DEV Community

# security

Posts

👋 Sign in for the ability sort posts by top and latest.
C# Is A Vulnerable Programming LanguageđŸš©

C# Is A Vulnerable Programming LanguageđŸš©

Reactions 8 Comments
5 min read
Beginning Cyber-Security practice.

Beginning Cyber-Security practice.

Reactions 2 Comments
1 min read
PwnKit: PrivESC flaw in Linux

PwnKit: PrivESC flaw in Linux

Reactions 2 Comments
3 min read
Raising the Bar on Security by Purging Credentials From the Cloud

Raising the Bar on Security by Purging Credentials From the Cloud

Reactions 2 Comments 1
7 min read
Best practices: 5 Risks to Assess for a Secure CI Pipeline

Best practices: 5 Risks to Assess for a Secure CI Pipeline

Reactions 2 Comments
6 min read
How to Disable Autofill in «Google Chrome»?

How to Disable Autofill in «Google Chrome»?

Reactions 2 Comments
4 min read
BotenaGo botnet leaked to github

BotenaGo botnet leaked to github

Reactions 3 Comments
1 min read
What Are Errors 400, 403, 404, 500, 502, 503 and How to Fix Them?

What Are Errors 400, 403, 404, 500, 502, 503 and How to Fix Them?

Reactions 1 Comments
8 min read
Differences between Amazon ECR and Inspector image scanning capabilities

Differences between Amazon ECR and Inspector image scanning capabilities

Reactions 4 Comments
6 min read
AdSense Protector - invalid click, click bombing and invalid traffic

AdSense Protector - invalid click, click bombing and invalid traffic

Reactions 4 Comments
1 min read
The Difference Between NTFS, FAT, FAT32 and ExFAT File Systems

The Difference Between NTFS, FAT, FAT32 and ExFAT File Systems

Reactions 5 Comments
6 min read
Top Tools to Recover Data From an HFS+ Drive

Top Tools to Recover Data From an HFS+ Drive

Reactions 2 Comments
6 min read
The Error «A Disk Read Error Occurred» or «BOOTMGR is Missing» – How to Fix

The Error «A Disk Read Error Occurred» or «BOOTMGR is Missing» – How to Fix

Reactions 4 Comments
2 min read
Why syncing .env files doesn’t scale for secrets management

Why syncing .env files doesn’t scale for secrets management

Reactions 9 Comments
9 min read
Create and Restore Archived Files in Windows 10

Create and Restore Archived Files in Windows 10

Reactions 2 Comments
3 min read
5 Open Source Security Tools All Developers Should Know About

5 Open Source Security Tools All Developers Should Know About

Reactions 27 Comments 1
6 min read
Security and Correctness: two different concepts.

Security and Correctness: two different concepts.

Reactions 5 Comments
4 min read
Vulnerability scanning for Docker images

Vulnerability scanning for Docker images

Reactions 5 Comments
9 min read
How to Partition a Hard Disk in Windows 10

How to Partition a Hard Disk in Windows 10

Reactions 2 Comments
4 min read
Hack Solidity: Block Timestamp Manipulation

Hack Solidity: Block Timestamp Manipulation

Reactions 6 Comments
2 min read
How to use AWS SSM Session Manager Plugin

How to use AWS SSM Session Manager Plugin

Reactions 6 Comments
2 min read
What is SSH and why should you use it?

What is SSH and why should you use it?

Reactions 4 Comments
5 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

Reactions 7 Comments
1 min read
Kubernetes Hardening Tutorial Part 2: Network

Kubernetes Hardening Tutorial Part 2: Network

Reactions 5 Comments
8 min read
Modern Techniques to Prevent Malware instead of Detecting It

Modern Techniques to Prevent Malware instead of Detecting It

Reactions 5 Comments
26 min read
How I Luckily Crashed Vim in 5 Minutes

How I Luckily Crashed Vim in 5 Minutes

Reactions 3 Comments
3 min read
A quick auth0/express/heroku setup

A quick auth0/express/heroku setup

Reactions 5 Comments 1
1 min read
Setup Vault in HA with MySQL backend in 10 minutes | Hashicorp | Tutorial | Tharun

Setup Vault in HA with MySQL backend in 10 minutes | Hashicorp | Tutorial | Tharun

Reactions 6 Comments 1
3 min read
Set up Yubikey for Passwordless Sudo Authentication

Set up Yubikey for Passwordless Sudo Authentication

Reactions 8 Comments 3
2 min read
8 ways to become a BETTER SRE ( Right now! ) | 8 non-technical characteristics to have

8 ways to become a BETTER SRE ( Right now! ) | 8 non-technical characteristics to have

Reactions 8 Comments
5 min read
Treat security as a risk

Treat security as a risk

Reactions 4 Comments 1
4 min read
Hack Solidity: Self Destruct

Hack Solidity: Self Destruct

Reactions 5 Comments
2 min read
Securing a REST API with Spring Security and JWT

Securing a REST API with Spring Security and JWT

Reactions 3 Comments
5 min read
How to get a job as a AWS Pentester?

