Security logoConvert PEM File Format to Java Keystore

DateModifiedViewsCategory

There are two major ways to convert PEM file into Java keystore one. The fist way is very easy because it is used a tool which is capable of direct conversion of those files. As a tool, for example, you can use KeyStore Explorer. The second way is not trivial …

more ...




Python logoStore Sensitive Data Locally in Windows Using Python

Some applications request to key in sensitive information each time when you run it. For example, a password to access MySql server. You can store it in a file or in a database, but it might violate your company security policy or it might add a level of complexity. Majority …

more ...

Trino logoTrino Insights Database Maintenance

DateModifiedViewsCategory

Insights is a part of functionality included in Starburst Enterprise platform (SEP). Insights shows cluster history, usage metrics, and query history and details. Data is persisted in the insights database. Postgres, Oracle, or MySql is a list of supported backend database management system which is used to store collected data …

more ...


Alpine logoCreate Let's Encrypt Certificate in Alpine for Nginx

Securing Web sites with HTTPS protocol gives many advantages along with increasing rankings in search engine optimization (SEO). There are many Certificate Authority which provides SSL/TLS certificates. Some of them are free. Let's Encrypt is a reputable non-profit certificate authority providing certificates at no charge. Let's Encrypt is supported …

more ...