DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Stop Storing Passwords. You Don't Need Them.

Stop Storing Passwords. You Don't Need Them.

17
Comments
6 min read
A tale of checksums and client-side security🙀

A tale of checksums and client-side security🙀

34
Comments
6 min read
How to harden Ubuntu 16.04 Server security

How to harden Ubuntu 16.04 Server security

6
Comments 3
3 min read
Bitwarden: shared MFA TOTP codes for Gmail accounts

Bitwarden: shared MFA TOTP codes for Gmail accounts

6
Comments 1
3 min read
SSHBlack - Securing open linux servers

SSHBlack - Securing open linux servers

16
Comments 2
2 min read
Quick Tips to Harden SSH on Ubuntu

Quick Tips to Harden SSH on Ubuntu

9
Comments
6 min read
I Have Nothing to Hide Fallacy

I Have Nothing to Hide Fallacy

10
Comments
9 min read
How do you keep track of your passwords?

How do you keep track of your passwords?

4
Comments 2
3 min read
A simple way to detect devtools.

A simple way to detect devtools.

16
Comments 14
1 min read
Integrate an ASP.NET Core Web App with Azure Key Vault

Integrate an ASP.NET Core Web App with Azure Key Vault

8
Comments
17 min read
Enabling HTTP/2 in Apache on Ubuntu

Enabling HTTP/2 in Apache on Ubuntu

6
Comments
2 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
Created Go library to acquire and manage blacklists of IP addresses and domain names

Created Go library to acquire and manage blacklists of IP addresses and domain names

19
Comments
4 min read
How to earn money as a bug bounty hunter

How to earn money as a bug bounty hunter

10
Comments
1 min read
9 Evil Bash Commands Explained

9 Evil Bash Commands Explained

855
Comments 69
7 min read
★ Handling CORS in a Laravel application

★ Handling CORS in a Laravel application

8
Comments
4 min read
★ Using Content Security Policy headers in a Laravel app

★ Using Content Security Policy headers in a Laravel app

5
Comments
4 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
Provisioning Users and Groups for Kubernetes

Provisioning Users and Groups for Kubernetes

13
Comments 1
4 min read
Node 8: Out with the old and in with the patchable

Node 8: Out with the old and in with the patchable

10
Comments 1
5 min read
Pivotal Web Services, SSL, and a Custom Domain

Pivotal Web Services, SSL, and a Custom Domain

15
Comments
2 min read
If quantum supremacy solved factoring...

If quantum supremacy solved factoring...

3
Comments 1
1 min read
Bucket Hunting 101 - Bounties, Glory, and Fun!

Bucket Hunting 101 - Bounties, Glory, and Fun!

7
Comments
4 min read
Effective Security Programs

Effective Security Programs

14
Comments
5 min read
PAM and Using Google Authenticator on Fedora

PAM and Using Google Authenticator on Fedora

5
Comments
3 min read
Using Fortune For Studying

Using Fortune For Studying

7
Comments
2 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
Gute Gewohnheiten für sichere Internet-Nutzung

Gute Gewohnheiten für sichere Internet-Nutzung

4
Comments 1
4 min read
Jobs in Information Security (InfoSec)

Jobs in Information Security (InfoSec)

83
Comments 9
6 min read
Healthy habits for good cybersecurity

Healthy habits for good cybersecurity

69
Comments 12
4 min read
urllib3 Sustainability and Achievements in 2019

urllib3 Sustainability and Achievements in 2019

5
Comments
3 min read
Django web security checklist before deployment | Secure your Django App

Django web security checklist before deployment | Secure your Django App

276
Comments 2
4 min read
Debugging Gmail's "Suspicious link" Warnings

Debugging Gmail's "Suspicious link" Warnings

13
Comments 1
6 min read
nfstream: a flexible network data analysis framework

nfstream: a flexible network data analysis framework

11
Comments 1
2 min read
Azure Policy - Enforce location for CosmosDB

Azure Policy - Enforce location for CosmosDB

6
Comments
1 min read
Security for the front-end developer

Security for the front-end developer

209
Comments 13
4 min read
Use strong encryption and hashing algorithms in Java

Use strong encryption and hashing algorithms in Java

15
Comments 3
2 min read
Please, sell me good services

Please, sell me good services

9
Comments 4
7 min read
Examining Security with Azure

Examining Security with Azure

49
Comments
5 min read
Security Vulnerabilities in Web Apps

Security Vulnerabilities in Web Apps

10
Comments
8 min read
Security: Released npm package 📦 for Protecting CSV Injection 🚀

Security: Released npm package 📦 for Protecting CSV Injection 🚀

15
Comments 1
2 min read
SSH keys explained

SSH keys explained

71
Comments 4
11 min read
Securing HTTPS with Certificate Pinning on Android

Securing HTTPS with Certificate Pinning on Android

14
Comments
13 min read
How have I ensured the privacy and anonymity of my website users? 🤔

How have I ensured the privacy and anonymity of my website users? 🤔

121
Comments 11
3 min read
Word bugs in software documentation and how to fix them

Word bugs in software documentation and how to fix them

79
Comments 9
4 min read
Load testing mistakes; how not to save passwords; and Go's best practices

Load testing mistakes; how not to save passwords; and Go's best practices

31
Comments
2 min read
Django News - Issue 2

Django News - Issue 2

12
Comments
2 min read
JSONsty - Creating a Secure Cloud Storage Solution for JSON

JSONsty - Creating a Secure Cloud Storage Solution for JSON

10
Comments
2 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

48
Comments 2
8 min read
🤫 Secrets, environment variables & config files: the Ruby On Rails case

🤫 Secrets, environment variables & config files: the Ruby On Rails case

64
Comments 4
7 min read
Seeking any help/resources for MacOS logging using Splunk

Seeking any help/resources for MacOS logging using Splunk

3
Comments
1 min read
Demo: restrict access to Azure key vault using service endpoints

Demo: restrict access to Azure key vault using service endpoints

6
Comments
4 min read
A DSL For Seccomp Rules

A DSL For Seccomp Rules

5
Comments
3 min read
What is "enumeration" anyway?!

What is "enumeration" anyway?!

10
Comments 1
2 min read
Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

9
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
Beef up your HTTPS sites with a Content Security Policy

Beef up your HTTPS sites with a Content Security Policy

56
Comments 2
4 min read
Avoid Java serialization

Avoid Java serialization

11
Comments
2 min read
How to identify and fix open-source vulnerabilities

How to identify and fix open-source vulnerabilities

21
Comments 2
5 min read
loading...