There are three inheritance mapping strategies in hibernate:

  1. Single Table Per Class: Only one table is created for all the classes involved in hierarchy. Here we maintain an extra discriminator field in table to differentiate between the tables.
  2. Table Per Subclass: One table for each class is created. The above hierarchy gets three tables. Here, foreign key is maintained between the tables.
  3. Table Per Concrete Class: One table for each concrete class (subclass) is created but not of super class. The above hierarchy gets two tables. As a special case, the super class can be an abstract or interface. …

Well, Nginx A Linux based fastest web server across the globe. Yes, you heard right. Today we will see the most important security considerations that can make your nginx server more secure and safer.

Nginx is a web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.

Step 1. Disable Any Unwanted nginx Modules

When you install nginx, it automatically includes many modules. Currently, you cannot choose modules at runtime. To disable certain modules, you need to recompile nginx. …


Their are various aspects when we plan to deploy our containerised application into a real production environment. so to go ahead with that we need to ensure weather the underlying environment is following a compliance to security policy. So lets start from the scratch…

What Exactly Happen When you hit container run:

it creates a set of namespaces and control groups for the container. Namespaces provide the first and most straightforward form of isolation: processes running within a container cannot see, and even less affect, processes running in another container, or in the host system. same as LXC ( now…


Hello Folks, This is friday. Today we will discuss how we can secure our rest api against various attacks. You might already know that these attacks are very harmful and you need to make your application (or API) secure, as much as you can. But how exactly…?

Their are DOS Attacks, XSS, SQL/NoSQL Injection Attacks.

You might already know that these attacks are very harmful and you need to make your application (or API) secure, as much as you can. But how exactly?

Denial-Of-Service (DOS) Attacks

DOS Attack will crash / shut down a network, or machine, making it inaccessible. Which means users…


GOAL: in this article we will start two node Docker Swarm Cluster and go over commands to manage multiple nodes. We will put a detailed glance on topics 1) starting the Swarm 2) viewing Swarm status 3) joining the Swarm 4) obtaining join-tokens 5) Run Containers with replication 6) Response to fail-over

System Requirements

Considering we will do this LAB on Windows System. On this System we will Install Chocolatey + Vagrant + Install Virtualbox.

Open PowerShell as a Administrator:

Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))

Restart The Powershell with administrator privileges.

choco install virtualbox vagrant --yes
mkdir DockerSwarmCluster && cd…


GOAL: The aws-cli is a neat and handy command line tool from which management of AWS-services is way more faster. Therefore, this blog focuses on the usage of aws-cli. Within in this post, I’ll explain to you how to setup the aws-cli and create a Cli user for programmatic access.

Why Should we use AWS CLI / Benefits:

1) You can develop shell scripts to manage resources
2) You have direct access to the AWS services’ public APIs.
3) You can use all of the functionality provided by the AWS Management Console. …

Gaurav Talele

An ambitious Full Stack evangelist in Angular, Typescript, Spring Boot Node JS, C#, Dot Net Core WEB API, MS SQL, Redis, MongoDB, RabbitMQ, Docker and AWS.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store