• Início
  • Sobre Mim
  • Contato
  • Security

    AWS Local Authentication: Understanding Your Options and Using IAM User Long-Term Credentials Responsibly

  • Security Spring

    How to Securely Connect Your Spring Boot App to PostgreSQL with AWS Secrets Manager — No More Hardcoded Credentials

  • Uncategorized

    How to Connect Spring Boot to PostgreSQL Using Spring Data JPA

  • Spring

    Exception Handling Like a Pro in Spring Boot REST APIs

  • Simplifying Cloud Infrastructure with AWS CDK

    Simplifying Cloud Infrastructure with AWS CDK

    In the ever-evolving world of cloud computing, managing infrastructure can quickly become a complex and time-consuming task. Enter AWS Cloud Development Kit (CDK), a powerful tool designed to…

    Continue Reading

    junho 22, 2024

    4 min read

  • Understanding VPNs: How They Work and Why You Need One

    Understanding VPNs: How They Work and Why You Need One

    In today’s digital age, protecting your online privacy and security is paramount. One of the most effective tools for achieving this is a Virtual Private Network (VPN). But…

    Continue Reading

    junho 21, 2024

    4 min read

  • Passwordless Authentication

    Passwordless Authentication

    In the ever-evolving landscape of cybersecurity, one concept is gaining significant traction: Passwordless Authentication. As the name suggests, passwordless authentication refers to methods of verifying a user’s identity without…

    Continue Reading

    junho 20, 2024

    4 min read

  • Embracing Automated Versioning with Semantic Release

    Embracing Automated Versioning with Semantic Release

    In the ever-evolving landscape of software development, managing version numbers and ensuring consistent releases can often become a challenging task. Enter Semantic Release: a tool designed to automate the…

    Continue Reading

    junho 19, 2024

    4 min read

  • Understanding Multi-Factor Authentication: A Deep Dive into MFA

    Understanding Multi-Factor Authentication: A Deep Dive into MFA

    In the ever-evolving landscape of cybersecurity, protecting your digital assets has never been more critical. One of the most effective ways to enhance security is through Multi-Factor Authentication…

    Continue Reading

    junho 17, 2024

    4 min read

  • Beware of Spring Boot Actuator Endpoint env: A Security Alert

    Beware of Spring Boot Actuator Endpoint env: A Security Alert

    As a developer, securing your applications should be a top priority. One area that often goes unnoticed in Spring Boot applications is the Actuator env endpoint. In this blog post,…

    Continue Reading

    junho 16, 2024

    4 min read

←
1 … 12 13 14 15 16 … 18
→
  • Sobre Mim
  • Contato
  • Política de Cookies
  • Política de Privacidade
  • Termos de Uso

© Igor Venturelli

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Sempre ativo
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Gerir opções
  • Gerir serviços
  • Gerir {vendor_count} fornecedores
  • Leia mais sobre esses propósitos
Manage options
  • {title}
  • {title}
  • {title}