Encrypting authentication details - HTTP URL Connection
Hi,
We have a Java application which retreives HTML content from intranet page using HTTPURLConnection, displays the portion of the content. The site to which we are connecting using HTTPURLConnection requires baisc user authentication and we are passing the user name and passowrd using BASE 64 encoding in the request header. Now this intranet site is going to be hosted externally. Just wanted to know the different options on how to send the user name and password in ecnrypted format.Is the recommendation is just to enable HTTPS for that site and pass user name and password using HTTP URL Connection API? Or are there any other options? Appreciate any inputs.
Thanks.
http://java.sun.com/javase/6/docs/technotes/guides/net/http-auth.html
Similar Messages
-
Associating a subject to a HTTP URL Connection
Hello,
We have a java client application which authenticates to the server using the JAAS model. The application opens HTTP URL connections from time to time (to servlets that stream data back and forth). The access.log indicates that no subject is associated with the action. Is there a way to associate the authenticated subject with the URL connection?
WLS 8.1 SP2
Thanks,
BobNot in a directway, though you may set a token and implement an Identity asserter which can understand the token.
-
What is the difference between HTTPS URL connection and SSLSocket conn
What is the difference between HTTPS URL connection and SSLSocket connection
The difference is that they are different protocols, or rather one protocol layered over the other. If you're within a LAN you will use SSL, if it's a Web service you will use HTTPS.
-
Getting FileNotFound Exception while using https url connection
Hi
I am facing a serious problem in running the code. I am using JSSE in my code and through this application I am hitting a URL which is also using HTTPS and that code is also using JSSE in servlets.
Now when I use the code I get a FileNotFoundException which says that the particular servlet is not located. I have given debug mode on and I could see that initial handshake is over and after that its throwing FileNotFoundException.
This problem is very serious because this system is live and now for this particular case where both the server and client are using JSSE , is failing.
Kindly suggest me some solution
Best Regards
vrkirubakaranHi
Thanx for ur reply,
We tried it from the Browser its working fine, more over we are not using any proxy, but i tried to hit thru the java jsse application its giving FileNotFoundException.
When i gone thru the Debug Log, it shows 403 Access Denied, for ur reference i am pasting the logs below
==========================================
Chkmsg->0100|https://www.ceemea2.citibank.com/servlet/recieve|09082001020202|10210010|123456789012|000002|0.05|
%% No cached client session
*** ClientHello, v3.1
RandomCookie: GMT: 997419653 bytes = { 190, 156, 211, 219, 90, 50, 59, 1, 16, 169, 254, 51, 21, 62, 149, 90, 231, 94, 80, 246, 100, 50, 31, 80, 99, 113, 30, 127 }
Session ID: {}
Cipher Suites: { 0, 3, 0, 17 }
Compression Methods: { 0 }
[write] MD5 and SHA1 hashes: len = 47
0000: 01 00 00 2B 03 01 3B 73 6B 85 BE 9C D3 DB 5A 32 ...+..;sk.....Z2
0010: 3B 01 10 A9 FE 33 15 3E 95 5A E7 5E 50 F6 64 32 ;....3.>.Z.^P.d2
0020: 1F 50 63 71 1E 7F 00 00 04 00 03 00 11 01 00 .Pcq...........
main, WRITE: SSL v3.1 Handshake, length = 47
[write] MD5 and SHA1 hashes: len = 50
0000: 01 03 01 00 09 00 00 00 20 00 00 03 02 00 80 00 ........ .......
0010: 00 11 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 ..;sk.....Z2;...
0020: FE 33 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 .3.>.Z.^P.d2.Pcq
0030: 1E 7F ..
main, WRITE: SSL v2, contentType = 22, translated length = 16337
main, READ: SSL v3.0 Handshake, length = 3339
*** ServerHello, v3.0
RandomCookie: GMT: 14337 bytes = { 1, 253, 137, 78, 248, 161, 43, 251, 125, 205, 205, 145, 69, 176, 100, 201, 82, 209, 44, 155, 194, 143, 205, 173, 177, 32, 62, 162 }
Session ID: {14, 91, 242, 201, 133, 233, 30, 179, 233, 88, 72, 170, 146, 254, 185, 30, 0, 204, 59, 190, 74, 213, 180, 255, 110, 242, 135, 204, 143, 104, 171, 178}
Cipher Suite: { 0, 3 }
Compression Method: 0
%% Created: [Session-1, SSL_RSA_EXPORT_WITH_RC4_40_MD5]
** SSL_RSA_EXPORT_WITH_RC4_40_MD5
[read] MD5 and SHA1 hashes: len = 74
0000: 02 00 00 46 03 00 00 00 38 01 01 FD 89 4E F8 A1 ...F....8....N..
0010: 2B FB 7D CD CD 91 45 B0 64 C9 52 D1 2C 9B C2 8F +.....E.d.R.,...
0020: CD AD B1 20 3E A2 20 0E 5B F2 C9 85 E9 1E B3 E9 ... >. .[.......
0030: 58 48 AA 92 FE B9 1E 00 CC 3B BE 4A D5 B4 FF 6E XH.......;.J...n
0040: F2 87 CC 8F 68 AB B2 00 03 00 ....h.....
*** Certificate chain
chain [0] = [
Version: V3
Subject: CN=www.ceemea2.citibank.com, OU=Terms of use at www.verisign.com/rpa (c)00, OU=CGTI, O=Citibank N A, L=London, ST=London, C=GB
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@5087d0d6
Validity: [From: Fri Dec 22 05:30:00 GMT+05:30 2000,
To: Sun Dec 23 05:29:59 GMT+05:30 2001]
Issuer: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
SerialNumber: [ 6096271c 4fd3f6fb 6d1ba8c2 3971dec5 ]
Certificate Extensions: 5
[1]: ObjectId: 2.16.840.1.113733.1.6.15 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 0B 16 09 35 34 39 31 32 36 33 38 31 ....549126381
[2]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
NetscapeCertType [
SSL server
[3]: ObjectId: 2.5.29.3 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 82 02 16 30 82 02 12 30 82 02 0E 30 82 02 0A ....0...0...0...
0010: 06 0B 60 86 48 01 86 F8 45 01 07 01 01 30 82 01 ..`.H...E....0..
0020: F9 16 82 01 A7 54 68 69 73 20 63 65 72 74 69 66 .....This certif
0030: 69 63 61 74 65 20 69 6E 63 6F 72 70 6F 72 61 74 icate incorporat
0040: 65 73 20 62 79 20 72 65 66 65 72 65 6E 63 65 2C es by reference,
0050: 20 61 6E 64 20 69 74 73 20 75 73 65 20 69 73 20 and its use is
0060: 73 74 72 69 63 74 6C 79 20 73 75 62 6A 65 63 74 strictly subject
0070: 20 74 6F 2C 20 74 68 65 20 56 65 72 69 53 69 67 to, the VeriSig
0080: 6E 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 n Certification
0090: 50 72 61 63 74 69 63 65 20 53 74 61 74 65 6D 65 Practice Stateme
00A0: 6E 74 20 28 43 50 53 29 2C 20 61 76 61 69 6C 61 nt (CPS), availa
00B0: 62 6C 65 20 61 74 3A 20 68 74 74 70 73 3A 2F 2F ble at: https://
00C0: 77 77 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D www.verisign.com
00D0: 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 69 6C 20 /CPS; by E-mail
00E0: 61 74 20 43 50 53 2D 72 65 71 75 65 73 74 73 40 at CPS-requests@
00F0: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B 20 6F 72 verisign.com; or
0100: 20 62 79 20 6D 61 69 6C 20 61 74 20 56 65 72 69 by mail at Veri
0110: 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 35 39 33 Sign, Inc., 2593
0120: 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 4D 6F 75 Coast Ave., Mou
0130: 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 41 20 39 ntain View, CA 9
0140: 34 30 34 33 20 55 53 41 20 54 65 6C 2E 20 2B 31 4043 USA Tel. +1
0150: 20 28 34 31 35 29 20 39 36 31 2D 38 38 33 30 20 (415) 961-8830
0160: 43 6F 70 79 72 69 67 68 74 20 28 63 29 20 31 39 Copyright (c) 19
0170: 39 36 20 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 96 VeriSign, Inc
0180: 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 20 52 65 . All Rights Re
0190: 73 65 72 76 65 64 2E 20 43 45 52 54 41 49 4E 20 served. CERTAIN
01A0: 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 43 4C WARRANTIES DISCL
01B0: 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 42 49 4C AIMED and LIABIL
01C0: 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 0E 06 0C ITY LIMITED.....