How to get a job as a AWS Pentester?

Reactions 2 Comments
4 min read
Diskpart: Recovering a Memory Card, a USB Flash Drive or a Hard Disk

Diskpart: Recovering a Memory Card, a USB Flash Drive or a Hard Disk

Reactions 6 Comments
3 min read
A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483)

A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483)

Reactions 3 Comments
1 min read
Log4j 2.17.0 ă«é–ąă‚ă‚‹æ–°ăŸăȘ RCE è„†ćŒ±æ€§ (CVE-2021-4483)

Log4j 2.17.0 ă«é–ąă‚ă‚‹æ–°ăŸăȘ RCE è„†ćŒ±æ€§ (CVE-2021-4483)

Reactions 3 Comments
1 min read
Configurar alertas en Database Migration Service

Configurar alertas en Database Migration Service

Reactions 2 Comments
5 min read
Ethernaut Level 2: Fallout Tutorial

Ethernaut Level 2: Fallout Tutorial

Reactions 4 Comments
1 min read
A Serverless API to validate AWS Access Keys based on AWS SAM

A Serverless API to validate AWS Access Keys based on AWS SAM

Reactions 6 Comments
9 min read
Setting up iDRAC 6 with Let's Encrypt SSL Certificates

Setting up iDRAC 6 with Let's Encrypt SSL Certificates

Reactions 2 Comments
1 min read
Running Docker Bench for Security to hardened your docker host and improve security

Running Docker Bench for Security to hardened your docker host and improve security

Reactions 6 Comments
10 min read
Why is security important in infrastructure as code ?

Why is security important in infrastructure as code ?

Reactions 20 Comments
3 min read
18 ways to ATTACK a Vault server | Production hardening | Tharun

18 ways to ATTACK a Vault server | Production hardening | Tharun

Reactions 7 Comments
1 min read
Hack Solidity: Visibilities

Hack Solidity: Visibilities

Reactions 6 Comments
2 min read
Why NOT TO Ship NodeJS Containers With NPM?

Why NOT TO Ship NodeJS Containers With NPM?

Reactions 5 Comments
2 min read
How the Signed URL works?

How the Signed URL works?

Reactions 6 Comments
3 min read
Privacy and confidentiality in security testing

Privacy and confidentiality in security testing

Reactions 3 Comments
5 min read
Hack Solidity: Tx Origin Attacks

Hack Solidity: Tx Origin Attacks

Reactions 5 Comments
2 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

Reactions 5 Comments
6 min read
Java JSON deserialization problems with the Jackson ObjectMapper

Java JSON deserialization problems with the Jackson ObjectMapper

Reactions 5 Comments
5 min read
Enforcing compliance with AWS CDK Aspects

Enforcing compliance with AWS CDK Aspects

Reactions 18 Comments
4 min read
I show you how to Crack a .NET Application (3 clicks)

I show you how to Crack a .NET Application (3 clicks)

Reactions 122 Comments 4
8 min read
Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 2/2)

Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 2/2)

Reactions 5 Comments
3 min read
Encoding, Hashing e Encryption: Qual a diferença?

Encoding, Hashing e Encryption: Qual a diferença?

Reactions 18 Comments
5 min read
Web-Security for Developers: Cross-Site Scripting (XSS)

Web-Security for Developers: Cross-Site Scripting (XSS)

Reactions 11 Comments
3 min read
Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 1/2)

Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 1/2)

Reactions 5 Comments
2 min read
Integer Overflow and Underflow in Solidity

Integer Overflow and Underflow in Solidity

Reactions 6 Comments
2 min read
DevSecOps and Shift Left Security: A Guide

DevSecOps and Shift Left Security: A Guide

Reactions 7 Comments
9 min read
Detect Marak Squires packages with NodeSecure

Detect Marak Squires packages with NodeSecure

Reactions 11 Comments 1
1 min read
loading...