DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Seamless SSO login for Microsoft Teams Tabs

Seamless SSO login for Microsoft Teams Tabs

13
Comments 2
7 min read
Handling data breaches in cloud; security assessment in Go; & scalability challenges

Handling data breaches in cloud; security assessment in Go; & scalability challenges

22
Comments
2 min read
Serverless: hidden costs, lock-in fears & security best practices

Serverless: hidden costs, lock-in fears & security best practices

57
Comments
2 min read
7 Open-Source Tools for Securing Your Code

7 Open-Source Tools for Securing Your Code

16
Comments
4 min read
ASP.NET Core 3.0 MVC Secure Authentication

ASP.NET Core 3.0 MVC Secure Authentication

6
Comments
8 min read
Port Swigger Academy CTF - CSRF vulnerability with no defenses

Port Swigger Academy CTF - CSRF vulnerability with no defenses

8
Comments 3
3 min read
Bypassing GitHub's OAuth flow

Bypassing GitHub's OAuth flow

13
Comments
2 min read
"I never sent that!" An Intro to CSRF (Updated)

"I never sent that!" An Intro to CSRF (Updated)

8
Comments
7 min read
Online Security 101 or why you Should use a Password Manager

Online Security 101 or why you Should use a Password Manager

9
Comments
3 min read
Letsencrypt https generator for Koa Apps

Letsencrypt https generator for Koa Apps

6
Comments
2 min read
My Top 5 Azure Security Announcements from Microsoft Ignite 2019

My Top 5 Azure Security Announcements from Microsoft Ignite 2019

13
Comments
5 min read
CORS headers with dot net core 3

CORS headers with dot net core 3

9
Comments
3 min read
Secure better your website with SameSite cookies

Secure better your website with SameSite cookies

5
Comments
2 min read
How I built my Pwnagotchi

How I built my Pwnagotchi

19
Comments 7
3 min read
Where should I save my passwords ? To more specific which editor ?

Where should I save my passwords ? To more specific which editor ?

6
Comments 4
1 min read
How to Process Passwords as a Software Developer

How to Process Passwords as a Software Developer

686
Comments 41
4 min read
Low code, ultimate security - Secure Azure with Managed Identities

Low code, ultimate security - Secure Azure with Managed Identities

15
Comments
7 min read
Resources for Talk: Prioritizing Trust while Creating Applications

Resources for Talk: Prioritizing Trust while Creating Applications

6
Comments
4 min read
Two Ways To Implement Secure Storage In Your Xamarin.Forms Mobile App

Two Ways To Implement Secure Storage In Your Xamarin.Forms Mobile App

7
Comments
6 min read
Use Client Certificate Authentication with Java and RestTemplate

Use Client Certificate Authentication with Java and RestTemplate

5
Comments 2
2 min read
Convert PFX certificate to JKS, P12, CRT

Convert PFX certificate to JKS, P12, CRT

7
Comments 2
2 min read
Git Authentication Errors

Git Authentication Errors

6
Comments
3 min read
What Dev Teams Should Know about DevSecOps

What Dev Teams Should Know about DevSecOps

11
Comments
3 min read
Securing your docker images with Github actions for FREE!

Securing your docker images with Github actions for FREE!