01D0: 60 86 48 01 86 F8 45 01 07 01 01 01 A1 0E 06 0C `.H...E.........
01E0: 60 86 48 01 86 F8 45 01 07 01 01 02 30 2C 30 2A `.H...E.....0,0*
01F0: 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65 .(https://www.ve
0200: 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 70 6F 73 risign.com/repos
0210: 69 74 6F 72 79 2F 43 50 53 20 itory/CPS
[4]: ObjectId: 2.5.29.37 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 0D 30 0B 06 09 60 86 48 01 86 F8 42 04 01 ..0...`.H...B..
[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
Algorithm: [MD5withRSA]
Signature:
0000: 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D 59 03 45 17 ...`....jv.MY.E.
0010: 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 E6 F0 8B 26 M;_..I...].D...&
0020: 46 25 D5 AC B6 31 18 7B F0 27 A2 32 0D E3 EF 1F F%...1...'.2....
0030: 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F F3 EE A7 21 H6...m.-2......!
0040: B7 40 88 B5 5D 60 3E 93 84 EE 42 9F AC 27 B9 4C .@..]`>...B..'.L
0050: 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 6D 11 4A 3E c..,.......Hm.J>
0060: 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C 79 4F 27 A4 z8.H3...1.wlyO'.
0070: 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 23 12 D2 7A .Z....^.R.<9#..z
chain [1] = [
Version: V3
Subject: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@367bd0d6
Validity: [From: Thu Apr 17 05:30:00 GMT+05:30 1997,
To: Thu Jan 08 05:29:59 GMT+05:30 2004]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
SerialNumber: [ 236c971e 2bc60d0b f97460de f108c3c3 ]
Certificate Extensions: 5
[1]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
NetscapeCertType [
SSL CA
S/MIME CA
[2]: ObjectId: 2.5.29.32 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 82 01 2C 30 82 01 28 30 82 01 24 06 0B 60 86 ...,0..(0..$..`.
0010: 48 01 86 F8 45 01 07 01 01 30 82 01 13 30 28 06 H...E....0...0(.
0020: 08 2B 06 01 05 05 07 02 01 16 1C 68 74 74 70 73 .+.........https
0030: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
0040: 63 6F 6D 2F 43 50 53 30 81 E6 06 08 2B 06 01 05 com/CPS0....+...
0050: 05 07 02 02 30 81 D9 30 15 16 0E 56 65 72 69 53 ....0..0...VeriS
0060: 69 67 6E 2C 20 49 6E 63 2E 30 03 02 01 01 1A 81 ign, Inc.0......
0070: BF 56 65 72 69 53 69 67 6E 27 73 20 43 65 72 74 .VeriSign's Cert
0080: 69 66 69 63 61 74 69 6F 6E 20 50 72 61 63 74 69 ification Practi
0090: 63 65 20 53 74 61 74 65 6D 65 6E 74 2C 20 77 77 ce Statement, ww
00A0: 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 w.verisign.com/C
00B0: 50 53 2C 20 67 6F 76 65 72 6E 73 20 74 68 69 73 PS, governs this
00C0: 20 63 65 72 74 69 66 69 63 61 74 65 20 26 20 69 certificate & i
00D0: 73 20 69 6E 63 6F 72 70 6F 72 61 74 65 64 20 62 s incorporated b
00E0: 79 20 72 65 66 65 72 65 6E 63 65 20 68 65 72 65 y reference here
00F0: 69 6E 2E 20 53 4F 4D 45 20 57 41 52 52 41 4E 54 in. SOME WARRANT
0100: 49 45 53 20 44 49 53 43 4C 41 49 4D 45 44 20 26 IES DISCLAIMED &
0110: 20 4C 49 41 42 49 4C 49 54 59 20 4C 54 44 2E 20 LIABILITY LTD.
0120: 28 63 29 31 39 39 37 20 56 65 72 69 53 69 67 6E (c)1997 VeriSign
[3]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
Key_CertSign
Crl_Sign
[4]: ObjectId: 2.5.29.37 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 19 30 17 06 0A 60 86 48 01 86 F8 45 01 08 01 ..0...`.H...E...
0010: 06 09 60 86 48 01 86 F8 42 04 01 ..`.H...B..
[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:true
PathLen:0
Algorithm: [MD2withRSA]
Signature:
0000: B8 8C 98 C3 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB ....+H.r.h...tc.
0010: B1 58 B6 98 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 .X..E"....N3.bZ!
0020: 24 6C 9A C0 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F $l..B.E.:.g.....
0030: D5 48 19 93 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 .H..k..7K......x
0040: 99 FF 83 C2 FC D9 55 06 9E 31 66 46 7D 1B 78 60 ......U..1fF..x`
0050: F4 55 D4 6C 55 C8 69 62 70 7C 4D B6 89 06 05 9B .U.lU.ibp.M.....
0060: C8 43 8E CC 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 .C...(....FP.1.f
0070: 92 11 24 1E 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE ..$.J[Kf^eU._7..
chain [2] = [
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6f4bd0d6
Validity: [From: Mon Jan 29 05:30:00 GMT+05:30 1996,
To: Wed Aug 02 05:29:59 GMT+05:30 2028]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
SerialNumber: [ 70bae41d 10d92934 b638ca7b 03ccbabf ]
Algorithm: [MD2withRSA]
Signature:
0000: BB 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A .L.+.,&.O.......
0010: 11 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 ....(.g./.......
0020: 95 BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E ....l,.Q.s...S.N
0030: D6 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 .&.v.W..^!......
0040: 21 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C !X.i..D...D9.\..
0050: 00 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D ..V......EL....=
0060: F0 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F .2.......Q..b...
0070: C0 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ...r..6:k.N..d.d
[read] MD5 and SHA1 hashes: len = 3055
0000: 0B 00 0B EB 00 0B E8 00 05 6A 30 82 05 66 30 82 .........j0..f0.
0010: 04 CF A0 03 02 01 02 02 10 60 96 27 1C 4F D3 F6 .........`.'.O..
0020: FB 6D 1B A8 C2 39 71 DE C5 30 0D 06 09 2A 86 48 .m...9q..0...*.H
0030: 86 F7 0D 01 01 04 05 00 30 81 BA 31 1F 30 1D 06 ........0..1.0..
0040: 03 55 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 .U....VeriSign T
0050: 72 75 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 rust Network1.0.
0060: 06 03 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C ..U....VeriSign,
0070: 20 49 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A Inc.1301..U...*
0080: 56 65 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 VeriSign Interna
0090: 74 69 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 tional Server CA
00A0: 20 2D 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 - Class 31I0G..
00B0: 55 04 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 [email protected]
00C0: 6E 2E 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 n.com/CPS Incorp
00D0: 2E 62 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 .by Ref. LIABILI
00E0: 54 59 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 TY LTD.(c)97 Ver
00F0: 69 53 69 67 6E 30 1E 17 0D 30 30 31 32 32 32 30 iSign0...0012220
0100: 30 30 30 30 30 5A 17 0D 30 31 31 32 32 32 32 33 00000Z..01122223
0110: 35 39 35 39 5A 30 81 AD 31 0B 30 09 06 03 55 04 5959Z0..1.0...U.
