DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Kotlin: A Beginner's Guide and Tutorial

Kotlin: A Beginner's Guide and Tutorial

13
Comments
12 min read
Policy-Based Authorization In Angular Using JWT

Policy-Based Authorization In Angular Using JWT

16
Comments
19 min read
Password Managers are Safer and More Convenient for You

Password Managers are Safer and More Convenient for You

12
Comments 3
14 min read
Managing your Public and Private Container Registries

Managing your Public and Private Container Registries

7
Comments
2 min read
KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

11
Comments
14 min read
Configure your Java XML-parsers to prevent XXE

Configure your Java XML-parsers to prevent XXE

5
Comments
2 min read
Introduction - Episode 0 of the Your Secure Life Podcast

Introduction - Episode 0 of the Your Secure Life Podcast

9
Comments
3 min read
Chromium: Linux, keyrings && Secret Service, passwords encryption and store

Chromium: Linux, keyrings && Secret Service, passwords encryption and store

8
Comments 1
8 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Instagram Phishing Attack 2019

Instagram Phishing Attack 2019

11
Comments
4 min read
GIT Cache Helpers

GIT Cache Helpers

6
Comments
2 min read
What do HTTP and HTTPS mean and why does it matter today

What do HTTP and HTTPS mean and why does it matter today

8
Comments
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
Designing for Real-World HTTPS

Designing for Real-World HTTPS

36
Comments
9 min read
Authentication and Authorization Ă  la Rails bcrypt

Authentication and Authorization Ă  la Rails bcrypt

21
Comments 4
10 min read
AUTHeNtication VS AUTHoriZation

AUTHeNtication VS AUTHoriZation

127
Comments 7
2 min read
Steal That Api Key With A Man In The Middle Attack

Steal That Api Key With A Man In The Middle Attack

50
Comments 2
9 min read
What are online cookies and how do they work

What are online cookies and how do they work

3
Comments
3 min read
Make a Rubber Ducky for $3 with Digispark

Make a Rubber Ducky for $3 with Digispark

9
Comments 9
3 min read
How to learn as a developer from the 90's

How to learn as a developer from the 90's

36
Comments 2
5 min read
On.NET Episode: Securing your Azure applications with Azure.Identity

On.NET Episode: Securing your Azure applications with Azure.Identity

12
Comments
1 min read
Configuring the free TLS/SSL certificates on Azure App Service

Configuring the free TLS/SSL certificates on Azure App Service

64
Comments 5
3 min read
Content Security Policy Jhipster (Spring Boot)

Content Security Policy Jhipster (Spring Boot)

5
Comments
3 min read
SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

34
Comments
10 min read
Shift Security Left: Be A Secure Developer

Shift Security Left: Be A Secure Developer

16
Comments 1
4 min read
The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

14
Comments
1 min read
How do you practice safe public wifi access?

How do you practice safe public wifi access?

91
Comments 67
1 min read
Serverless: traits, best practices & security risks

Serverless: traits, best practices & security risks

86
Comments 1
2 min read
Protect and Monitor Your Front End Application

Protect and Monitor Your Front End Application

57
Comments
2 min read
Hello administrator, I can see you

Hello administrator, I can see you

20
Comments
3 min read
bsidesTLV

bsidesTLV

8
Comments
1 min read
OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

28
Comments
7 min read
A cron job that could save you from a ransomware attack

A cron job that could save you from a ransomware attack

454
Comments 42
5 min read
Using WebAssembly With CSP Headers

Using WebAssembly With CSP Headers

11
Comments 4
3 min read
Understand JWT in 3 minutes

Understand JWT in 3 minutes

56
Comments 6
2 min read
A deeper look into PHP Hash Algorithms

A deeper look into PHP Hash Algorithms

8
Comments 2
4 min read
How Facebook Avoids Ad Blockers

How Facebook Avoids Ad Blockers

12
Comments
3 min read
Environment variables in Azure Functions with Key Vault

Environment variables in Azure Functions with Key Vault

15
Comments
3 min read
Protecting applications with OAuth2 Proxy

Protecting applications with OAuth2 Proxy

8
Comments
2 min read
Understanding CORS

Understanding CORS

694
Comments 18
7 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

8
Comments
7 min read
Heroku vs DigitalOcean: Getting Started with DigitalOcean

Heroku vs DigitalOcean: Getting Started with DigitalOcean

7
Comments
5 min read
AWS: RDS Certificate Authority SSL certificate upgrade

AWS: RDS Certificate Authority SSL certificate upgrade

8
Comments
4 min read
07 best practices when using AWS SSM Parameter Store

07 best practices when using AWS SSM Parameter Store

20
Comments 4
10 min read
Advantage of TLS 1.3 over TLS 1.2

Advantage of TLS 1.3 over TLS 1.2

9
Comments 1
3 min read
Best analogy for Authentication vs Authorization I've found so far

Best analogy for Authentication vs Authorization I've found so far

14
Comments
1 min read
🔴 LIVE [Role-based auth in Angular 8] 🔑

🔴 LIVE [Role-based auth in Angular 8] 🔑

39
Comments 1
1 min read
Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

6
Comments
3 min read
aws security automation concepts for beginners (s3).

aws security automation concepts for beginners (s3).

7
Comments
3 min read
Build your own RDP Honeypot

Build your own RDP Honeypot

7
Comments
4 min read
Implementing Access Control with Netlify Identity and Netlify Functions

Implementing Access Control with Netlify Identity and Netlify Functions

18
Comments 1
2 min read
Ways to Improve Web Application Security

Ways to Improve Web Application Security

5
Comments 1
5 min read
Avoid This AWS Security Blunder, or Make The News

Avoid This AWS Security Blunder, or Make The News

10
Comments 4
7 min read
The Importance of Inventory

The Importance of Inventory

5
Comments
6 min read
What is: SAML – an overview, its structure, and requests tracing between a Jenkins and Okta SSO

What is: SAML – an overview, its structure, and requests tracing between a Jenkins and Okta SSO

24
Comments 1
16 min read
Seamless SSO login for Microsoft Teams Tabs

Seamless SSO login for Microsoft Teams Tabs

13
Comments 2
7 min read
Handling data breaches in cloud; security assessment in Go; & scalability challenges

Handling data breaches in cloud; security assessment in Go; & scalability challenges

22
Comments
2 min read
Serverless: hidden costs, lock-in fears & security best practices

Serverless: hidden costs, lock-in fears & security best practices

57
Comments
2 min read
7 Open-Source Tools for Securing Your Code

7 Open-Source Tools for Securing Your Code

16
Comments
4 min read
loading...