...
- Encryption/decryption with AES-128 and AES-256
- Reading a key from a specific JCEKS keystore
- Generation and storage of replacement data in a Database
- Converting input data to random data based on SHA-256 hash
- Use of multiple profiles in the agent
- Error handling
- Logging
Scroll ignore | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||