0120: 06 13 02 47 42 31 0F 30 0D 06 03 55 04 08 13 06 ...GB1.0...U....
0130: 4C 6F 6E 64 6F 6E 31 0F 30 0D 06 03 55 04 07 14 London1.0...U...
0140: 06 4C 6F 6E 64 6F 6E 31 15 30 13 06 03 55 04 0A .London1.0...U..
0150: 14 0C 43 69 74 69 62 61 6E 6B 20 4E 20 41 31 0D ..Citibank N A1.
0160: 30 0B 06 03 55 04 0B 14 04 43 47 54 49 31 33 30 0...U....CGTI130
0170: 31 06 03 55 04 0B 14 2A 54 65 72 6D 73 20 6F 66 1..U...*Terms of
0180: 20 75 73 65 20 61 74 20 77 77 77 2E 76 65 72 69 use at www.veri
0190: 73 69 67 6E 2E 63 6F 6D 2F 72 70 61 20 28 63 29 sign.com/rpa (c)
01A0: 30 30 31 21 30 1F 06 03 55 04 03 14 18 77 77 77 001!0...U....www
01B0: 2E 63 65 65 6D 65 61 32 2E 63 69 74 69 62 61 6E .ceemea2.citiban
01C0: 6B 2E 63 6F 6D 30 81 9F 30 0D 06 09 2A 86 48 86 k.com0..0...*.H.
01D0: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0....
01E0: 81 00 BB 27 99 DF 3B A4 10 CE 0F BB 86 4C AB 2A ...'..;......L.*
01F0: 4C AE 66 34 A4 36 F3 0B 0D 02 55 BF E9 16 46 68 L.f4.6....U...Fh
0200: AE D2 FA EA 07 3A 08 0F B0 48 99 6C 89 CA 9A D3 .....:...H.l....
0210: 64 FE F6 ED 24 66 EA C6 86 48 70 56 33 D4 34 57 d...$f...HpV3.4W
0220: 8E 0B DE 42 E1 36 9F 82 BA ED 25 05 AC BB 56 4B ...B.6....%...VK
0230: 45 52 FA E1 CA 81 EE E0 88 A6 6E C8 A9 FD F4 5A ER........n....Z
0240: 01 64 DB F4 6D 51 3D 85 10 57 BF ED 61 DD 0C 65 .d..mQ=..W..a..e
0250: 09 85 08 AC C9 4E E7 2B 81 3D A6 CE 5E 23 D1 EC .....N.+.=..^#..
0260: 6D F5 02 03 01 00 01 A3 82 02 76 30 82 02 72 30 m.........v0..r0
0270: 09 06 03 55 1D 13 04 02 30 00 30 82 02 1F 06 03 ...U....0.0.....
0280: 55 1D 03 04 82 02 16 30 82 02 12 30 82 02 0E 30 U......0...0...0
0290: 82 02 0A 06 0B 60 86 48 01 86 F8 45 01 07 01 01 .....`.H...E....
02A0: 30 82 01 F9 16 82 01 A7 54 68 69 73 20 63 65 72 0.......This cer
02B0: 74 69 66 69 63 61 74 65 20 69 6E 63 6F 72 70 6F tificate incorpo
02C0: 72 61 74 65 73 20 62 79 20 72 65 66 65 72 65 6E rates by referen
02D0: 63 65 2C 20 61 6E 64 20 69 74 73 20 75 73 65 20 ce, and its use
02E0: 69 73 20 73 74 72 69 63 74 6C 79 20 73 75 62 6A is strictly subj
02F0: 65 63 74 20 74 6F 2C 20 74 68 65 20 56 65 72 69 ect to, the Veri
0300: 53 69 67 6E 20 43 65 72 74 69 66 69 63 61 74 69 Sign Certificati
0310: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
0320: 65 6D 65 6E 74 20 28 43 50 53 29 2C 20 61 76 61 ement (CPS), ava
0330: 69 6C 61 62 6C 65 20 61 74 3A 20 68 74 74 70 73 ilable at: https
0340: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
0350: 63 6F 6D 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 com/CPS; by E-ma
0360: 69 6C 20 61 74 20 43 50 53 2D 72 65 71 75 65 73 il at CPS-reques
0370: 74 73 40 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B [email protected];
0380: 20 6F 72 20 62 79 20 6D 61 69 6C 20 61 74 20 56 or by mail at V
0390: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 eriSign, Inc., 2
03A0: 35 39 33 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 593 Coast Ave.,
03B0: 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 Mountain View, C
03C0: 41 20 39 34 30 34 33 20 55 53 41 20 54 65 6C 2E A 94043 USA Tel.
03D0: 20 2B 31 20 28 34 31 35 29 20 39 36 31 2D 38 38 +1 (415) 961-88
03E0: 33 30 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 30 Copyright (c)
03F0: 20 31 39 39 36 20 56 65 72 69 53 69 67 6E 2C 20 1996 VeriSign,
0400: 49 6E 63 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 Inc. All Rights
0410: 20 52 65 73 65 72 76 65 64 2E 20 43 45 52 54 41 Reserved. CERTA
0420: 49 4E 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 IN WARRANTIES DI
0430: 53 43 4C 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 SCLAIMED and LIA
0440: 42 49 4C 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 BILITY LIMITED..
0450: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 01 A1 ...`.H...E......
0460: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 02 30 ...`.H...E.....0
0470: 2C 30 2A 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 ,0*.(https://www
0480: 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 .verisign.com/re
0490: 70 6F 73 69 74 6F 72 79 2F 43 50 53 20 30 11 06 pository/CPS 0..
04A0: 09 60 86 48 01 86 F8 42 01 01 04 04 03 02 06 40 .`.H...B.......@
04B0: 30 14 06 03 55 1D 25 04 0D 30 0B 06 09 60 86 48 0...U.%..0...`.H
04C0: 01 86 F8 42 04 01 30 19 06 0A 60 86 48 01 86 F8 ...B..0...`.H...
04D0: 45 01 06 0F 04 0B 16 09 35 34 39 31 32 36 33 38 E.......54912638
04E0: 31 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 00 10...*.H........
04F0: 03 81 81 00 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D .......`....jv.M
0500: 59 03 45 17 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 Y.E.M;_..I...].D
0510: E6 F0 8B 26 46 25 D5 AC B6 31 18 7B F0 27 A2 32 ...&F%...1...'.2
0520: 0D E3 EF 1F 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F ....H6...m.-2...
0530: F3 EE A7 21 B7 40 88 B5 5D 60 3E 93 84 EE 42 9F ...!.@..]`>...B.
0540: AC 27 B9 4C 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 .'.Lc..,.......H
0550: 6D 11 4A 3E 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C m.J>z8.H3...1.wl
0560: 79 4F 27 A4 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 yO'..Z....^.R.<9
0570: 23 12 D2 7A 00 04 35 30 82 04 31 30 82 03 9A A0 #..z..50..10....
0580: 03 02 01 02 02 10 23 6C 97 1E 2B C6 0D 0B F9 74 ......#l..+....t
0590: 60 DE F1 08 C3 C3 30 0D 06 09 2A 86 48 86 F7 0D `.....0...*.H...
05A0: 01 01 02 05 00 30 5F 31 0B 30 09 06 03 55 04 06 .....0_1.0...U..
05B0: 13 02 55 53 31 17 30 15 06 03 55 04 0A 13 0E 56 ..US1.0...U....V
05C0: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 31 37 30 eriSign, Inc.170
05D0: 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 20 33 20 5..U....Class 3
05E0: 50 75 62 6C 69 63 20 50 72 69 6D 61 72 79 20 43 Public Primary C
05F0: 65 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 74 ertification Aut
0600: 68 6F 72 69 74 79 30 1E 17 0D 39 37 30 34 31 37 hority0...970417
0610: 30 30 30 30 30 30 5A 17 0D 30 34 30 31 30 37 32 000000Z..0401072
0620: 33 35 39 35 39 5A 30 81 BA 31 1F 30 1D 06 03 55 35959Z0..1.0...U
0630: 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 72 75 ....VeriSign Tru
0640: 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 06 03 st Network1.0...
