본문 바로가기

북마크494

How We Handled the Log4j Security Vulnerability https://dzone.com/articles/how-lattix-handled-the-log4j-security-vulnerabilit How We Handled the Log4j Security Vulnerability - DZone Learn how we used Lattix Architect to find and plan our log4j patch. We were also able to estimate how long it would take the fix the issue and then test. dzone.com 2023. 4. 6.
Lazy Load Design Pattern in Java: An Introduction and Implementation https://dzone.com/articles/lazy-load-design-pattern-in-java-introduction-and Lazy Load Design Pattern in Java: An Introduction and Implementation - DZone Watch the video in the article below on lazy load design patterns in Java including an introduction and how to implement it for yourself. dzone.com 2023. 4. 6.
Distributing a Java Command-Line Application https://dzone.com/articles/distributing-a-java-command-line-application Distributing a Java Command-Line Application - DZone In this article, I'll show you how to package and distribute a java command-line application and the challenges one has to face to implement it. dzone.com 2023. 4. 6.
Filter or Criteria Design Pattern in Java: An Introduction, Example, and Key points https://dzone.com/articles/filter-or-criteria-design-pattern-in-java-introduc Filter or Criteria Design Pattern in Java: An Introduction, Example, and Key points - DZone In the video below, we take a closer look at Filter or Criteria Design Pattern in Java with an introduction, example, and key points. dzone.com 2023. 4. 6.
Log4J Does What? https://dzone.com/articles/log4j-does-what Log4J - What Does It Do? - DZone An example of how Log4J vulnerability actually works. We'll cover Log4J library usage and see how basic inputs can cause potentially disastrous outcomes. dzone.com 2023. 4. 6.
728x90