DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Build HTML Forms Right: Security

How to Build HTML Forms Right: Security

112
Comments 4
21 min read
A stateless token case study: Algolia search API

A stateless token case study: Algolia search API

9
Comments
4 min read
Authorization, Authentication of apps and APIs made easy with Auth0

Authorization, Authentication of apps and APIs made easy with Auth0

39
Comments 1
2 min read
SQL Injection

SQL Injection

4
Comments
2 min read
How To Generate & Install SSL Certificate In Apache Web Server On Ubuntu

How To Generate & Install SSL Certificate In Apache Web Server On Ubuntu

4
Comments
5 min read
How to Password Protect a Website or Web SubDirectory With .htaccess & .htpasswd

How to Password Protect a Website or Web SubDirectory With .htaccess & .htpasswd

3
Comments
2 min read
Getting Started with Kubernetes: A Brief Introduction to Kubernetes Pod Security Policies

Getting Started with Kubernetes: A Brief Introduction to Kubernetes Pod Security Policies

18
Comments
6 min read
How to access your AWS account

How to access your AWS account

22
Comments
9 min read
Security news weekly round-up - 4th December 2020

Security news weekly round-up - 4th December 2020

7
Comments
3 min read
Evite subir chaves de API para o GitHub em seu projeto Android, veja como.

Evite subir chaves de API para o GitHub em seu projeto Android, veja como.

10
Comments
5 min read
PCI DSS Requirements and Tips on Compliance

PCI DSS Requirements and Tips on Compliance

10
Comments 1
7 min read
Anchore Policy Enforcement with Travis CI

Anchore Policy Enforcement with Travis CI

6
Comments
3 min read
[Podcast] Barcoding podcast - Episode 13: Security

[Podcast] Barcoding podcast - Episode 13: Security

4
Comments
1 min read
Protecting audio assets with JavaScript and Web Audio API

Protecting audio assets with JavaScript and Web Audio API

31
Comments 2
3 min read
How IAM Solution Implementation Help Overcome IT Security Challenges

How IAM Solution Implementation Help Overcome IT Security Challenges

3
Comments
3 min read
Avoid uploading API keys and other sensitive info to GitHub on Android, here's how.

Avoid uploading API keys and other sensitive info to GitHub on Android, here's how.

11
Comments
4 min read
Protecting audio and music assets with Node and Javascript

Protecting audio and music assets with Node and Javascript

48
Comments 2
3 min read
How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

17
Comments 2
6 min read
Detect Dos, ping etc.. using SNORT

Detect Dos, ping etc.. using SNORT

8
Comments
1 min read
The ultra secure chat

The ultra secure chat

6
Comments
4 min read
How to secure your Gatsby app with security headers

How to secure your Gatsby app with security headers

7
Comments
3 min read
Billion Laughs Attack examples

Billion Laughs Attack examples

6
Comments
3 min read
CSRF and Cross-Origin Requests by Example

CSRF and Cross-Origin Requests by Example

71
Comments
9 min read
Introduction to Hashing

Introduction to Hashing

26
Comments 7
3 min read
GCP Cloud SQL Secure connection

GCP Cloud SQL Secure connection

9
Comments
6 min read
Pass: the simple CLI password manager

Pass: the simple CLI password manager

3
Comments 2
2 min read
Secure your Elasticsearch Cluster

Secure your Elasticsearch Cluster

5
Comments
2 min read
How to password-protect your website with Cloudflare Workers

How to password-protect your website with Cloudflare Workers

6
Comments
4 min read
Using Google Tag Manager with a Content-Security-Policy

Using Google Tag Manager with a Content-Security-Policy

21
Comments 7
3 min read
Illustrated Notes on Web Security Essentials

Illustrated Notes on Web Security Essentials

20
Comments 1
2 min read
Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

9
Comments
3 min read
Easy understanding of web protocols - HTTP and HTTPS

Easy understanding of web protocols - HTTP and HTTPS

51
Comments
6 min read
Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps

Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps

3
Comments
3 min read
Adding Authorization to a Serverless Node.js App

Adding Authorization to a Serverless Node.js App

7
Comments
7 min read
The 6 Aspects You Must Secure On Your MongoDB Instances

The 6 Aspects You Must Secure On Your MongoDB Instances

13
Comments
8 min read
What's an API Gateway and How Do You Choose the Right One

What's an API Gateway and How Do You Choose the Right One

20
Comments 2
8 min read
Learn from Data Breach

Learn from Data Breach

3
Comments 1
2 min read
The $81 million Bangladesh bank heist that was assisted with improper software security practices in place

The $81 million Bangladesh bank heist that was assisted with improper software security practices in place

3
Comments 1
8 min read
My perfect AWS and Kubernetes role-based access control and the reality

My perfect AWS and Kubernetes role-based access control and the reality

7
Comments
10 min read
localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄

localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄

60
Comments 19
3 min read
How to make the internet a safer place as a developer

How to make the internet a safer place as a developer

18
Comments 3
5 min read
How to add ReCaptcha to your React app

How to add ReCaptcha to your React app

19
Comments 2
4 min read
Security news weekly round-up - 27th November 2020

Security news weekly round-up - 27th November 2020

3
Comments
3 min read
Clean up your digital hygiene

Clean up your digital hygiene

7
Comments 2
12 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

23
Comments 5
5 min read
Enabling pgAudit, pgcrypto and scram-SHA-256 in Distributed SQL

Enabling pgAudit, pgcrypto and scram-SHA-256 in Distributed SQL

11
Comments
7 min read
Certificates for your Cloud backend

Certificates for your Cloud backend

25
Comments 2
5 min read
Find The Cube

Find The Cube

8
Comments
3 min read
hardware fingerprinting with Canvas, WebGL, AudioContext

hardware fingerprinting with Canvas, WebGL, AudioContext

3
Comments
1 min read
Honeypot Deployment and Customization

Honeypot Deployment and Customization

7
Comments
7 min read
Segurança da Informação com Spring Security e JWT

Segurança da Informação com Spring Security e JWT

5
Comments
10 min read
Improving Website Security

Improving Website Security

12
Comments
4 min read
How I learned Threat Intel by contributing to an open-source project

How I learned Threat Intel by contributing to an open-source project

7
Comments
4 min read
Identifying Web Developer Awareness of Attack Attempts

Identifying Web Developer Awareness of Attack Attempts

4
Comments
1 min read
Integrate Azure Active Directory (AD) with AWS Cognito User Pool

Integrate Azure Active Directory (AD) with AWS Cognito User Pool

10
Comments 7
5 min read
Warnings against using unofficial installers

Warnings against using unofficial installers

6
Comments 11
1 min read
ArgoCD: a Helm chart deployment, and working with Helm Secrets via AWS KMS

ArgoCD: a Helm chart deployment, and working with Helm Secrets via AWS KMS

7
Comments
13 min read
Kubernetes: ServiceAccounts, JWT-tokens, authentication, and RBAC authorization

Kubernetes: ServiceAccounts, JWT-tokens, authentication, and RBAC authorization

9
Comments
8 min read
Spring Security

Spring Security

11
Comments
1 min read
Notes from "The truth about cookies, tokens and APIs" by Phillipe de Ryck

Notes from "The truth about cookies, tokens and APIs" by Phillipe de Ryck

8
Comments
5 min read
loading...