0650: 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 U....VeriSign, I
0660: 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A 56 65 nc.1301..U...*Ve
0670: 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 74 69 riSign Internati
0680: 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 20 2D onal Server CA -
0690: 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 55 04 Class 31I0G..U.
06A0: 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 6E 2E [email protected].
06B0: 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 2E 62 com/CPS Incorp.b
06C0: 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 54 59 y Ref. LIABILITY
06D0: 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 69 53 LTD.(c)97 VeriS
06E0: 69 67 6E 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D ign0..0...*.H...
06F0: 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 .........0......
0700: D8 82 80 E8 D6 19 02 7D 1F 85 18 39 25 A2 65 2B ...........9%.e+
0710: E1 BF D4 05 D3 BC E6 36 3B AA F0 4C 6C 5B B6 E7 .......6;..Ll[..
0720: AA 3C 73 45 55 B2 F1 BD EA 97 42 ED 9A 34 0A 15 .<sEU.....B..4..
0730: D4 A9 5C F5 40 25 DD D9 07 C1 32 B2 75 6C C4 CA ..\.@%....2.ul..
0740: BB A3 FE 56 27 71 43 AA 63 F5 30 3E 93 28 E5 FA ...V'qC.c.0>.(..
0750: F1 09 3B F3 B7 4D 4E 39 F7 5C 49 5A B8 C1 1D D3 ..;..MN9.\IZ....
0760: B2 8A FE 70 30 95 42 CB FE 2B 51 8B 5A 3C 3A F9 ...p0.B..+Q.Z<:.
0770: 22 4F 90 B2 02 A7 53 9C 4F 34 E7 AB 04 B2 7B 6F "O....S.O4.....o
0780: 02 03 01 00 01 A3 82 01 90 30 82 01 8C 30 0F 06 .........0...0..
0790: 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 30 0B .U....0.......0.
07A0: 06 03 55 1D 0F 04 04 03 02 01 06 30 11 06 09 60 ..U........0...`
07B0: 86 48 01 86 F8 42 01 01 04 04 03 02 01 06 30 20 .H...B........0
07C0: 06 03 55 1D 25 04 19 30 17 06 0A 60 86 48 01 86 ..U.%..0...`.H..
07D0: F8 45 01 08 01 06 09 60 86 48 01 86 F8 42 04 01 .E.....`.H...B..
07E0: 30 82 01 35 06 03 55 1D 20 04 82 01 2C 30 82 01 0..5..U. ...,0..
07F0: 28 30 82 01 24 06 0B 60 86 48 01 86 F8 45 01 07 (0..$..`.H...E..
0800: 01 01 30 82 01 13 30 28 06 08 2B 06 01 05 05 07 ..0...0(..+.....
0810: 02 01 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E ....https://www.
0820: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 50 53 verisign.com/CPS
0830: 30 81 E6 06 08 2B 06 01 05 05 07 02 02 30 81 D9 0....+.......0..
0840: 30 15 16 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 0...VeriSign, In
0850: 63 2E 30 03 02 01 01 1A 81 BF 56 65 72 69 53 69 c.0.......VeriSi
0860: 67 6E 27 73 20 43 65 72 74 69 66 69 63 61 74 69 gn's Certificati
0870: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
0880: 65 6D 65 6E 74 2C 20 77 77 77 2E 76 65 72 69 73 ement, www.veris
0890: 69 67 6E 2E 63 6F 6D 2F 43 50 53 2C 20 67 6F 76 ign.com/CPS, gov
08A0: 65 72 6E 73 20 74 68 69 73 20 63 65 72 74 69 66 erns this certif
08B0: 69 63 61 74 65 20 26 20 69 73 20 69 6E 63 6F 72 icate & is incor
08C0: 70 6F 72 61 74 65 64 20 62 79 20 72 65 66 65 72 porated by refer
08D0: 65 6E 63 65 20 68 65 72 65 69 6E 2E 20 53 4F 4D ence herein. SOM
08E0: 45 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 E WARRANTIES DIS
08F0: 43 4C 41 49 4D 45 44 20 26 20 4C 49 41 42 49 4C CLAIMED & LIABIL
0900: 49 54 59 20 4C 54 44 2E 20 28 63 29 31 39 39 37 ITY LTD. (c)1997
0910: 20 56 65 72 69 53 69 67 6E 30 0D 06 09 2A 86 48 VeriSign0...*.H
0920: 86 F7 0D 01 01 02 05 00 03 81 81 00 B8 8C 98 C3 ................
0930: 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB B1 58 B6 98 +H.r.h...tc..X..
0940: 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 24 6C 9A C0 E"....N3.bZ!$l..
0950: 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F D5 48 19 93 B.E.:.g......H..
0960: 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 99 FF 83 C2 k..7K......x....
0970: FC D9 55 06 9E 31 66 46 7D 1B 78 60 F4 55 D4 6C ..U..1fF..x`.U.l
0980: 55 C8 69 62 70 7C 4D B6 89 06 05 9B C8 43 8E CC U.ibp.M......C..
0990: 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 92 11 24 1E .(....FP.1.f..$.
09A0: 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE 00 02 40 30 J[Kf^eU._7....@0
09B0: 82 02 3C 30 82 01 A5 02 10 70 BA E4 1D 10 D9 29 ..<0.....p.....)
09C0: 34 B6 38 CA 7B 03 CC BA BF 30 0D 06 09 2A 86 48 4.8......0...*.H
09D0: 86 F7 0D 01 01 02 05 00 30 5F 31 0B 30 09 06 03 ........0_1.0...
09E0: 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0A U....US1.0...U..
09F0: 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E ..VeriSign, Inc.
0A00: 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 1705..U....Class
0A10: 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 72 3 Public Primar
0A20: 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 y Certification
0A30: 41 75 74 68 6F 72 69 74 79 30 1E 17 0D 39 36 30 Authority0...960
0A40: 31 32 39 30 30 30 30 30 30 5A 17 0D 32 38 30 38 129000000Z..2808
0A50: 30 31 32 33 35 39 35 39 5A 30 5F 31 0B 30 09 06 01235959Z0_1.0..
0A60: 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 .U....US1.0...U.
0A70: 0A 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 ...VeriSign, Inc
0A80: 2E 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 .1705..U....Clas
0A90: 73 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 s 3 Public Prima
0AA0: 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E ry Certification
0AB0: 20 41 75 74 68 6F 72 69 74 79 30 81 9F 30 0D 06 Authority0..0..
0AC0: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
0AD0: 30 81 89 02 81 81 00 C9 5C 59 9E F2 1B 8A 01 14 0.......\Y......
0AE0: B4 10 DF 04 40 DB E3 57 AF 6A 45 40 8F 84 0C 0B [email protected]@....
0AF0: D1 33 D9 D9 11 CF EE 02 58 1F 25 F7 2A A8 44 05 .3......X.%.*.D.
0B00: AA EC 03 1F 78 7F 9E 93 B9 9A 00 AA 23 7D D6 AC ....x.......#...
0B10: 85 A2 63 45 C7 72 27 CC F4 4C C6 75 71 D2 39 EF ..cE.r'..L.uq.9.
0B20: 4F 42 F0 75 DF 0A 90 C6 8E 20 6F 98 0F F8 AC 23 OB.u..... o....#
0B30: 5F 70 29 36 A4 C9 86 E7 B1 9A 20 CB 53 A5 85 E7 _p)6...... .S...
