Using Maven to package and then deploy Ember-CLI assets as a WAR
Created at: 2014-10-17 14:21:44 UTC
Updated on: 2014-10-17 14:38:33 UTC
Recently I was asked to develop an EmberJS application for a client and one of the requirements was that the application needs to be deployed, much to my dismay, on WebLogic. I tried explaining to the client that they were better off deploying the Ember’s static assets on a separate Apache webserver, or even filtering the requests under Embers base route to an Apache on the same server. However, this was for a Java shop and I was told the application had to follow their standard deploy process. And so I began! First I created a WEB-INF in the root of my Ember-CLI directory with an empty web.xml & a simple weblogic.xml with a context root for the ember application.Web.xml <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN" "http://java.sun.com/dtd/web-app_2_3.dtd"><web-app></web-app>Weblogic.xml <!DOCTYPE weblogic-web-app PUBLIC "-//BEA Systems, Inc.//DTD Web Application 8.1//EN" "http://www.bea.com/servers/wls810/dtd/weblogic-web-jar.dtd"><we...
maven ember emberjs ember-cli cli package deploy weblogic WAR java
Installing Gradle with Eclipse 3.8 & Tomcat 7
Created at: 2014-08-14 00:41:00 UTC
Updated on: 2014-09-25 01:45:25 UTC
Today I was trying to setup a fresh Ubuntu VM with a new installation of Eclipse & Gradle for some Spring development and I ran into a hardstop. After installing Eclipse (using the official packages from the Ubuntu Software Center) I tried to install Gradle and was met with a nasty conflict on libtomcat6-java (resolving which would meant uninstalling Eclipse & a few other packages that rely on tomcat-7). Tracing the bug back, it was originally a problem with a Gradle dependency. The Gradle team took care of it pretty fast, however another Gradle dependency, Jetty, still has a tomcat-6 dependency with the latest build in the official repos. Messy, messy, messy. Fortunately, Jetty has migrated to tomcat-7 in the latest build you can grab here. If you're in a hurry and don't want to build from source, just grab libjetty-java_6.1.26-3_all.deb and libjetty-extra-java_6.1.26-3_all.deb under built files & install with Ubuntu Software Center. From there it should just be ...
Searching for Truth in TrueCrypt
Created at: 2014-05-30 15:24:23 UTC
Updated on: 2014-09-25 01:45:25 UTC
What happens when one of the most trusted and, arguably, the most enigmatic security programs shutters its door within a warning? In today’s NSA-phobia fueled privacy renaissance... about what you’d expect. TrueCrypt is a (sort-of*) open source tool which offered several methods of personal hard drive encryption as well as several methods of obfuscation. For example, users can also add encrypted volumes to their existing hard drive which are hidden to give users ‘plausible deniablility’ in the case of punching-bag decryption. Its originates in 2004, when it was released by a team of anonymous developers who called themselves the “TrueCrypt Foundation”. Since then it has had a steady stream of updates, despite occasional controversy and legal problems when Brazilian bankers encrypt their files to hide financial fraud. After ten years the identity of TrueCrypt’s developers is still a mystery. TrueCrypt’s offers ...
Cyber Acoustics- Attack Vector of the Moment
Created at: 2014-02-12 04:25:44 UTC
Updated on: 2014-09-25 01:45:25 UTC
About two months ago the net security community started to hearing some strange things about another well-known security researcher who also claimed to be hearing strange things. That guy was Dragos Ruiu, and he was hearing his machines talk to eachother. Not over the the internet or any audible band, he was claiming that a hyper-futuristic malware had infected his security lab, was hiding in the machines’ BIOS, and was communicating through audio to other infected, air-gapped (no networking) computers to re-propagate the virus if it had been removed. There are a few really big claims in that statement: 1. the machines are being infected at the BIOS level 2. the malware is infecting different machines at the BIOS level (he claims it has infected at least a Windows machine and a BSD machine of different makes) 3. the malware can communicate using high frequency sounds from standard computer speakers/microphones Any one of those claims would be a attribute of a we...