DEV Community

Carrie profile picture

Carrie

Cybersecurity Engineer | Follow Me and Learn Web Application Security Step by Step

How to Achieve Load Balancing with SafeLine WAF

How to Achieve Load Balancing with SafeLine WAF

Comments
2 min read

Want to connect with Carrie?

Create an account to connect with Carrie. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
QPS for Beginners

QPS for Beginners

10
Comments
3 min read
HTTP/3 for Beginners and How to Protect Your HTTP/3 Website

HTTP/3 for Beginners and How to Protect Your HTTP/3 Website

11
Comments
3 min read
How to Purchase a SafeLine Pro License

How to Purchase a SafeLine Pro License

15
Comments
2 min read
What each container does in SafeLine WAF

What each container does in SafeLine WAF

10
Comments
3 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
Beginner's Guide to Understanding CDN

Beginner's Guide to Understanding CDN

6
Comments
2 min read
Analysis of the Compose Configuration File for SafeLine WAF - MGT

Analysis of the Compose Configuration File for SafeLine WAF - MGT

6
Comments
2 min read
How to Simply Implement Human Machine Verification for Web Applications

How to Simply Implement Human Machine Verification for Web Applications

6
Comments
3 min read
Open Source IDS/IPS Suricata for Beginners

Open Source IDS/IPS Suricata for Beginners

6
Comments
3 min read
What is Tengine

What is Tengine

6
Comments
3 min read
How to Test Effectiveness of a WAF (Web Application Firewall)

How to Test Effectiveness of a WAF (Web Application Firewall)

6
Comments
3 min read
OpenAPI Tutorial for SafeLine WAF

OpenAPI Tutorial for SafeLine WAF

7
Comments
1 min read
SafeLine WAF: Free/Community vs Pro

SafeLine WAF: Free/Community vs Pro

11
Comments
1 min read
Why Do Website Owners Use SafeLine Community Edition?

Why Do Website Owners Use SafeLine Community Edition?

7
Comments
3 min read
Understanding Domains and Wildcard Domains: A Guide for Beginners

Understanding Domains and Wildcard Domains: A Guide for Beginners

11
Comments
3 min read
How to Encrypt HTML Code for Web Security

How to Encrypt HTML Code for Web Security

8
Comments
3 min read
How to Encrypt JavaScript Code for Web Security

How to Encrypt JavaScript Code for Web Security

7
Comments 2
3 min read
The Ultimate Guide to Understanding Blind SQL injection

The Ultimate Guide to Understanding Blind SQL injection

13
Comments
3 min read
Understanding Semantic Analysis Algorithms: A Beginner’s Guide

Understanding Semantic Analysis Algorithms: A Beginner’s Guide

14
Comments
3 min read
Turning Your Server into a High-Security Server with a Free WAF

Turning Your Server into a High-Security Server with a Free WAF

12
Comments
4 min read
Guide to Addressing “Network File Descriptor is Not Connected”

Guide to Addressing “Network File Descriptor is Not Connected”

12
Comments
3 min read
Addressing Container Errors in Containerized Apps

Addressing Container Errors in Containerized Apps

9
Comments
3 min read
The Opposite of Self-hosting: Third-Party Hosting

The Opposite of Self-hosting: Third-Party Hosting

8
Comments
3 min read
Self-Hosting: What, Why and How

Self-Hosting: What, Why and How

8
Comments
3 min read
Top 10 Web Application Security Threats

Top 10 Web Application Security Threats

12
Comments
6 min read
Recent 0day Threat Intelligence Alert from Darknet

Recent 0day Threat Intelligence Alert from Darknet

10
Comments
2 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

10
Comments
5 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

10
Comments
6 min read
Hotel Booking Data Breach of Taiwan Tourists

Hotel Booking Data Breach of Taiwan Tourists

15
Comments
3 min read
POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

14
Comments
3 min read
The Book Nook: A Website Security Crisis

The Book Nook: A Website Security Crisis

14
Comments
3 min read
The Hidden Key: A Tale of Access Control

The Hidden Key: A Tale of Access Control

16
Comments
3 min read
Automated Security Operations with Safeline WAF (Part 2)

Automated Security Operations with Safeline WAF (Part 2)

13
Comments
5 min read
Automated Security Operations with Safeline WAF (Part 1)

Automated Security Operations with Safeline WAF (Part 1)

13
Comments
4 min read
Kong API Gateway x SafeLine, an Open Source WAF

Kong API Gateway x SafeLine, an Open Source WAF

14
Comments
2 min read
Configuring the SSL protocol for Open Source SafeLine WAF

Configuring the SSL protocol for Open Source SafeLine WAF

11
Comments
2 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
The 6 Best Web Application Firewalls Compared (2024)

The 6 Best Web Application Firewalls Compared (2024)

11
Comments
4 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

11
Comments
3 min read
How to Secure Static Resources with Open Source WAF, SafeLine

How to Secure Static Resources with Open Source WAF, SafeLine

11
Comments
1 min read
Addressing Configuration Issues of SafeLine WAF

Addressing Configuration Issues of SafeLine WAF

16
Comments 1
5 min read
Open API Usage Tutorial for Open Source WAF SafeLine

Open API Usage Tutorial for Open Source WAF SafeLine

12
Comments
2 min read
Understanding Remoting and Serialization Frameworks in Web Apps

Understanding Remoting and Serialization Frameworks in Web Apps

11
Comments 1
3 min read
Understanding Encoding Schemes in Web Apps

Understanding Encoding Schemes in Web Apps

9
Comments
3 min read
Understanding Web Functionality: Server-Side, Client-Side, State, and Sessions

Understanding Web Functionality: Server-Side, Client-Side, State, and Sessions

16
Comments
4 min read
The Significance of Website Hacking

The Significance of Website Hacking

15
Comments
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests

Understanding How an Open Source WAF Monitor HTTP Requests

11
Comments
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine

Demystifying the Technology Architecture of Open Source WAF, SafeLine

12
Comments
3 min read
Black Hat Asia 2025: What You Need to Know

Black Hat Asia 2025: What You Need to Know

11
Comments
2 min read
Top 6 Free and Open Source Cybersecurity Tools for Startups

Top 6 Free and Open Source Cybersecurity Tools for Startups

17
Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

22
Comments 9
3 min read
Integrating Open Source WAF with Wazuh (Part 3)

Integrating Open Source WAF with Wazuh (Part 3)

16
Comments
2 min read
Integrating Open Source WAF with Wazuh(Part 2)

Integrating Open Source WAF with Wazuh(Part 2)

16
Comments
7 min read
How to Configure an Open Source WAF, SafeLine

How to Configure an Open Source WAF, SafeLine

16
Comments
4 min read
Integrating Open Source WAF with Wazuh(Part 1)

Integrating Open Source WAF with Wazuh(Part 1)

16
Comments
4 min read
How SafeLine WAF Prevents Data Breach like Internet Archive

How SafeLine WAF Prevents Data Breach like Internet Archive

2
Comments 1
2 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)

Deploying High Availability SafeLine WAF on K3s(Part 4)

17
Comments
4 min read
Deploying High Availability SafeLine WAF on K3s(Part 3)

Deploying High Availability SafeLine WAF on K3s(Part 3)

13
Comments
4 min read
Deploying High Availability SafeLine WAF on K3s(Part 2)

Deploying High Availability SafeLine WAF on K3s(Part 2)

13
Comments
9 min read
loading...