0B40: 3D BE 7D 9A FE 24 45 33 DC 76 15 ED 0F A2 71 64 =....$E3.v....qd
0B50: 4C 65 2E 81 68 45 A7 02 03 01 00 01 30 0D 06 09 Le..hE......0...
0B60: 2A 86 48 86 F7 0D 01 01 02 05 00 03 81 81 00 BB *.H.............
0B70: 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A 11 L.+.,&.O........
0B80: 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 95 ...(.g./........
0B90: BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E D6 ...l,.Q.s...S.N.
0BA0: 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 21 &.v.W..^!......!
0BB0: 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C 00 X.i..D...D9.\...
0BC0: 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D F0 .V......EL....=.
0BD0: 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F C0 2.......Q..b....
0BE0: 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ..r..6:k.N..d.d
*** RSA ServerKeyExchange
RSA Modulus: { 0, 220, 139, 250, 222, 127, 49, 15, 95, 89, 215, 106, 138, 129, 235, 255, 93, 104, 66, 162, 49, 12, 56, 164, 176, 248, 178, 247, 19, 165, 158, 146, 23, 35, 24, 200, 200, 229, 62, 237, 249, 75, 51, 235, 70, 187, 24, 192, 112, 11, 73, 244, 220, 249, 20, 101, 136, 192, 4, 9, 50, 41, 141, 209, 85 }
RSA Public Exponent: { 1, 0, 1 }
[read] MD5 and SHA1 hashes: len = 206
0000: 0C 00 00 CA 00 41 00 DC 8B FA DE 7F 31 0F 5F 59 .....A......1._Y
0010: D7 6A 8A 81 EB FF 5D 68 42 A2 31 0C 38 A4 B0 F8 .j....]hB.1.8...
0020: B2 F7 13 A5 9E 92 17 23 18 C8 C8 E5 3E ED F9 4B .......#....>..K
0030: 33 EB 46 BB 18 C0 70 0B 49 F4 DC F9 14 65 88 C0 3.F...p.I....e..
0040: 04 09 32 29 8D D1 55 00 03 01 00 01 00 80 BA 34 ..2)..U........4
0050: E7 DB 69 31 D3 C3 40 70 D6 E8 21 59 F0 51 AB 16 ..i1..@p..!Y.Q..
0060: 30 25 82 6B 89 71 C5 BA 88 EB B4 17 1C 6D E4 B5 0%.k.q.......m..
0070: BB B9 97 3A 44 1D 8D 50 5D F0 3A A6 0A FF 60 CF ...:D..P].:...`.
0080: DE CC ED 96 D8 0F F5 58 46 48 31 B1 35 0C 0D 4B .......XFH1.5..K
0090: 2F 17 10 65 50 14 A1 4B 7E AC 1D 23 7E 46 D1 6B /..eP..K...#.F.k
00A0: 96 67 AC 53 3A 4D 9A F8 6C B1 21 32 CE 88 3C 67 .g.S:M..l.!2..<g
00B0: 2B 31 EA 1E 5D 26 0D 91 C0 97 F3 64 C9 9F 51 34 +1..]&.....d..Q4
00C0: D9 A8 56 1C B8 46 62 8C 53 B8 EB E8 B8 94 ..V..Fb.S.....
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
*** ClientKeyExchange, RSA PreMasterSecret, v3.0
Random Secret: { 3, 0, 93, 240, 54, 45, 201, 36, 26, 84, 144, 76, 18, 32, 241, 29, 208, 244, 47, 63, 127, 113, 205, 22, 115, 183, 222, 202, 208, 173, 81, 168, 13, 177, 7, 184, 230, 85, 213, 248, 251, 113, 36, 156, 236, 171, 97, 216 }
[write] MD5 and SHA1 hashes: len = 68
0000: 10 00 00 40 B4 EC 49 02 09 61 36 4F 86 07 26 12 [email protected]..&.
0010: 70 E2 EE 78 5F C8 6A 01 F9 32 89 1C 8B C4 2B 34 p..x_.j..2....+4
0020: E3 B4 21 CA 60 E2 8A 56 B5 B2 20 BE FC 3B 5E 0A ..!.`..V.. ..;^.
0030: D9 81 BB 35 49 C0 22 F6 69 1C F6 84 A7 45 12 C0 ...5I.".i....E..
0040: 22 1E 86 47 "..G
main, WRITE: SSL v3.0 Handshake, length = 68
SESSION KEYGEN:
PreMaster Secret:
0000: 03 00 5D F0 36 2D C9 24 1A 54 90 4C 12 20 F1 1D ..].6-.$.T.L. ..
0010: D0 F4 2F 3F 7F 71 CD 16 73 B7 DE CA D0 AD 51 A8 ../?.q..s.....Q.
0020: 0D B1 07 B8 E6 55 D5 F8 FB 71 24 9C EC AB 61 D8 .....U...q$...a.
CONNECTION KEYGEN:
Client Nonce:
0000: 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 FE 33 ;sk.....Z2;....3
0010: 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 1E 7F .>.Z.^P.d2.Pcq..
Server Nonce:
0000: 00 00 38 01 01 FD 89 4E F8 A1 2B FB 7D CD CD 91 ..8....N..+.....
0010: 45 B0 64 C9 52 D1 2C 9B C2 8F CD AD B1 20 3E A2 E.d.R.,...... >.
Master Secret:
0000: 47 F8 BE 08 39 E9 48 F3 21 49 49 AA EA 35 D6 A6 G...9.H.!II..5..
0010: 8C 1A 71 B6 EA 9C C5 CC C4 AF 86 D0 25 6D 89 DE ..q.........%m..
0020: 5E FD 8C FC 2A 3C 18 35 6C B6 67 B0 F8 F7 E1 A3 ^...*<.5l.g.....
Client MAC write Secret:
0000: 35 EA 82 28 5D A7 9E E0 84 B7 EE D0 E3 42 09 77 5..(]........B.w
Server MAC write Secret:
0000: 0F 09 07 42 F3 44 F6 B0 A0 6E 8E 96 D6 DA E5 F5 ...B.D...n......
Client write key:
0000: 54 6A E0 5E 8B 05 03 59 D4 1F E3 FB B9 83 62 F4 Tj.^...Y......b.
Server write key:
0000: D5 7B 57 5B 29 58 36 7E 79 59 4F 66 20 9A 13 62 ..W[)X6.yYOf ..b
... no IV for cipher
main, WRITE: SSL v3.0 Change Cipher Spec, length = 1
*** Finished, v3.0
MD5 Hash: { 15, 249, 230, 83, 227, 150, 56, 210, 34, 235, 9, 89, 131, 214, 230, 12 }
SHA1 Hash: { 108, 86, 236, 53, 127, 202, 85, 117, 129, 156, 34, 177, 24, 29, 176, 163, 175, 46, 72, 236 }
[write] MD5 and SHA1 hashes: len = 40
0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
0020: 18 1D B0 A3 AF 2E 48 EC ......H.
Plaintext before ENCRYPTION: len = 56
0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
0020: 18 1D B0 A3 AF 2E 48 EC 70 B3 E7 C1 D9 6D D4 01 ......H.p....m..
