Fading Coder

One Final Commit for the Last Sprint

Building a Community Elderly Care Service System with SpringBoot and Vue

Technology Stack OverviewBackend Framework: SpringBootSpringBoot simplifies application development by embedding servers like Tomcat, Jetty, and Undertow directly into the framework. This eliminates the need for external server installation and complex configuration. The auto-configuration mechanism...

Implementing Custom Authentication Logic in Spring Security

When implementing custom authentication logic, Spring Security requires both UserDetailsService and PasswordEncoder components. A PasswordEncoder instance must be present in the application context, meaning direct instantiation is not permitted. 1. Configuration Class Setup Create a security configu...

Understanding JWT Tokens: Structure, Security, and Implementation

The Problem with Traditional Tokens When a client obtains a token from an authentication server and then uses that token to access protected resources, the resource server must verify the token's validity. The verification flow typically works as follows: The client presents the token when requestin...

Implementing Silent Token Refresh in Vue and Node.js Applications

User experience suffers when an applciation forces a logout due to an expired authentication token. Silent refresh addresses this by transparently renewing tokens in the background. Token Refresh Strategies Redis-based Token Extension A common backend-driven approach stores tokens in Redis with a co...

Kali Linux Security Testing: Authentication and Access Control Analysis

Authentication Security Assessment Authentication security assessment represents a critical component in information security, focusing on evaluating the strength of password systems and identifying vulnerabilities. Kali Linux, a specialized penetration testing platform, offers an extensive suite of...

Implementing Authentication Guards for Permission Management in NestJS

Monolithic Application Architecture Request Interception with Guards A Guard is used to intercept incoming requests and determine if they should be allowed to proceed. The logic typically allows public endpoints like login to pass through, while requiring authentication for protected routes. Creatin...

Importing Excel Data into MongoDB with Node.js

Excel Data Import Process Setting Up the Import Route Create a route handler for data upload functionality: const express = require('express'); const router = express.Router(); router.get('/upload', (request, response, next) => { response.send('Data upload endpoint'); }); module.exports = router;...

Building an Approval WeChat Mini Program: Registration and Login Pages

Project Overview The mini program is divided into two main portals: the User Portal and the Approval Portal. The User Portal allows regular users to apply for activities, check activity statuses, view activity history, request appointments, and view appointment history. The Approval Portal is split...

Android User Authentication with Login and Registration

AuthenticationActivity import androidx.appcompat.app.AppCompatActivity; import android.content.Intent; import android.os.Bundle; import android.view.View; import android.widget.EditText; import android.widget.Toast; import java.util.concurrent.ExecutorService; import java.util.concurrent.Executors;...

Implementing JWT Authentication and Authorization in Spring Boot Applications

JWT (JSON Web Token) is an open standard for securely transmitting information between parties as a JSON object. It is commonly used for authentication and authorization in web applications. Tokens can be sent via URL parameters, POST requests, or HTTP headers. The payload contains all necessary use...