DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
5 things to consider before developing a web application

5 things to consider before developing a web application

7
Comments
4 min read
Enforce security best practices in your AWS environment with AWS Config

Enforce security best practices in your AWS environment with AWS Config

3
Comments 4
8 min read
SSH and SCP with AWS SSM

SSH and SCP with AWS SSM

10
Comments 2
3 min read
Is there anything I should know about cookies as both webdev and end-user?

Is there anything I should know about cookies as both webdev and end-user?

6
Comments 2
1 min read
How to Automate Cyber Defense Without Paying a Dime

How to Automate Cyber Defense Without Paying a Dime

16
Comments
5 min read
Best Practices for Secure Session Management in Node

Best Practices for Secure Session Management in Node

99
Comments 2
8 min read
Analyzing Magecart Malware – From Zero to Hero

Analyzing Magecart Malware – From Zero to Hero

32
Comments 2
10 min read
Cyber wars: Defending your server

Cyber wars: Defending your server

38
Comments 4
4 min read
Hardening Craft CMS Permissions

Hardening Craft CMS Permissions

5
Comments
11 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
My Research paper on the 2017 Equifax Breach and potential AWS solutions

My Research paper on the 2017 Equifax Breach and potential AWS solutions

3
Comments
1 min read
Android Hack

Android Hack

2
Comments 1
2 min read
THIS IS UNSAFE (and a Bad Idea)

THIS IS UNSAFE (and a Bad Idea)

14
Comments 3
1 min read
How do you maintain your security and privacy?

How do you maintain your security and privacy?

8
Comments
2 min read
SkyHole: Privacy In A Digital Age

SkyHole: Privacy In A Digital Age

9
Comments
5 min read
IAM Policy to list an S3 bucket, except for the top-level (root) of the bucket

IAM Policy to list an S3 bucket, except for the top-level (root) of the bucket

10
Comments
3 min read
0x00SEC CTF - Exercise #1

0x00SEC CTF - Exercise #1

48
Comments 2
5 min read
Protect your network resources with Azure Firewall

Protect your network resources with Azure Firewall

16
Comments
5 min read
To avoid being tracked, browse in multiverses

To avoid being tracked, browse in multiverses

73
Comments 6
4 min read
Lessons learned from surviving an application attack

Lessons learned from surviving an application attack

5
Comments 2
7 min read
Threat Modeling for Beginners

Threat Modeling for Beginners

19
Comments
5 min read
Securing and Storing Passwords

Securing and Storing Passwords

54
Comments 2
3 min read
Should email re-confirmation be a thing?

Should email re-confirmation be a thing?

6
Comments 2
1 min read
Force HTTPS for AWS EB behind a Load Balancer

Force HTTPS for AWS EB behind a Load Balancer

9
Comments 6
4 min read
Decoupling Ansible Secrets with Azure Key Vault

Decoupling Ansible Secrets with Azure Key Vault

48
Comments 2
11 min read
Fortifying your DigitalOcean Droplet

Fortifying your DigitalOcean Droplet

7
Comments
5 min read
What's Your Favourite tools?

What's Your Favourite tools?

10
Comments 1
5 min read
Generate Password Protected PDF in Ruby on Rails with WickedPDF.

Generate Password Protected PDF in Ruby on Rails with WickedPDF.

20
Comments 1
3 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

13
Comments 1
4 min read
Dealing with CORS

Dealing with CORS

393
Comments 14
4 min read
A commenting system that is easy to self-host (and completely free)

A commenting system that is easy to self-host (and completely free)

6
Comments 1
1 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Lab HashStack - Part 2

Lab HashStack - Part 2

5
Comments
2 min read
How to Upgrade From Windows 7 to Linux

How to Upgrade From Windows 7 to Linux

9
Comments
5 min read
Regula: Validate Terraform for Policy Compliance with Open Policy Agent

Regula: Validate Terraform for Policy Compliance with Open Policy Agent

8
Comments
8 min read
Simple Access Control in Vaadin

Simple Access Control in Vaadin

9
Comments
7 min read
Safeguard your blog content in Reactjs and CSS

Safeguard your blog content in Reactjs and CSS

12
Comments 3
5 min read
Port Swigger Academy CTF - Validation of CSRF token depends on request method

Port Swigger Academy CTF - Validation of CSRF token depends on request method

13
Comments
3 min read
How to Validate Credit Card Numbers using Luhn's Algorithm

How to Validate Credit Card Numbers using Luhn's Algorithm

7
Comments
3 min read
Secure AWS Environments by deploying apps in Private/Public Subnets

Secure AWS Environments by deploying apps in Private/Public Subnets

10
Comments
10 min read
Why We should care about Floating-Point Numbers?

Why We should care about Floating-Point Numbers?

20
Comments 1
2 min read
Why PE needs Original First Thunk(OFT)?

Why PE needs Original First Thunk(OFT)?

6
Comments
2 min read
Designing Effective Peer to Peer Networks

Designing Effective Peer to Peer Networks

14
Comments
14 min read
How do you convince clients that security is not an option?

How do you convince clients that security is not an option?

5
Comments 4
2 min read
What a developer needs to know about 2FA

What a developer needs to know about 2FA

16
Comments
6 min read
Let Google do Secret Management

Let Google do Secret Management

7
Comments 1
4 min read
Security: How to secure your VPS server

Security: How to secure your VPS server

16
Comments
2 min read
JavaScript frameworks security report 2019

JavaScript frameworks security report 2019

78
Comments 1
4 min read
A collection of my favorites DNS servers

A collection of my favorites DNS servers

49
Comments 3
2 min read
How To Validate GitHub Webhooks With Laravel and PHP

How To Validate GitHub Webhooks With Laravel and PHP

17
Comments 2
3 min read
Securing Windows Server 2019

Securing Windows Server 2019

4
Comments 2
2 min read
Stuffing of Credentials?

Stuffing of Credentials?

17
Comments 6
3 min read
The Secret: Kubernetes Secrets and AWS SSM

The Secret: Kubernetes Secrets and AWS SSM

6
Comments 1
1 min read
Hide your f🤬🤬king API keys and credentials from versioned code

Hide your f🤬🤬king API keys and credentials from versioned code

142
Comments 9
2 min read
Securing WordPress

Securing WordPress

12
Comments
3 min read
Secure Data Lake with AWS Lake Formation Tutorial

Secure Data Lake with AWS Lake Formation Tutorial

7
Comments 1
4 min read
Angular Security Checklist

Angular Security Checklist

91
Comments 1
1 min read
#Hash Vs Encryption?

#Hash Vs Encryption?

14
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Finding exposed .git repositories

Finding exposed .git repositories

11
Comments 5
3 min read
loading...