DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Novel Optimization Algorithms: From Entertainment to Military Applications

Novel Optimization Algorithms: From Entertainment to Military Applications

Comments
1 min read
Implementing TOTP Two-Factor Authentication in .NET Web API

Implementing TOTP Two-Factor Authentication in .NET Web API

Comments
3 min read
"KQL Showdown: distinct vs project"

"KQL Showdown: distinct vs project"

Comments
1 min read
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

Comments
2 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption ๐Ÿ”

Network Security Explained: HTTPS, TLS, SSL, and Encryption ๐Ÿ”

Comments
1 min read
The Evolution of Authentication : From Passwords to Passkeys

The Evolution of Authentication : From Passwords to Passkeys

3
Comments
8 min read
VPN (Bite-size Article)

VPN (Bite-size Article)

Comments
8 min read
Security news weekly round-up - 14th February 2025

Security news weekly round-up - 14th February 2025

1
Comments
4 min read
Running Ollama in a Container Without Internet Access

Running Ollama in a Container Without Internet Access

Comments
3 min read
The Business Impact of Container Security: Beyond the Basics

The Business Impact of Container Security: Beyond the Basics

Comments
3 min read
API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

6
Comments
3 min read
How JWT, JWS, and JWE Secure Your Data?

How JWT, JWS, and JWE Secure Your Data?

1
Comments
4 min read
Telegram Boosts User Experience with Improved Technology

Telegram Boosts User Experience with Improved Technology

Comments
1 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

1
Comments
2 min read
Why โ€œThink Like an Attackerโ€ is harmful FT: Threat Modeling?

Why โ€œThink Like an Attackerโ€ is harmful FT: Threat Modeling?

Comments
2 min read
How note.com ๐Ÿ”– Implements โณ Just-in-Time (JIT) Database Access Control ๐Ÿ—๏ธ with Bytebase

How note.com ๐Ÿ”– Implements โณ Just-in-Time (JIT) Database Access Control ๐Ÿ—๏ธ with Bytebase

6
Comments
4 min read
Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Comments
1 min read
JWT in Action: Secure Authentication & Authorization in Go

JWT in Action: Secure Authentication & Authorization in Go

5
Comments
9 min read
Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

4
Comments
2 min read
CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

Comments
2 min read
How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

Comments
2 min read
๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

Comments
1 min read
FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

Comments
2 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
3 min read
loading...