotely related to IT…
In general cases, data services created using WSO2 DSS or EI are exposed as a SOAP service to the user. But actually they can be exposed as REST services too with some slight changes. This blog post will guide you through the entire process starting from the creation of a database to exposure of it as a data service in the REST form.
So where do we start?
Before starting we have to fulfill the following prerequisites.
The ‘Hack the Box’ is a famous penetration testing platform that is being used by cybersecurity professionals and practitioners all around the globe. It contains a set of vulnerable machines that can be used to boost your cybersecurity skills.
Ok. Shall we start to use it?
No! We cannot just go to the site and start using it.
You have to take the Invite Challenge first and hack your way in to get the invitation code. Here is the link.
So where do we start?
Let’s start by analyzing source codes. Just right click on the page and go to…
Anyone here familiar with WSO2 mediation and Synapse?
I expect YES for the answer. :)
When using WSO2 products, we often get requirements to alter the request or response payload. So there can be situations where we need to convert the integer values of the JSON payload to a string.
If you have the experience of doing all kind of nasty things to the payload in the mediation flow, you might be thinking ‘EASYY…’!
You only need to add ‘synapse.commons.json.output.autoPrimitive=false’ property to the <PRODUCT_HOME>/repository/conf/synapse.properties file. All the integer values will be converted to strings. Easy huh?
Yeah, it’s a…
If you are familiar with WSO2 products, you might already have noticed that WSO2 configuration files contain the hard-coded credentials in various places. Ever wondered why they are left like that which might cause a security threat?
One simple mechanism that comes with all the WSO2 products to overcome this vulnerability is called Secure Vault implementation. It’s an extended version of synapse Secure Vault and hence it has been inherited to WSO2 Carbon platform. This particular feature simply allows us to replace the real password with an alias and then this alias will be mapped with the encrypted version of…
Software Engineer @WSO2