Introduction Have you ever wondered how authentication apps like RSA Authenticator generate One-Time Passwords (OTPs) without requiring an internet connection? This fascinating technology is made possible through Time-Based One-Time Passwords (TOTP). In this article, we will explore the mechanics of TOTP, its security features, and why it doesn't rely on the internet at the client-side for generating OTPs. Understanding TOPT 1. TOTP in a Nutshell TOPT, or Time-Based One-Time Password, is a security feature designed to enhance the authentication process. It generates OTPs that are only valid for a short period, typically 30 seconds. TOPT uses a secret key, often shared between the server and the user's device, to generate these OTPs. The central idea is to provide a second factor of authentication, beyond just a static password, to strengthen security. 2. The RSA Authenticator App One popular example of a TOPT implementation is the RSA Authenticator app. This app is commonly use...
Welcome to the tech world! 🚀 As you start your journey into software development, it's crucial to understand how important security is. The OWASP Top 10 is a list of the most critical security risks for applications. Let's break it down in a simple, beginner-friendly way with real-world examples and tips! 1. Broken Access Control What's happening? Users can access data or functions they shouldn't be able to. Example: Imagine a website where anyone can change another person's profile information just by modifying the URL like: /edit-profile?userId=1234 . Tip: Always check on the server-side if the user is allowed to perform an action! 2. Cryptographic Failures What's happening? Sensitive information like passwords or credit card numbers isn't properly protected. Example: A site stores user passwords in plain text. If hackers get access, they immediately see the passwords! Tip: Always hash passwords using secure algorithms like bcrypt or...
In my previous blog , we have done ELK installation on windows 10 and we have even tried to push messages from input console to Elastic Search and finally viewed on Kibana Server. I will write a separate blog on why do we need ELK? In this blog, I’ll show you how can we push spring boot application log directly to Elastic search using Logstash which we can analyze on Kibana and If you don’t know how to install ELK on windows 10 then you can refer my previous blog and start Elastic Search and Kibana server. Prerequisite Elastic Search and Kibana running on your machine Basic knowledge of Spring boot application If you don’t want to start your application from scratch then you can download one spring boot application from my GitHub repository as well. I am assuming that the Elastic Search and Kibana server are running on your machine and you have a fair idea of how to start the Logstash server and what is Logstash conf file. So, to push spring boot logs cont...
Comments
Post a Comment