0030: EE F1 A5 DE F5 D1 11 8C ........
main, WRITE: SSL v3.0 Handshake, length = 56
main, READ: SSL v3.0 Change Cipher Spec, length = 1
main, READ: SSL v3.0 Handshake, length = 56
Plaintext after DECRYPTION: len = 56
0000: 14 00 00 24 FF 99 25 8F B3 9E B7 A8 CA FF 48 64 ...$..%.......Hd
0010: 77 DB BC EE 0C 74 A5 7C 61 A0 16 65 -
Hello every one
actually i successfully login to webpage using httpPost
String urlEncodedContent = preparePostContent(LOGIN_USER_NAME, LOGIN_PASSWORD);
HttpURLConnection urlConnection = doHttpPost(TARGET_URL, urlEncodedContent);
String response = readResponse(urlConnection);but how can navigate from the page which i login to it to other web page in order to get its content
in other words
if i login to www.site.com/login.html
after logging from application i want to go to www.site.com/content/html but i lose my session so i get the content empty !!!
thanksI guarantee that this will work for you: [Java Programmatic Browser|http://www.swview.org/blog/java-programmatic-browser]
What you will do is visit the login page, submit the form and continue to the page you want. Look at the httpunit api for details (form submission). -
Getting the response code from a http url connection
The following program bombs if it does not find a page
import java.net.*;
import java.io.*;
public class URLReader {
public static void main(String[] args) throws Exception {
URL yahoo = new URL("http://www.yahoo.com/sadjhasjd.html");
HttpURLConnection client = (HttpURLConnection) yahoo.openConnection();
int resp_code = 0;
if(client!=null)
resp_code = client.getResponseCode();
I want to get the page that the yahoo returns if it cannot get the page.... just cut and paste the above address in a web browser and see what you get.....how can i get that page back....the above thing throws an IOException...............
thanks
sharadThe problem is it doesn't like .htm or .html for some reason.. I don't know this reason but somebody else might..
Just try taking the .html off the link like this, then I'm sure you'll get the error now.
URL yahoo = new URL("http://www.yahoo.com/sadjhasjd");
I know it's not what you want but that is all I can offer. It seems to only look for the main index.htm(l) or welcome.htm(l) files. Sorry thats as much as I can offer on this. -
Hi team,
I have multiple SSID, but want users of a single SSID to be redirected to a HTTP or HTTPS URL (LAN SERVER for authentication)
I am very curious and it is important. I want to see how to achieve this with CISCO WLC !!!http://10.229.3.99/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=10.229.3.99/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=www.geo.tv/
I wanted if someone connects to WLAN "MO-GUEST" automatically the user should be redirected to http://10.229.3.99/login.html and once authenticated by 10.229.3.99 , he/she should be allowed to access anything as normal. [ actually i just want automatic url redirection for the first time for the user of wlan "MO-GUEST"
waiting expert opinions. -
Name of .crl and .crt file missing from HTTP URL in certificate details
Hello Everyone,
I am in the process of building a 2-tier Windows Server 2012 R2 PKI. The CA name of both the offline standalone root CA and enterprise subordinate CA have spaces in it (we'll call the CA name, 'Test Lab Root CA' for point of reference).
When I submitted the certificate request for the subordinate CA to the root CA and viewed the attributes/extensions of the pending request, I noticed the HTTP URL is missing the name of the .crt and .crl file.
The AIA extension reads URL=http://test.domainname.com/pki/.crt
in the issued certificate details.
The CDP extension reads URL=http://test.domainname.com/pki/.crl
in the issued certificate details.
The AIA and CDP location HTTP URLs are configured as http://test.domainname.com/pki/<CertificateName>.crt and http://test.domainname.com/pki/<CRLNameSuffix><DeltaCRLAllowed>.crl, respectively on the
root CA.
The LDAP URL shows the .crt and .crl file name (with %20 replacing the spaces) perfectly fine. The LDAP URL is configured using variables as well. It's just the HTTP URL that is missing the name of the file altogether.
I have read about the issue where spaces are not being replaced with %20 in the URL on Windows Server 2012 and a hotfix is available for that issue. But this issue seems to be slightly different and I'm running Windows Server 2012 R2. I tried installing
the hotfix to see if it would help, but the hotfix can't install because it doesn't apply to Server 2012 R2.
I've been trying to find a technet discussion or blog article for a week to see if anyone has seen this and what the fix is, but I'm coming up empty. I only find talks about %20 not replacing the space in the name.
Does anyone have any insight to my particular issue? I don't want to issue the subordinate CA certificate until I know the HTTP URL populates the CRL and CRT file name correctly. I can get around this by typing out the name of the file (with spaces and not
%20... e.g. http://test.domainname.com/pki/Test Lab Root CA.crl) in the URL via the registry and the URL displays the name of the file (with %20 in the name) when I do another certificate request and check the attributes/extensions in the
pending request. However, I prefer to avoid manually typing out the name of the file in the registry. I'd like to use the variables if at all possible.
Any help/guidance would be greatly appreciated.
Thank you.On Fri, 27 Mar 2015 03:42:28 +0000, Brian Komar [MVP] wrote:
You have totally messed up the URLs.
If you run certutil -getreg ca\CRLPublicationURLs and certutil -getreg ca\CACertPublicationURLs, you will see that you do not have correct use of variables when compared to the settings that follow:
The URLs should be set to the following for an offline CA:
certutil -setreg CA\CRLPublicationURLs "1:%WINDIR%\system32\CertSrv\CertEnroll\%%3%%8%%9.crl\n2:http://test.domainname.com/pki/%%3%%8%%9.crl"
*certutil -setreg CA\CACertPublicationURLs "1:%WINDIR%\system32\CertSrv\CertEnroll\%%1_%%3%%4.crt\n2:http://*test.domainname.com*/pki/%%1_%%3%%4.crt"*
For an issuing CA, they should be set to:
The URLs should be set to the following for an offline CA:*certutil -setreg CA\CRLPublicationURLs "65:%WINDIR%\system32\CertSrv\CertEnroll\%%3%%8%%9.crl\n6:http://test.domainname.com/pki/%%3%%8%%9.crl"*
*certutil -setreg CA\CACertPublicationURLs "1:%WINDIR%\system32\CertSrv\CertEnroll\%%1_%%3%%4.crt\n2:http://**test.domainname.com**/pki/%%1_%%3%%4.crt"*
Just a clarification here, if you're running the above certutil commands at
the command prompt you only need single % characters in the command line.
The double % characters are only required if the commands are being run in
a batch file.
Paul Adare - FIM CM MVP -
How to encrypt UserID and Password in HTTP url
Hello experts,
We want to encrypt UserID and Password which has used in http URL in SAP PI 7.1.
As we have used SOAP adapter with Transport Protocol HTTP for sender server.
Kindly help us on it.
Regards,
Poonam.Hi,
please go through below blog,
http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/b04408cc-f10e-2c10-b5b7-af11026b2393?QuickLink=index&overridelayout=true
please go through below threads,
SOAP Envelope with user id password
Soap ---to ----file scenario
regards,
ganesh. -
Http Request through URL Connection?
Hi ,
Iam using an Applet (under JRE 1.3.0). Iam trying to send a Http Request using URL Connection. It is working fine . However, if the response time of the server is more than 3 minutes , the Response is not coming back to the server and the Applet is in a loop trying to read from the Server. I have observed that the request is sent to the server and it is processed successfully.
When I test it in my local devp. machine it is working fine till 15 minutes which is my requirement.
Can anybody suggest what should be the possible reasons and any workaround for it?
Regards,
TejoKiran.YIam copying the code fragments for the Applet Iam using . Is it a problem with the code? I heard that the URLConnection never times out . How is that it is not able to read the Response?
<CODE >
<HttpMessage>
public class HttpMessage {
URL servlet = null;
Hashtable headers = null;
public HttpMessage(URL servlet) {
this.servlet = servlet;
public InputStream sendGetMessage(Properties args) throws IOException {
String argString = ""; // default
if (args != null) {
argString = "?" + toEncodedString(args);
URL url = new URL(servlet.toExternalForm() + argString);
// Turn off caching
URLConnection con = url.openConnection();
con.setUseCaches(false);
// Send headers
sendHeaders(con);
return con.getInputStream();
private void sendHeaders(URLConnection con) {
if (headers != null) {
Enumeration enum = headers.keys();
while (enum.hasMoreElements()) {
String name = (String) enum.nextElement();
String value = (String) headers.get(name);
con.setRequestProperty(name, value);
</HttpMssage>
<Code used to Read the Response.>
URL url = new URL(getDocumentBase(),"/ccls/test/delay.jsp");
HttpMessage msg = new HttpMessage(url);
InputStream in = msg.sendGetMessage(null);
char[] buff = new char[2048];
int bytesRead;
int ch;
StringBuffer sbtextbox = new StringBuffer("");
DataInputStream data = new DataInputStream(
new BufferedInputStream(in));
String line;
while ((line = data.readLine()) != null) {
sbtextbox.append(line+"\r\n");
</Code used to Read the Response.>
</CODE> -
OS X10.4.11 update, Safari won't connect to secure (HTTPS) URLs
Didn't find any discussion of this particular symptom of the update, so thought I'd ask.
