Hayden Hudson
Posts
Use Docker in your APEX Dev

Use Docker to localize your dev environment and eliminate version control headaches!

Use Docker in your APEX Devmore_vert
Use Docker in your APEX Devclose

Use Docker to localize your dev environment and eliminate version control headaches!

Run APEX with Docker in 4 easy steps

I cover the details of running the latest version of APEX from scratch on your computer, using Docker.

Run APEX with Docker in 4 easy stepsmore_vert
Run APEX with Docker in 4 easy stepsclose

I cover the details of running the latest version of APEX from scratch on your computer, using Docker.

How to secure an APEX application against SQL Injection

A handy summary of some of the main strategies

How to secure an APEX application against SQL Injectionmore_vert
How to secure an APEX application against SQL Injectionclose

A handy summary of some of the main strategies

The dangers of 'Inappropriate Use of Substitution Syntax' errors

I use SQLMAP to exploit an ‘Inappropriate Use of Substitution Syntax’ warning identified by Oracle APEX (application express) advisor.

The dangers of 'Inappropriate Use of Substitution Syntax' errorsmore_vert
The dangers of 'Inappropriate Use of Substitution Syntax' errorsclose

I use SQLMAP to exploit an ‘Inappropriate Use of Substitution Syntax’ warning identified by Oracle APEX (application express) advisor.

Let's Encrypt: Oracle Linux

TLS encrypt your website for free with Let's Encrypt

Let's Encrypt: Oracle Linuxmore_vert
Let's Encrypt: Oracle Linuxclose

TLS encrypt your website for free with Let's Encrypt

Interactive Demo of the RSA Algorithm

Sometimes being able to fiddle with the numbers and see the math can be helpful

Interactive Demo of the RSA Algorithmmore_vert
Interactive Demo of the RSA Algorithmclose

Sometimes being able to fiddle with the numbers and see the math can be helpful

Explaining SSL/TLS using Game of Thrones

Our favorite characters are having trouble keeping their messages private - what can the system of SSL/TLS encryption offer them?

Explaining SSL/TLS using Game of Thronesmore_vert
Explaining SSL/TLS using Game of Thronesclose

Our favorite characters are having trouble keeping their messages private - what can the system of SSL/TLS encryption offer them?

1 - 7