Welcome to the Java Programming Forums


The professional, friendly Java community. 21,500 members and growing!


The Java Programming Forums are a community of Java programmers from all around the World. Our members have a wide range of skills and they all have one thing in common: A passion to learn and code Java. We invite beginner Java programmers right through to Java professionals to post here and share your knowledge. Become a part of the community, help others, expand your knowledge of Java and enjoy talking with like minded people. Registration is quick and best of all free. We look forward to meeting you.


>> REGISTER NOW TO START POSTING


Members have full access to the forums. Advertisements are removed for registered users.

Results 1 to 5 of 5

Thread: Intermediate Question

  1. #1
    Junior Member
    Join Date
    Feb 2014
    Posts
    2
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Intermediate Question

    It's a simple question/debate to secure a server.

    Avoiding getting too technical, I would like to keep this theoretical.
    How secure would a network be if you used the method class to send abstract code, say authenticating data only.
    Chaining at least two server side machines where only the server side knows the execution timings of the proprietary machine code when executing randomly chosen abstract versions.
    Funnel the clients responsibly, no other access points.
    Propagate the method class design to the client's side code.
    Assuming encryption is done logically and proper, this would eliminate hacking all together.


  2. #2
    Junior Member
    Join Date
    Feb 2014
    Location
    Finland
    Posts
    25
    My Mood
    Bored
    Thanks
    3
    Thanked 5 Times in 5 Posts

    Default Re: Intermediate Question

    I think you need to elaborate on your question/debate a bit, mate. It might be just my lack of understanding, but im having trouble understanding your terminology and the context.

    Especially the following thigs rise my eyebrows:
    if you used the method class to send
    send abstract code, say authenticating data only
    Chaining at least two server side machines where only the server side knows
    knows the execution timings of the proprietary machine code when executing randomly chosen abstract versions.
    Funnel the clients responsibly, no other access points.
    Propagate the method class design to the client's side code.
    So if you could clarify especially on the points mentioned above, it would help for at least me to understand what you are talking about.

    Thanks!

  3. #3
    Forum VIP
    Join Date
    Jun 2011
    Posts
    347
    My Mood
    Busy
    Thanks
    48
    Thanked 105 Times in 88 Posts
    Blog Entries
    5

    Default Re: Intermediate Question

    Quote Originally Posted by SPiZlE View Post
    this would eliminate hacking all together.
    Nope. Can't be done. Computer security is a process, not a product and nothing short turning your servers off and burying it in a desert will make it 100% hack proof.

  4. #4
    Forum VIP
    Join Date
    Jul 2010
    Posts
    1,684
    Thanks
    25
    Thanked 333 Times in 309 Posts

    Default Re: Intermediate Question

    Quote Originally Posted by ChristopherLowe View Post
    Nope. Can't be done. Computer security is a process, not a product and nothing short turning your servers off and burying it in a desert will make it 100% hack proof.
    Well, if you could somehow validate with 100% certainty that a message came from a specific approved source, you would do away with hackers intercepting the data and sending false requests and messages, but I have no idea how someone would accomplish that (with current technology). It would require an identification which could not be mocked...
    NOTE TO NEW PEOPLE LOOKING FOR HELP ON FORUM:

    When asking for help, please follow these guidelines to receive better and more prompt help:
    1. Put your code in Java Tags. To do this, put [highlight=java] before your code and [/highlight] after your code.
    2. Give full details of errors and provide us with as much information about the situation as possible.
    3. Give us an example of what the output should look like when done correctly.

    Join the Airline Management Simulation Game to manage your own airline against other users in a virtual recreation of the United States Airline Industry. For more details, visit: http://airlinegame.orgfree.com/

  5. #5
    Junior Member
    Join Date
    Feb 2014
    Posts
    2
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Re: Intermediate Question

    You can validate with 100% certainty by eliminating addresses that are attempting to learn the server with repeated failed connection attempts.
    The data would come from a approved source because the server accepted the request.
    Interception is cumbersome and would violate the time limit given to respond.
    Current technology is the key words but with most major companies basing themselves at fiber optic hubs I'm not sure why they are still giving away data dumps.

Similar Threads

  1. Inspired Intermediate
    By Bitterguy in forum Member Introductions
    Replies: 0
    Last Post: January 1st, 2013, 02:25 PM
  2. Replies: 1
    Last Post: April 18th, 2012, 01:12 PM
  3. (Beginner/Intermediate) Tic Tac Toe game issues
    By Sylentwolf8 in forum What's Wrong With My Code?
    Replies: 5
    Last Post: January 17th, 2012, 07:03 AM
  4. Replies: 3
    Last Post: October 19th, 2011, 11:55 PM
  5. Replies: 3
    Last Post: March 8th, 2011, 06:44 AM