Installed 10.4.11 update over the weekend, which contained Safari v3.0.4. After the (uneventful) install and reboot, I'm unable to connect to any secure (HTTPS) URL. Browser seems to work on non-secure connections (HTTP). My FIREFOX browser on the same machine still works.
Haven't experienced any crashing or other OS issues, only the "Can't make a secure connection" with Safari (so far).
Suggestions would be appreciated.Did you recently install the latest Security upgrade, but did not "repair permissions" on the restart? If so, that's your answer. I have found it essential to "Repair permissions" before and after any Apple system update, or Security update. Otherwise oddities may appear in the operating system.
Also, sometimes reapplying the Combo Update specific to your current version of OS X remedies these types of problems. Here too, it's important to "repair permissions" etc. -
hai guys,
I developed one report and data downloaded into application path and file format is CSV. My development was working fine . Now I want to change file downloaded into FTP location ( this is also working). Now i want to connect HTTP URL path.
How to connect HTTP URL path ( Not Open method only connect)
Thanks in advanceHello,
U can make use of these Fm to connect to URL.
Use this code.
CNHT
CALL FUNCTION 'WS_EXECUTE' "#EC *
EXPORTING
COMMANDLINE = LV_CMDLINE
PROGRAM = LV_PGMNAME
EXCEPTIONS
FRONTEND_ERROR = 1
NO_BATCH = 2
PROG_NOT_FOUND = 3
ILLEGAL_OPTION = 4
GUI_REFUSE_EXECUTE = 5
OTHERS = 6.
IF SY-SUBRC <> 0.
Where LV_CMDLINE = WWW.SAP.COM
LV_PGMNAME = IEXPLORE.EXE
If useful reward points
Vasanth
Message was edited by: Vasanth M -
ARR2.5 anonymous authentication problem in Lync connectivity
Hello all,
I'm stuck in the middle of deploying ARR to support mobility,
I would just like to say that Lync discovery test used to work before i deployed
ARR 2.5 ,
I followed all the steps in all the guides,
for some reason when i run connectivity online check tool (from Microsoft)
i get the following error:
Testing HTTP authentication methods for URL https://lyncdiscover.DOMAIN.com/Autodiscover/AutodiscoverService.svc/root/user.
HTTP authentication test failed.
Tell me more about this issue and how to resolve it
Additional Details
Initial anonymous HTTP(s) request didn't fail, but Anonymous isn't a supported Authentication Method for this scenario.
HTTP Response Headers:
Pragma: no-cache
X-MS-Server-Fqdn: clvlync01.lan.coolvision.biz
X-Content-Type-Options: nosniff
Content-Length: 225
Cache-Control: no-cache
Content-Type: application/json
Expires: -1
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET,ARR/2.5
Date: Thu, 06 Mar 2014 08:47:41 GMT
Elapsed Time: 699 ms.
when i explore the url i get the xml file:
<resource xmlns="http://schemas.microsoft.com/rtc/2012/03/ucwa" rel="user" href="https://lync01.lan.DOMAIN.biz/Autodiscover/AutodiscoverService.svc/root/user">
<link rel="xframe" href="https://lync01.lan.DOMAIN.biz/Autodiscover/AutodiscoverService.svc/root/user/xframe"/>
</resource>
ARR LOG:
connectivity:
2014-03-06 09:54:52 lyncfeIP GET / X-ARR-CACHE-HIT=0&X-ARR-LOG-ID=1d849d36-c51b-4426-ae17-3d73a8e521d5 443 - 10.192.255.33 Mozilla/5.0+(Windows+NT+6.3;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/33.0.1750.146+Safari/537.36
- 200 0 0 78
user browse:
2014-03-06 09:59:47 lyncfeIP GET /abs/handler/C-12ca-12cc.lsabs X-ARR-CACHE-HIT=0&X-ARR-LOG-ID=460bbf67-83ec-4558-99b0-279ee55fe7a3 443 - 2.55.5.51 OC/4.0.7577.4419+(Microsoft+Lync+2010) - 404 0 0 0
In most places people ask to disable delegation... but i don't see an option in
the ARR .... i've tried to disable feature delegation (on the iis server) and it didn't helped.
is there any chance it's have anything to do with my lync kerberos account ?
please advise me what to do i'm lost.
thanks in advanceCheck the process to deploy IIS ARR as reverse proxy step by step, you can refer to the following blog:
http://blogs.technet.com/b/nexthop/archive/2013/02/19/using-iis-arr-as-a-reverse-proxy-for-lync-server-2013.aspx
Lisa Zheng
TechNet Community Support -
Problems with SAP BC to post a request to https URL
Hello,
in a integration scenario one of our partners wants to send a xml to our server via https.<br/>
I tried this internal with a test business connector. I simple use the WmPublic.pub.client http service.<br/>
I try to post a record to an https:// URL and get an error. It seems that there is some trouble with the ssl handshake. However it is working in the browser.<br/>
The option Security -> Certificates -> Trusted Certificates -> CA Certificates Directory is 'unspecified'. Therefore no server certificate should be reject.<br/>
<br/>
Now I got an 'iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
' error. I do not find any helpful entries in this forum. Did anyone solve this issue?<br/>
<br/>
Thank you,<br/>
Nils<br/>
<br/>
error:<br/>
2009-08-03 10:08:13 CEST iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
at iaik.security.ssl.r.f(Unknown Source)<br/>
at iaik.security.ssl.x.b(Unknown Source)<br/>
at iaik.security.ssl.x.a(Unknown Source)<br/>
at iaik.security.ssl.r.d(Unknown Source)<br/>
at iaik.security.ssl.SSLTransport.startHandshake(Unknown Source)<br/>
at iaik.security.ssl.SSLTransport.getInputStream(Unknown Source)<br/>
at iaik.security.ssl.SSLSocket.getInputStream(Unknown Source)<br/>
at com.wm.net.NetURLConnection.trySSLConnect(NetURLConnection.java:691)<br/>
at com.wm.net.NetURLConnection.httpsConnect(NetURLConnection.java:562)<br/>
at com.wm.net.NetURLConnection.connect(NetURLConnection.java:171)<br/>
at com.wm.net.HttpURLConnection.getOutputStream(HttpURLConnection.java:419)<br/>
at com.wm.net.HttpContext.getOutputStream(HttpContext.java:578)<br/>
at com.wm.net.HttpContext.getOutputStream(HttpContext.java:554)<br/>
at com.wm.net.HttpContext.post(HttpContext.java:338)<br/>
at pub.client.http(client.java:512)<br/>
<br/>
SAP BC Info:<br/>
Software <br/>
Product webMethods Integration Server <br/>
Version 4.6 (Standard Encryption) Release Notes <br/>
Updates BC46_CoreFix7 <br/>
Build Number 940 + CoreFix 7 [Fixes 1-205 + SP1-3] <br/>
SSL Standard (40-bit), Provider: IAIK 2.6 <br/>
<br/>
Server Environment <br/>
Java Version 1.3.1_20 (47.0) <br/>
Java Vendor Sun Microsystems Inc. <br/>
Java Home /usr/jdk1.3.1_20/jre <br/>
Java VM Version 1.3.1_20-b03 <br/>
Java VM Info Java HotSpot(TM) Client VM (mixed mode) <br/>
Classpath /usr/local/sapbc46/server/updates/BC46_CoreFix7.jar<br/>
/usr/local/sapbc46/server/lib/server.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/local/sapbc46/server/lib/classes<br/>
/usr/local/sapbc46/server/lib/client.jar<br/>
/usr/local/sapbc46/server/lib/mail.jar<br/>
/usr/local/sapbc46/server/lib/server.jar<br/>
packages/SAP/code/classes<br/>
packages/SAP/code/jars/static/inqmyxml.jar<br/>
packages/SAP/code/jars/static/jARM.jar<br/>
packages/SAP/code/jars/static/jCO.jar<br/>
packages/SAP/code/jars/static/sapjco.jar<br/>
packages/SAP/code/jars/static/sapxmltoolkit.jar<br/>
packages/WmPartners/code/classes<br/>
packages/WmWin32/code/classes <br/>
OS Linux <br/>
OS Platform i386 <br/>
OS Version 2.6.18.8-0.13-default <br/>
Current User sapbc <br/>
Working Dir /usr/local/sapbc46/server<br/>Ok - in this case you need to include to session based SSL setup in your flow (scenario).
