Build your own tool to search for code sequences in binary files
Create scanning tools that search for specific instruction sequences in binary files. These tools help you verify compiled executable security and uniformity.
Create scanning tools that search for specific instruction sequences in binary files. These tools help you verify compiled executable security and uniformity.
Help GCC detect buffer overflows by using source-level annotations. This article describes three simple annotation types to detect out-of-bounds accesses.
Secure open source, cloud-native APIs with Authorino. This external authorization service lets you configure it quickly via the Kubernetes API for flexible use.
Follow this tutorial to size your single-sign on project. Learn how to design benchmarks and assess performance to develop an more precise estimate.
This tutorial shows how to secure multi-language microservices with oauth2-proxy and Keycloak. You can add authentication without coding OpenID Connect clients.
Pseudo-normal numbers represent a gap in floating point number classification in the long double format on Intel x86. Find out how glibc and GCC address it.
After installing Red Hat's single sign-on technology, you might want to change the default database. Here's how to configure SSO for MariaDB or MySQL.
Learn how knowledge graphs can help you address vulnerabilities in open source software dependencies quickly and efficiently.
Explore more features in GCC 11 that can help detect dynamic memory bugs in C and C++, and learn about the compiler's limitations.
Dynamic memory management bugs are hard to find and frequently targeted in C and C++ programs, but GCC 11's enhanced malloc attribute is here to help.
Learn how to set up single-use access tokens in Red Hat 3scale API Management to enhance application security with this X-step demo.
Follow the instructions in this article to quickly connect a Red Hat single sign-on technology client with a Red Hat Data Grid server on Red Hat OpenShift.
The GNU C Library's 2.33 release adds buffer overflow protection for C/C++ programs. Find out how _FORTIFY_SOURCE=3 improves overflow protection in glibc.
Get started with using Red Hat CodeReady Dependency Analytics to analyze dependency vulnerabilities in your Golang application stack.
Set up authentication and authorization to connect Red Hat Integration Service Registry with a secure Red Hat AMQ Streams Kafka cluster.
Get a quick introduction to C and C++ code analysis with clang-tidy, including checking for rule violations and integrating clang-tidy with a build system.
Improving security with Istio | DevNation Tech Talk
Discover what's new in Red Hat JBoss Enterprise Application Platform 7.4 beta, including new security, server management, and developer features.
Configure a browser authentication flow using X.509 user-signed certificates with Red Hat's single sign-on technology and OpenSSL.
Red Hat Developer Program Terms and Conditions
Get an overview of fixes and enhancements to the -fanalyzer static analysis pass, currently being updated for security, state tracking, and more in GCC 11.
How to enable HTTPS and SSL Termination in an already running Quarkus application in Openshift.
Learn how to restrict or limit access to applications that are federated with Keycloak for users authenticating through a third-party provider.
Learn how to integrate Red Hat's single sign-on tools version 7.4 with Red Hat Directory Server 11 (LDAP), and synchronize users and groups between the two.
Discover connection pooling, and then learn how to use Oracle's Universal Connection Pool with an Oracle RAC database in a JBoss EAP deployment.