226 Results for:JAR

  • Sort by: 

How to set up and use a JFrog Artifactory as a local Maven repository

By Cameron McKenzie 18 Sep 2018

In this Artifactory tutorial, we'll show you how to deploy JAR files to an Artifactory Maven repository. It's surprisingly simple. Read More

How to install Jenkins on Windows

By Cameron McKenzie 24 Aug 2023

With the Jenkins installer it's incredibly easy to download and run the popular CI/CD tool. Follow these simple steps and you'll have the continuous integration server running on Windows in no time. Read More

Stay ahead of Java security issues like SQL and LDAP injections

By Chris Tozzi 20 Mar 2018

Java security best practices include validating input to prevent injection attacks and managing malicious JAR vulnerabilities. Read More

Use Angry IP Scanner to audit the network

By Damon Garn 05 Sep 2023

Angry IP Scanner provides a network scanner alternative to Nmap that is simple, user-friendly and versatile across OSes. Scan types include ping scans, UDP scans and TCP scans. Read More

Learn how New Relic works and when to use it for IT monitoring

By Stephen J. Bigelow 05 Apr 2024

New Relic is one of many tools that can help an IT team track application performance and health. Before adoption, understand primary use cases and SaaS installation requirements. Read More

Packaging Java programs in the modern age of microservices and mobile apps

By Cameron McKenzie 22 May 2018

The packaging of Java programs has taken an interesting turn, as the original JAR format becomes a favorite even for Java web apps deployed as microservices. Read More

Oracle HCM adds new career development tool

By Patrick Thibodeau 20 Apr 2023

Oracle HCM says its new HR tool, Oracle Grow, helps employees develop skills by providing career options, paths and training amid a rapidly changing job market. Read More

How do I install Java?

By Cameron McKenzie 10 Jun 2022

To install Java the right way, there are a few things to know. Just sort out the perquisites and you'll be able to install Java and the JDK in no time flat. Read More

Top 15 email security best practices for 2024

By Sharon Shea, Peter Loshin 31 Jan 2024

Attackers exploit email every day to break into corporate networks, but the risk can be reduced by adhering to these 15 email security best practices. Read More

Horizon3.ai releases POC exploit for VMware vulnerabilities

By Alexander Culafi 31 Jan 2023

Penetration testing vendor Horizon3.ai published technical details and exploit code for three new CVEs in VMware vRealize Log Insight that can be chained for remote code execution. Read More