Chapoor Chapoor wrote:
Now where can I store this key? and still have "good" security.
Good is a relative term. You need to do a threat assessment to
identify your threats and then mitigate them until the risk level
reaches an acceptable level. I would be *very* surprised if this
included not
Hi,
Im about to set up a web application running Tomcat.
The application will handle a simple user account information, etc.
Some data will need to be encrypted before storing it into a database.
I will use AES for encryption/decryption.
A "password" will be used as a phrase/key.
Now where can