RESTful error handling with Tomcat and SpringMVC 3.x
Updated: 2011-12-31 09:10:42
Handling errors in a REST way is seemingly simple enough: upon requesting a resource, when an error occurs, a proper status code and a body that contains a parseable message and using the content-type of the request should be returned. The default error pages in Tomcat are ugly. Not only they expose too much of [...]

We saw what typically happens when trying to use static rule-based log correlation to perform real-time incident management... combinatory explosion and lack of scalability. How do you automate non-deterministic attacks in a few discrete steps???
Today, we'll look at more scenarios for which static rule-based log correlation doesn't make sense.
Attack Scenario Example 2: Brute Force Attack
Let's look at another example scenario. Brute Force Attack.read more
Posted in MusicOne thing I really enjoy about the end of the year is the “Best Of” lists, especially for music. I don’t get to pay much attention to all the music happenings and this does some of the sorting for me. … Continue reading →
Gartner says, in three years, mobile application development projects will outnumber PC projects by 4-1 ratio and in four years, 50% of the people will primarily access their emails from a mobile device. So, the necessity of establishing a mobile channel for your customer is – well a no-brainer. However, should you just build a mobile website or should you also invest in building native application is not easy to decide. There can be no doubt that you need to have a website optimized for mobile devices. What is the best way to build and maintain that website is not a simple decision.read more
Welcome Register Sign-in Search Jump to a Magazine NET AJAX APACHE CLOUD COMPUTING CMS COLDFUSION CRM ECLIPSE FLEX HP IPHONE JAVA LINUX OPEN SOURCE OPEN WEB ORACLE PERL PHP POWERBUILDER PYTHON RED HAT RUBY SAP SEARCH SILVERLIGHT SOA SYMBIAN VIDEO VIRTUALIZATION WEB 2.0 WEBLOGIC WEBSPHERE WIRELESS XML Home Subscribe Advertise Authors Topics Videos Events Webcasts Java : Email Alerts Newsletters Get Java : Homepage Mobile NET AJAX Cloud Eclipse Flex Open Web iPhone Java Linux Open Source Oracle PowerBuilder Security SOA Virtualization Web 2.0 Java Authors : Tad Anderson Maureen O'Gara Gorka Sadowski Chris Muir Ken Rutsky Related Topics : Java SOA WOA Java : Article Why Rule-Based Log Correlation Is Almost a Good Idea Part 2 Modeling attack scenarios Is it possible By Gorka Sadowski Article :
Rule-based log correlation is almost a good idea.
It sounds like a good idea, it appears to be a good idea and many people will tell you it’s a good idea, but in fact it is not.
Rule-based log correlation is very complex, limited in use and applicability, and boasts a terrible ROI.
It will give you a false sense of security, and this is a bad thing.
We will look at the reasons why this is a false good idea, and what are some ways to augment the use of logs to improve your security through pragmatic Risk Management.read more
Welcome Register Sign-in Search Jump to a Magazine NET AJAX APACHE CLOUD COMPUTING CMS COLDFUSION CRM ECLIPSE FLEX HP IPHONE JAVA LINUX OPEN SOURCE OPEN WEB ORACLE PERL PHP POWERBUILDER PYTHON RED HAT RUBY SAP SEARCH SILVERLIGHT SOA SYMBIAN VIDEO VIRTUALIZATION WEB 2.0 WEBLOGIC WEBSPHERE WIRELESS XML Home Subscribe Advertise Authors Topics Videos Events Webcasts Java : Email Alerts Newsletters Get Java : Homepage Mobile NET AJAX Cloud Eclipse Flex Open Web iPhone Java Linux Open Source Oracle PowerBuilder Security SOA Virtualization Web 2.0 Java Authors : Tad Anderson Maureen O'Gara Gorka Sadowski Chris Muir Ken Rutsky Related Topics : Java SOA WOA Java : Article Exploring PureMVC Let's discover the main difference between PureMVC and the other variants By Lahlali Issam Article : Rating