The pub.security:setKeyAndChain and pub.security:clearKeyAndChain services are used to control which client certificate
the SAP BC server presents to remote servers. You need to use these services to switch between certificates and
certificate chains if you are not using aliases for remote servers.
List of services to be used:
pub.security:clearKeyAndChain
-- Associates the default key and certificate chain with the subsequent set of invoked services.
pub.security:setKeyAndChain
-- Processes a digital signature to make sure that the provided data has not been modified. The signature input is the DER encoding of the PKCS#7 SignedData object.
pub.security.pkcs7:sign
-- Creates a PKCS7 SignedData object.
pub.security.pkcs7:verify
-- Processes a digital signature to make sure that the provided data has not been modified.
pub.security.util:createMessageDigest
-- Generates a message digest for a given message.
pub.security.util:getCertificateInfo
-- Retrieves information (e.g., serial number, issuer, expiration date) from a digital certificate.
pub.security.util:loadPKCS7CertChain
-- Converts a certificate chain that is in PKCS7 format to a list (a one-dimensional array) of byte arrays.
Example:
Invoke pub.client:http to send data to Company D.
Invoke pub.security:setKeyAndChain using the key and certificate chain for Company B.
Invoke pub.client:http to send data to Company B.
Invoke pub.security:setKeyAndChain using the key and certificate chain for Company C.
Invoke pub.client:http to send data to Company C.
Invoke pub.security:clearKeyAndChain to revert back to the default key and certificate chain for Company
Au2019s server.
Invoke pub.client:http to send data to Company D.
Edited by: Kai Lerch-Baier on Aug 3, 2009 1:47 PM -
Map Viewer URL Connection Issue
Hi,
I have an UI project, for which i have created a Deployment Profile named 'adfXXXXXUI' nothing but created a adflibrary for that UI project.
While creating the adf jar, i have come across an Option called 'Connections' .
Here i have selected Connection Names Only ... means i will be getting all the names of the connections i have created & those will be reflected in my local connection.xml file.
After configuring the rest of the params, i deployed my UI project to "deploy -> adfXXXXXUI.jar".
And we have used this jar to integrate with another UI application ... And the taskflows avilable in the jar will be used in the other UI application.
Now here is my problem ... Actually my connections.xml file has a URL Connection. This is how it looks like....
<?xml version = '1.0' encoding = 'UTF-8'?>
<References xmlns="http://xmlns.oracle.com/adf/jndi">
<Reference name="MapServer" className="oracle.adf.model.connection.url.HttpURLConnection" xmlns="">
<Factory className="oracle.adf.model.connection.url.URLConnectionFactory"/>
<RefAddresses>
<XmlRefAddr addrType="MapServer">
<Contents>
<urlconnection name="MapServer" url="http://sbsys1.intra.schneider.com:8109/mapviewer"/>
</Contents>
</XmlRefAddr>
</RefAddresses>
</Reference><Reference name="snibuilddb" className="oracle.jdeveloper.db.adapter.DatabaseProvider" credentialStoreKey="snibuilddb" xmlns="">
<Factory className="oracle.jdeveloper.db.adapter.DatabaseProviderFactory"/>
<RefAddresses>
<StringRefAddr addrType="subtype">
<Contents>oraJDBC</Contents>
</StringRefAddr>
<StringRefAddr addrType="user">
<Contents>sni_guest</Contents>
</StringRefAddr>
<StringRefAddr addrType="port">
<Contents>3720</Contents>
</StringRefAddr>
<StringRefAddr addrType="hostname">
<Contents>uxsys186v</Contents>
</StringRefAddr>
<SecureRefAddr addrType="password"/>
<StringRefAddr addrType="serviceName">
<Contents>snit0.world</Contents>
</StringRefAddr>
<StringRefAddr addrType="DeployPassword">
<Contents>true</Contents>
</StringRefAddr>
<StringRefAddr addrType="oraDriverType">
<Contents>thin</Contents>
</StringRefAddr>
</RefAddresses>
</Reference>
</References>
All the taskflows avaialble in my jar using the URL connection which mentioned above. But the adflibray jar got created with a file named 'jar-connection.xml', where i can see <Reference/> as an empty Tag. Because i have selected connections name only as an option when creating the adflibrary for my UI.
Hence it is appearing so ... But when i added this jar to the other application, i have dragged & dropped the taskflows as a region on to the JSPX page. And i started running the page. On the page .... i can see only the data which is not making use of MapServer connection defiition. Along with that, some maps needs to rendered .. but that is not happening. Rest of the page with the filter critieria is being displayed properly.
Now i have selected Include Connection Details as an option, by editing the adfLibrary Deployment profile of the UI & redeployed & found the same thing. Like, though i specify the Include Connection Details as an option ... i did not see those URL connection details in my jar-connection.xml file.Still it is not working.
All the taskflows inside the jar are trying to use this URL connection from jar-connection.xml, which is avaiable inside the adfLibUI.jar.
I tried with a scenorio some thing like ... For the application to which i have added this adfUILibrary, there itself i created a URLConnection ... but it did not worked as well.
Requesting you to let me know how can i get avail of my URL connection in to my jar ...
Thanks & Regards,
Kiran KonjetiThis is purely ssl issue. You can try adding the below logic first.. This code basically sets ssl properties for us.
import java.security.Security;
Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());
Properties properties = System.getProperties();
String handlers = System.getProperty("java.protocol.handler.pkgs");
if (handlers == null) {
// nothing specified yet (expected case)
properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");
else {
// something already there, put ourselves out front
properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol|".concat(handlers));
System.setProperties(properties);
Below you start your code....
Maybe you are looking for
-
Want to install SSD and make it the main drive
Hello, I just purchased my Lenovo IdeaCenter H530 Desktop and straight away installed a GT640 video card. Everything seems good and I'm waiting to install a SSD. I would like to run windows 8.1 from the SSD as the primary drive, and use the 1TB H
-
Up-to-date program reply time.
I've requested my copy of mountain lion since 10am yesterday morning and I have not gotten a reply as yet. Is anyone still waiting for a reply like me?
-
We have two Mac laptops (I'm buying a MacBook Air) and we have all our data (work/private) on those two laptops -- which is scary without backup! I hope to get some advice on how to best backup for laptops. 1) External HD. I'm not sure exactly how TM
-
Use ADF Default Database Connection
Hi All, I am writing a class that requires to connect to the database and perform some functions. This class is invoked from a button. My challenge is, how can I use the current adf application database connection (jndi) instead of creating another c
-
Using tzupdater on windows 2003 machine; multiple JRE instances
Hi All, Apologies in advance if this is the wrong forum. Alas i am a newbie at Java and have been thrown into the fire to update our JRE with the tzupdater tool. I'm having trouble figuring out if the tool is working correctly and how to apply it to