DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

Comments
2 min read
Complete Guide to AWS VPC Endpoints and PrivateLink: Making AWS Services Private! ๐Ÿš€

Complete Guide to AWS VPC Endpoints and PrivateLink: Making AWS Services Private! ๐Ÿš€

Comments
2 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption ๐Ÿ”

Network Security Explained: HTTPS, TLS, SSL, and Encryption ๐Ÿ”

Comments
1 min read
The Evolution of Authentication : From Passwords to Passkeys

The Evolution of Authentication : From Passwords to Passkeys

3
Comments
8 min read
VPN (Bite-size Article)

VPN (Bite-size Article)

Comments
8 min read
Security news weekly round-up - 14th February 2025

Security news weekly round-up - 14th February 2025

1
Comments
4 min read
Running Ollama in a Container Without Internet Access

Running Ollama in a Container Without Internet Access

Comments
3 min read
The Business Impact of Container Security: Beyond the Basics

The Business Impact of Container Security: Beyond the Basics

Comments
3 min read
API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

6
Comments
3 min read
How JWT, JWS, and JWE Secure Your Data?

How JWT, JWS, and JWE Secure Your Data?

1
Comments
4 min read
Telegram Boosts User Experience with Improved Technology

Telegram Boosts User Experience with Improved Technology

Comments
1 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

1
Comments
2 min read
Why โ€œThink Like an Attackerโ€ is harmful FT: Threat Modeling?

Why โ€œThink Like an Attackerโ€ is harmful FT: Threat Modeling?

Comments
2 min read
How note.com ๐Ÿ”– Implements โณ Just-in-Time (JIT) Database Access Control ๐Ÿ—๏ธ with Bytebase

How note.com ๐Ÿ”– Implements โณ Just-in-Time (JIT) Database Access Control ๐Ÿ—๏ธ with Bytebase

6
Comments
4 min read
Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Comments
1 min read
JWT in Action: Secure Authentication & Authorization in Go

JWT in Action: Secure Authentication & Authorization in Go

5
Comments
9 min read
Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

4
Comments
2 min read
CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

Comments
2 min read
How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

Comments
2 min read
๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

Comments
1 min read
FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

Comments
2 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
3 min read
Importance of Timely Security Patching in Software Maintenance

Importance of Timely Security Patching in Software Maintenance

Comments
2 min read
Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Comments
3 min read
loading...