DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Updates to TLS in the foreseeable future

Updates to TLS in the foreseeable future

5
Comments 2
1 min read
Form validation in python made #EZ (By Yours Truly)

Form validation in python made #EZ (By Yours Truly)

5
Comments
2 min read
Cyber Security Introduction (part 5: Bruteforce)

Cyber Security Introduction (part 5: Bruteforce)

20
Comments
4 min read
What Is a Code Signing and How Does It Work?

What Is a Code Signing and How Does It Work?

3
Comments
3 min read
"Is Your React/Node App Safe? How to Detect Vulnerabilities Using OWASP Dependency-Check!"

"Is Your React/Node App Safe? How to Detect Vulnerabilities Using OWASP Dependency-Check!"

26
Comments 3
3 min read
Why should I care about Azure App Service Environment version 3?

Why should I care about Azure App Service Environment version 3?

14
Comments
1 min read
What is DevSecOps (using Heroku Flow as an example)

What is DevSecOps (using Heroku Flow as an example)

13
Comments
6 min read
20% of Django websites are vulnerable to these 3 hacks

20% of Django websites are vulnerable to these 3 hacks

34
Comments 1
3 min read
Learn Cyber Security

Learn Cyber Security

73
Comments 5
1 min read
Application Server & CORS Config

Application Server & CORS Config

4
Comments
8 min read
Integration of AWS Security Hub and kube-bench

Integration of AWS Security Hub and kube-bench

8
Comments 2
8 min read
Node.js Express Login example with MongoDB

Node.js Express Login example with MongoDB

372
Comments 5
4 min read
Share your ACM Private CA cross-account

Share your ACM Private CA cross-account

1
Comments
3 min read
Using Bcrypt with Ruby

Using Bcrypt with Ruby

9
Comments
2 min read
Hands-on AWS CloudFormation - Part 5. IAM users, groups and roles

Hands-on AWS CloudFormation - Part 5. IAM users, groups and roles

30
Comments 8
11 min read
Migrating from old authentication code in ASP.NET with Microsoft.Identity.Web and Azure AD

Migrating from old authentication code in ASP.NET with Microsoft.Identity.Web and Azure AD

8
Comments 2
5 min read
Adding SSL to a Server

Adding SSL to a Server

8
Comments
5 min read
Node.js Express Login example with MySQL database

Node.js Express Login example with MySQL database

346
Comments 2
6 min read
mnm client v0.9

mnm client v0.9

3
Comments
1 min read
Testing secure APIs by mocking JWT and JWKS

Testing secure APIs by mocking JWT and JWKS

12
Comments 1
6 min read
How encryption algorithms provide confidentiality

How encryption algorithms provide confidentiality

7
Comments
5 min read
Log in with JWT Authentication in Rails and React

Log in with JWT Authentication in Rails and React

16
Comments
4 min read
Top 20 Features of Untangle Next-Generation Firewall

Top 20 Features of Untangle Next-Generation Firewall

3
Comments
8 min read
30D2R - July: OSINT

30D2R - July: OSINT

2
Comments 2
4 min read
Building a fully Private Amazon EKS on AWS Fargate Cluster

Building a fully Private Amazon EKS on AWS Fargate Cluster

37
Comments 3
8 min read
XOR Encryption in Python3

XOR Encryption in Python3

1
Comments 1
2 min read
String & file encryption for Python developers

String & file encryption for Python developers

Comments
15 min read
Stop using the environment variables for sensitive keys in Rails

Stop using the environment variables for sensitive keys in Rails

15
Comments
4 min read
How to securely hash and store passwords in your next application

How to securely hash and store passwords in your next application

124
Comments 9
6 min read
Mistakes Were Made [Part 1]

Mistakes Were Made [Part 1]

7
Comments 1
8 min read
Security news weekly round-up - 1st January 2021

Security news weekly round-up - 1st January 2021

2
Comments
4 min read
Stupid but common security vulnerability in web app

Stupid but common security vulnerability in web app

201
Comments 3
2 min read
Adding React to a Server

Adding React to a Server

15
Comments
8 min read
Cyber Security Introduction (part 4: Denial Of Service)

Cyber Security Introduction (part 4: Denial Of Service)

14
Comments
4 min read
Internet Safety Tips

Internet Safety Tips

5
Comments 1
2 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

6
Comments
2 min read
Obfuscate AutoIt scripts from Python code

Obfuscate AutoIt scripts from Python code

1
Comments
12 min read
Security by Design - Everything you need to know, in a simple manner.

Security by Design - Everything you need to know, in a simple manner.

5
Comments 1
1 min read
Universities under attack

Universities under attack

1
Comments
4 min read
Node.js Express Login example with PostgreSQL

Node.js Express Login example with PostgreSQL

38
Comments 3
3 min read
Password generation in PowerShell Core (6+)

Password generation in PowerShell Core (6+)

5
Comments 1
2 min read
A different approach to User Sessions in Microservices using Redis

A different approach to User Sessions in Microservices using Redis

35
Comments 8
6 min read
.dev and HSTS preload - How to save 71 Bytes on every http request.

.dev and HSTS preload - How to save 71 Bytes on every http request.

5
Comments
2 min read
Hacking a GoPro WiFi Access Point

Hacking a GoPro WiFi Access Point

10
Comments
10 min read
(Part-1) Guide to Protect your Online-Self in 2021! 💻

(Part-1) Guide to Protect your Online-Self in 2021! 💻

21
Comments
5 min read
The Ultimate Yubikey

The Ultimate Yubikey

7
Comments
1 min read
A Friendly Introduction to Cybersecurity

A Friendly Introduction to Cybersecurity

95
Comments
6 min read
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

57
Comments 1
7 min read
Amazon Elastic Cloud Compute (EC2): Introduction, Benefits & How it Works!

Amazon Elastic Cloud Compute (EC2): Introduction, Benefits & How it Works!

3
Comments
5 min read
"L" is for Linux

"L" is for Linux

5
Comments
6 min read
Protect your PRIVACY from the next Cambridge Analytica 🔒🕵

Protect your PRIVACY from the next Cambridge Analytica 🔒🕵

8
Comments 3
2 min read
AWS multi-account structure with AWS Organization

AWS multi-account structure with AWS Organization

7
Comments
7 min read
Sending Emails in Django

Sending Emails in Django

7
Comments 2
2 min read
How to build a trustworthy curl pipe bash workflow

How to build a trustworthy curl pipe bash workflow

2
Comments
5 min read
Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

18
Comments 2
6 min read
How to protect your Javascript code ?

How to protect your Javascript code ?

5
Comments
15 min read
So you're the family tech support

So you're the family tech support

19
Comments 4
3 min read
Career: Cloud vs Security

Career: Cloud vs Security

2
Comments
1 min read
Using GitHub Actions and Renovate App to safely update dependencies automatically

Using GitHub Actions and Renovate App to safely update dependencies automatically

8
Comments 1
9 min read
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 2

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 2

5
Comments 3
2 min read
loading...