Top 10 Secure Coding Practices

Top 10 Secure Coding Practices Validate input. Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Be suspicious of most external data sources, including command line arguments, network interfaces, environmental variables, and user controlled files. Heed compiler warnings. Compile code using the highest warning level available for your compiler […]

Java Hibernate (II): Hibernate Query Language (HQL)

Today we are going to start to job with Hibernate, we will make a class for every tipe : Select, Insert, Update and Delete data for our database. First of all remember, we need a SessionFactory class to start our sessions : package Class; /// @author Start2Develop import org.hibernate.SessionFactory; import org.hibernate.cfg.Configuration; public class SessionFactoryUtil { […]

About object oriented programming : OBJECTS in Java

What Is an Object? Objects are key to understanding object-oriented technology. Look around right now and you’ll find many examples of real-world objects: your dog, your desk, your television set, your bicycle. Real-world objects share two characteristics: They all have state and behavior. Dogs have state (name, color, breed, hungry) and behavior (barking, fetching, wagging tail). Bicycles also have state […]