DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Provisioning Users and Groups for Kubernetes

Provisioning Users and Groups for Kubernetes

13
Comments 1
4 min read
Node 8: Out with the old and in with the patchable

Node 8: Out with the old and in with the patchable

10
Comments 1
5 min read
Pivotal Web Services, SSL, and a Custom Domain

Pivotal Web Services, SSL, and a Custom Domain

15
Comments
2 min read
If quantum supremacy solved factoring...

If quantum supremacy solved factoring...

3
Comments 1
1 min read
Bucket Hunting 101 - Bounties, Glory, and Fun!

Bucket Hunting 101 - Bounties, Glory, and Fun!

7
Comments
4 min read
Effective Security Programs

Effective Security Programs

14
Comments
5 min read
PAM and Using Google Authenticator on Fedora

PAM and Using Google Authenticator on Fedora

5
Comments
3 min read
Using Fortune For Studying

Using Fortune For Studying

7
Comments
2 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
Gute Gewohnheiten für sichere Internet-Nutzung

Gute Gewohnheiten für sichere Internet-Nutzung

4
Comments 1
4 min read
Jobs in Information Security (InfoSec)

Jobs in Information Security (InfoSec)

83
Comments 9
6 min read
Healthy habits for good cybersecurity

Healthy habits for good cybersecurity

69
Comments 12
4 min read
urllib3 Sustainability and Achievements in 2019

urllib3 Sustainability and Achievements in 2019

5
Comments
3 min read
Django web security checklist before deployment | Secure your Django App

Django web security checklist before deployment | Secure your Django App

276
Comments 2
4 min read
Debugging Gmail's "Suspicious link" Warnings

Debugging Gmail's "Suspicious link" Warnings

13
Comments 1
6 min read
nfstream: a flexible network data analysis framework

nfstream: a flexible network data analysis framework

11
Comments 1
2 min read
Azure Policy - Enforce location for CosmosDB

Azure Policy - Enforce location for CosmosDB

6
Comments
1 min read
Security for the front-end developer

Security for the front-end developer

209
Comments 13
4 min read
Use strong encryption and hashing algorithms in Java

Use strong encryption and hashing algorithms in Java

15
Comments 3
2 min read
Please, sell me good services

Please, sell me good services

9
Comments 4
7 min read
Examining Security with Azure

Examining Security with Azure

49
Comments
5 min read
Security Vulnerabilities in Web Apps

Security Vulnerabilities in Web Apps

10
Comments
8 min read
Security: Released npm package 📦 for Protecting CSV Injection 🚀

Security: Released npm package 📦 for Protecting CSV Injection 🚀

15
Comments 1
2 min read
SSH keys explained

SSH keys explained

71
Comments 4
11 min read
Securing HTTPS with Certificate Pinning on Android

Securing HTTPS with Certificate Pinning on Android

14
Comments
13 min read
How have I ensured the privacy and anonymity of my website users? 🤔

How have I ensured the privacy and anonymity of my website users? 🤔

121
Comments 11
3 min read
Word bugs in software documentation and how to fix them

Word bugs in software documentation and how to fix them

79
Comments 9
4 min read
Load testing mistakes; how not to save passwords; and Go's best practices

Load testing mistakes; how not to save passwords; and Go's best practices

31
Comments
2 min read
Django News - Issue 2

Django News - Issue 2

12
Comments
2 min read
JSONsty - Creating a Secure Cloud Storage Solution for JSON

JSONsty - Creating a Secure Cloud Storage Solution for JSON

10
Comments
2 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

48
Comments 2
8 min read
🤫 Secrets, environment variables & config files: the Ruby On Rails case

🤫 Secrets, environment variables & config files: the Ruby On Rails case

64
Comments 4
7 min read
Seeking any help/resources for MacOS logging using Splunk

Seeking any help/resources for MacOS logging using Splunk

3
Comments
1 min read
Demo: restrict access to Azure key vault using service endpoints

Demo: restrict access to Azure key vault using service endpoints

6
Comments
4 min read
A DSL For Seccomp Rules

A DSL For Seccomp Rules

5
Comments
3 min read
What is "enumeration" anyway?!

What is "enumeration" anyway?!

10
Comments 1
2 min read
Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

9
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
Beef up your HTTPS sites with a Content Security Policy

Beef up your HTTPS sites with a Content Security Policy

56
Comments 2
4 min read
Avoid Java serialization

Avoid Java serialization

11
Comments
2 min read
How to identify and fix open-source vulnerabilities

How to identify and fix open-source vulnerabilities

21
Comments 2
5 min read
How to use variables in bamboo for building and deploying and how to store sensitive information

How to use variables in bamboo for building and deploying and how to store sensitive information

8
Comments
2 min read
Web security 101

Web security 101

190
Comments
11 min read
KeePass: SSH keys passwords storage and decryption on Linux

KeePass: SSH keys passwords storage and decryption on Linux

18
Comments
4 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Kotlin: A Beginner's Guide and Tutorial

Kotlin: A Beginner's Guide and Tutorial

13
Comments
12 min read
Policy-Based Authorization In Angular Using JWT

Policy-Based Authorization In Angular Using JWT

16
Comments
19 min read
Password Managers are Safer and More Convenient for You

Password Managers are Safer and More Convenient for You

12
Comments 3
14 min read
Managing your Public and Private Container Registries

Managing your Public and Private Container Registries

7
Comments
2 min read
KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

11
Comments
14 min read
Configure your Java XML-parsers to prevent XXE

Configure your Java XML-parsers to prevent XXE

5
Comments
2 min read
Introduction - Episode 0 of the Your Secure Life Podcast

Introduction - Episode 0 of the Your Secure Life Podcast

9
Comments
3 min read
Chromium: Linux, keyrings && Secret Service, passwords encryption and store

Chromium: Linux, keyrings && Secret Service, passwords encryption and store

8
Comments 1
8 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Instagram Phishing Attack 2019

Instagram Phishing Attack 2019

11
Comments
4 min read
GIT Cache Helpers

GIT Cache Helpers

6
Comments
2 min read
What do HTTP and HTTPS mean and why does it matter today

What do HTTP and HTTPS mean and why does it matter today

8
Comments
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
Designing for Real-World HTTPS

Designing for Real-World HTTPS

36
Comments
9 min read
loading...