{"id":5597,"date":"2015-05-25T13:33:47","date_gmt":"2015-05-25T11:33:47","guid":{"rendered":"http:\/\/blog.wenzlaff.de\/?p=5597"},"modified":"2021-11-22T17:14:32","modified_gmt":"2021-11-22T16:14:32","slug":"top-9-sicherheitshinweise-fuer-java-entwickler","status":"publish","type":"post","link":"http:\/\/blog.wenzlaff.de\/?p=5597","title":{"rendered":"TOP 9: Sicherheitshinweise f\u00fcr Java Entwickler"},"content":{"rendered":"<p><a href=\"https:\/\/www.javacodegeeks.com\/2015\/05\/9-security-mistakes-every-java-developer-must-avoid.html\">TOP 9<\/a><\/p>\n<ul>\n<li>Not Restricting Access to Classes and Variables<\/li>\n<li>Depending on Initialization<\/li>\n<li>Not Finalizing Classes<\/li>\n<li>Relying on Package Scope<\/li>\n<li>Minimize the Usage of Use Inner Classes<\/li>\n<li>Hard Coding<\/li>\n<li>Allow the Echoing Of Sensitive Data to the UI<\/li>\n<li>Not Paying Attention to Class Cloneability<\/li>\n<li>Overdoing of Serialization and Deserialization<\/li>\n<\/ul>\n<p><a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2015\/05\/top9-java-sicherheit.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2015\/05\/top9-java-sicherheit.png\" alt=\"top9-java-sicherheit\" width=\"1149\" height=\"786\" class=\"aligncenter size-full wp-image-5599\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2015\/05\/top9-java-sicherheit.png 1149w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2015\/05\/top9-java-sicherheit-300x205.png 300w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2015\/05\/top9-java-sicherheit-1024x700.png 1024w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2015\/05\/top9-java-sicherheit-900x616.png 900w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><br \/>\n<a href=\"https:\/\/www.javacodegeeks.com\/2015\/05\/9-security-mistakes-every-java-developer-must-avoid.html\">Quelle<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TOP 9 Not Restricting Access to Classes and Variables Depending on Initialization Not Finalizing Classes Relying on Package Scope Minimize the Usage of Use Inner Classes Hard Coding Allow the Echoing Of Sensitive Data to the UI Not Paying Attention to Class Cloneability Overdoing of Serialization and Deserialization Quelle<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,1319],"tags":[2084,398,2085],"class_list":["post-5597","post","type-post","status-publish","format-standard","hentry","category-java","category-sicherheit-2","tag-java-sicherheit","tag-top","tag-top-9"],"_links":{"self":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts\/5597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5597"}],"version-history":[{"count":0,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts\/5597\/revisions"}],"wp:attachment":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5597"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}