Links to blogs and sites

Hacker News

UnboundID LDAP SDK for Java

cn=Directory Manager

Apache Directory Studio

A Few Thoughts on Cryptographic Engineering

Schneier on Security

The Old New Thing

Ask the Directory Services Team

Ask Premier Field Engineering (PFE) Platforms

Mark Russinovich’s Blog

KuppingerCole Blog

Security Research & Defense

midPoint open source IDM

Talking Identity


Active Directory: LDAP Syntax Filters

Windows PXE Server: SERVA 32/64

Stack Exchange Information Security

Stack Exchange Cryptography

OpenVPN downloads

Saxonica XSLT blog

Saxonica XSLT

Saxon XSLT and XQuery Processor download

Java 7 Standard Algorithm Name Documentation

Java 8 Standard Algorithm Name Documentation

Java 10 Standard Algorithm Name Documentation

Java Cryptography Architecture Oracle Providers Documentation for JDK 8

Java PKI Programmer’s Guide


Qualys SSL LABS, SSL Server Test

Pingdom Website Speed Test

GTmetrix - analyze website performance

Ivan Ristic - Blog

Scott Helme - Blog

Erreta Security - Blog

Kim Cameron’s Identity Weblog

Mozilla SSL Configuration Generator

Advanced Security Audit Policy Settings

Code Conventions for the JavaServer Pages Technology Version 1.x Language

Google Java Style

Google JavaScript Style Guide

Java How To…

Guacamole RDP/SSH/VNC over HTML5

Javamex: Tutorials and performance

Java, SQL and jOOQ.

How to query Active Directory by using a bitwise filter

Adam Bien’s Weblog

Java Crypto Roadmap

Java Releases

Java Release Highlights

The Joy of Cryptography

JavaFX course

Borg Backup

Windows Command Line Tools For Developers

Java Method Overloading and LiveConnect 3

Google Project Zero Blog

Magic of Security

Dan Kaminsky’s Blog

Aleksey Shipilëv - Download OpenJDK releases


KeyCloak resources


Troy Hunt

Favicon Generator

The Secret Security Wiki

Scott Brady


Light Blue Touchpaper

Phil Windley

Cambridge Cybercrime Centre


Cybercrime Magazine



ASN.1 tutorial

JSON to JSON Schema Generator

Generate Plain Old Java Objects from JSON or JSON-Schema

Decentralized Identifiers W3C spec

Internet Identity Workshop

Cyber Security Blog