A hash is a piece of text computed with a cryptographic hashing function. It is used for various purposes mainly in the security realm like securely storing sensitive information and safeguarding data integrity. In this post, we will illustrate the creation of common types of hashes in Java along with examples of using hashes for generating checksums of data files and for storing sensitive data like passwords and secrets.
This post provides an overview of some of the major libraries that are used as HTTP clients by Java applications for making HTTP calls.
Continuing the Resilience4j journey, this article on Spring Boot TimeLimiter shows when and how to use it to build resilient applications.
Asserting lists in unit tests can be painful. AssertJ provides handy support for lists that we're going to explore in this article.