DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What the heck is SSH?

What the heck is SSH?

1
Comments
6 min read
Dynamic Permissions in React using CASL: A Guide to Secure Your App🔒

Dynamic Permissions in React using CASL: A Guide to Secure Your App🔒

1
Comments
3 min read
Passwords Are Bad UX

Passwords Are Bad UX

2
Comments 1
2 min read
Best ways to fix Nodemon error- nodemon.ps1 cannot be loaded because running scripts is disabled on this system.

Best ways to fix Nodemon error- nodemon.ps1 cannot be loaded because running scripts is disabled on this system.

8
Comments
3 min read
Securing Your Next.js Application with Strict CSP

Securing Your Next.js Application with Strict CSP

Comments
3 min read
Send SMS Directly from the Browser (No Backend Code Required!)

Send SMS Directly from the Browser (No Backend Code Required!)

Comments
10 min read
SwiftUI: a property wrapper to secure settings

SwiftUI: a property wrapper to secure settings

Comments
3 min read
Code Smell 215 - Deserializing Object Vulnerability

Code Smell 215 - Deserializing Object Vulnerability

1
Comments
2 min read
Securing Your Home Network: 9 Very Simple Steps To Help Prevent Unauthorized Access

Securing Your Home Network: 9 Very Simple Steps To Help Prevent Unauthorized Access

2
Comments
3 min read
Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

6
Comments
3 min read
SQL injection and AWS

SQL injection and AWS

2
Comments
2 min read
Injections in Stripe Search Queries and How to Prevent Them

Injections in Stripe Search Queries and How to Prevent Them

Comments
2 min read
Building Secure Software: Ten Tips for Software Developers

Building Secure Software: Ten Tips for Software Developers

1
Comments
7 min read
Supercharged Dependency Management With A Dependency Firewall

Supercharged Dependency Management With A Dependency Firewall

Comments
2 min read
How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty

How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty

6
Comments
4 min read
JWT Authentication in ASP.NET

JWT Authentication in ASP.NET

2
Comments
11 min read
Boas Práticas em Criptografia de Dados 🔐

Boas Práticas em Criptografia de Dados 🔐

1
Comments
6 min read
XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

Comments
9 min read
Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

1
Comments
2 min read
Let's discuss a Password Manager for the Apocalypse Era.

Let's discuss a Password Manager for the Apocalypse Era.

2
Comments 1
1 min read
Find out how to use Google to locate your home using just your Wi-Fi router!

Find out how to use Google to locate your home using just your Wi-Fi router!

1
Comments
4 min read
Descubra como usar o Google para localizar sua casa utilizando apenas o seu roteador Wi-Fi!

Descubra como usar o Google para localizar sua casa utilizando apenas o seu roteador Wi-Fi!

1
Comments
4 min read
Kubernetes: Storage & Security

Kubernetes: Storage & Security

Comments
11 min read
Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP)

Comments
6 min read
EC2 Metadata Server and IAM Role Credentials

EC2 Metadata Server and IAM Role Credentials

Comments
4 min read
How to Use Cross Account IAM Role

How to Use Cross Account IAM Role

Comments
2 min read
Tornado Cash Hack: 1M $ vanished ⁉️

Tornado Cash Hack: 1M $ vanished ⁉️

1
Comments
3 min read
3 Reasons Why Security is Key When Writing AWS Lambda Functions

3 Reasons Why Security is Key When Writing AWS Lambda Functions

2
Comments
2 min read
Unveiling the Enigmatic Full Stack Developer: Meet , Cyprian T. Aarons

Unveiling the Enigmatic Full Stack Developer: Meet , Cyprian T. Aarons

5
Comments
2 min read
Join the 1Password Hackathon hosted by Hashnode and compete for $10,000 in prizes

Join the 1Password Hackathon hosted by Hashnode and compete for $10,000 in prizes

14
Comments
4 min read
Social Engineering: What if the user opens backdoors to strangers?

Social Engineering: What if the user opens backdoors to strangers?

Comments
1 min read
Web Scraping vs Web Crawling: Exploring the Legality and Ethics of Data Extraction

Web Scraping vs Web Crawling: Exploring the Legality and Ethics of Data Extraction

7
Comments
6 min read
Understanding AWS IAM: Policies

Understanding AWS IAM: Policies

Comments
5 min read
Why should you use IMDSv2 and not IMDS on AWS EC2

Why should you use IMDSv2 and not IMDS on AWS EC2

Comments
2 min read
An Overview of Kubernetes Security Projects at KubeCon Europe 2023

An Overview of Kubernetes Security Projects at KubeCon Europe 2023

5
Comments
7 min read
Compose and Send a Secure Message in Minutes with DataMotion APIs

Compose and Send a Secure Message in Minutes with DataMotion APIs

Comments
3 min read
4 Essential Security Tools To Level Up Your Rails Security

4 Essential Security Tools To Level Up Your Rails Security

4
Comments
8 min read
How to Protect Software Intellectual Property Rights When Outsourcing Product Development

How to Protect Software Intellectual Property Rights When Outsourcing Product Development

4
Comments
12 min read
Never Use Credentials In A CI/CD Pipeline Again

Never Use Credentials In A CI/CD Pipeline Again

1
Comments
8 min read
🔒💡 Building a Password Generator Web Application with Flask: Secure Your Data! 🔐🚀

🔒💡 Building a Password Generator Web Application with Flask: Secure Your Data! 🔐🚀

Comments
3 min read
An Introduction to OAuth 2.0 with Node.js and Passport.js

An Introduction to OAuth 2.0 with Node.js and Passport.js

Comments
3 min read
The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

2
Comments
4 min read
Understanding JWT-Based Authentication

Understanding JWT-Based Authentication

Comments
3 min read
Securing S3 Buckets: Flaws.cloud level1

Securing S3 Buckets: Flaws.cloud level1

1
Comments
6 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

10
Comments
9 min read
LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

2
Comments
1 min read
Best Practices for Staying Safe on Public Wi-Fi Networks

Best Practices for Staying Safe on Public Wi-Fi Networks

3
Comments
4 min read
PostgreSQL 12: TLS 接続

PostgreSQL 12: TLS 接続

1
Comments
2 min read
What is Provisioning and how does it work?

What is Provisioning and how does it work?

3
Comments
2 min read
Understanding res.redirect and res.render in Express.js: Usage and Security Measures

Understanding res.redirect and res.render in Express.js: Usage and Security Measures

1
Comments
4 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

57
Comments 5
6 min read
Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

1
Comments
5 min read
Ethernaut - Lvl 4: Telephone

Ethernaut - Lvl 4: Telephone

Comments
3 min read
How to set up an SSH Bastion server in one minute

How to set up an SSH Bastion server in one minute

4
Comments
7 min read
Ethernaut - Lvl 3: Coin Flip

Ethernaut - Lvl 3: Coin Flip

Comments
4 min read
Enterprise-scaled Self-Healing StackSets

Enterprise-scaled Self-Healing StackSets

6
Comments 3
7 min read
Ethernaut - Lvl 2: Fallout

Ethernaut - Lvl 2: Fallout

Comments
3 min read
A Guide to ACID In MySQL

A Guide to ACID In MySQL

Comments
6 min read
The Ultimate Guide to Web Application Security (As a developer)

The Ultimate Guide to Web Application Security (As a developer)

Comments
4 min read
Protect your Web Apps Against DDoS Attacks by Using AWS Shield

Protect your Web Apps Against DDoS Attacks by Using AWS Shield

Comments
3 min read
loading...