Web Services: SOAP vs REST

There is a permanent discussion going on and I have seen quite a lot of answers. SOAP (Simple Object Access Protocol) vs. REST (Representational State Transfer) Which one to use and when? Let’s see first the main characteristics of both: S.No SOAP REST 1. SOAP stands for Simple Object Access Protocol. REST stands for Representational State Transfer. 2. SOAP is a protocol. It defines some standards that should be followed strictly. REST is an architectural style. It doesn’t define so many standards like SOAP. 3. SOAP is highly secure as it defines its own security. REST inherits security measures from the…

Read More

No Picture

FritzBox users: protect your network for free!

If you are living in Germany, Austria or Switzerland, there is a high chance that you are using one of the AVM’s FritzBox for your broadband connection. The FritzBox is a very small device which runs a PowerPC processor and between 16 and 32 MB RAM. This is almost nothing! So, you can’t install antivirus or some security solution to filter the URLs you visit via this device. There is, however, a very easy and good way to protect your network. All new models of FritzBox have the possibility to set a special DNS server which can be used for…

No Picture

Heise is offering IT Security consulting for free. But should you trust them?

        Heise created a portal for companies to assess their IT security. Details can be found here:  You don’t have to register to take part of the survey which assesses your company’s security. If you want anonymity, check this page. It is important to mention who sponsored the initiative: Sophos, Baramundi, GateProtect, Fortinet, Microsoft, Telekom and others. So, I think we can expect a not-so-independent opinion about your security standpoint. But, hey, it is better than nothing ! However, the first thing you see when you go to the page is this:   Come on Heise… you…

No Picture

Security for Free ? Die Deutsche Edition.

Source: Security Insider (HTML,  PDF) Originally published in English: (ISC)2 Blog Republished in this blog:           Wer sein Augenmerk nur auf die Anschaffungskosten einer Sicherheitslösung richtet, zahlt oft an anderer Stelle. (Bild: Archiv) Malware, Hacking-Attacken, Software-Schwachstellen: Ist es angesichts der ausufernden Bedrohungslandschaft überhaupt möglich, sich mit Security-Tools für lau umfassend abzusichern? In diesem Beitrag gehen wir dieser Frage auf den Grund. […]

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.