52
Comments
2 min read
How to Extract an API Key from a Mobile App by Static Binary Analysis

How to Extract an API Key from a Mobile App by Static Binary Analysis

13
Comments 2
8 min read
What fields your User entity needs

What fields your User entity needs

10
Comments
3 min read
📖 Case Study: ⚙️ Reverse Engineering using Node JS 👾

📖 Case Study: ⚙️ Reverse Engineering using Node JS 👾

52
Comments 6
3 min read
How to Protect Your WordPress Site from Getting Hacked

How to Protect Your WordPress Site from Getting Hacked

14
Comments 1
11 min read
Things I want to remember about SSH

Things I want to remember about SSH

371
Comments 16
5 min read
3 minutes 21 seconds vs 10000 years - Google's Quantum Supremacy Claim 🔥 💥👇

3 minutes 21 seconds vs 10000 years - Google's Quantum Supremacy Claim 🔥 💥👇

34
Comments 12
1 min read
Security in times of Docker & K8s; tech debt; & embedded integration frameworks

Security in times of Docker & K8s; tech debt; & embedded integration frameworks

42
Comments 4
3 min read
How to make APIs fast & secure, plus tips for REST APIs

How to make APIs fast & secure, plus tips for REST APIs

62
Comments
2 min read
What happens to our data when we die?

What happens to our data when we die?

32
Comments 1
3 min read
Introducing Certera

Introducing Certera

8
Comments
4 min read
Checking for vulnerabilities on your Java projects

Checking for vulnerabilities on your Java projects

7
Comments
2 min read
Phoenix and Elixir integration guide for passwordless authentication with Kno

Phoenix and Elixir integration guide for passwordless authentication with Kno

8
Comments
8 min read
Note Taking App - Make your notes saved securely

Note Taking App - Make your notes saved securely

4
Comments
2 min read
Secure Your SPA with Authorization Code Flow with PKCE

Secure Your SPA with Authorization Code Flow with PKCE

8
Comments
5 min read
New PHP vulnerability - CVE-2019-11043

New PHP vulnerability - CVE-2019-11043

4
Comments
1 min read
PicoCTF 2019: Cereal Hacker 2 (500p)

PicoCTF 2019: Cereal Hacker 2 (500p)

9
Comments
4 min read
Timing Attacks and the Timing-Allow-Origin Header

Timing Attacks and the Timing-Allow-Origin Header

6
Comments
2 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

13
Comments
2 min read
Do you ever read "Terms and Conditions" and/or "Privacy Policies"?

Do you ever read "Terms and Conditions" and/or "Privacy Policies"?

6
Comments 12
1 min read
Root-Me: GB - Basic GameBoy crackme walkthrough

Root-Me: GB - Basic GameBoy crackme walkthrough

6
Comments
2 min read
Is Blockchain Wallet Safe

Is Blockchain Wallet Safe

3
Comments 2
1 min read
Weekly Links #10 #11

Weekly Links #10 #11

4
Comments
2 min read
Hacktoberfest and privacy concerns

Hacktoberfest and privacy concerns

8
Comments 3
2 min read
Environmental Variables & Hiding Sensitive Information in Ruby

Environmental Variables & Hiding Sensitive Information in Ruby

20
Comments
3 min read
Okta: G-Suite integration – provisioning and users import and export

Okta: G-Suite integration – provisioning and users import and export

5
Comments
7 min read
How I Fixed JWT Security Flaws in 3 Steps

How I Fixed JWT Security Flaws in 3 Steps

279
Comments 43
4 min read
Linux security

Linux security

41
Comments
2 min read
Be careful with Docker ports!

Be careful with Docker ports!

13
Comments 18
3 min read
Improving your WordPress development experience

Improving your WordPress development experience

11
Comments
4 min read
Hide Your Keys Hide Your Wife!

Hide Your Keys Hide Your Wife!

12
Comments
5 min read
Why Does Your Mobile App Need An Api Key?

Why Does Your Mobile App Need An Api Key?

11
Comments 2
10 min read
New Cyberspace Search Engine

New Cyberspace Search Engine

16
Comments
3 min read
Github: SAML, Okta, and Github Enterprise Cloud – Organization SSO configuration

Github: SAML, Okta, and Github Enterprise Cloud – Organization SSO configuration

5
Comments
5 min read
Why sign-in with apple may take you more than 5 minutes and how it works?

Why sign-in with apple may take you more than 5 minutes and how it works?

8
Comments 1
4 min read
How to Detect and Fix WordPress Malware Redirect Hack

How to Detect and Fix WordPress Malware Redirect Hack

8
Comments 1
13 min read
My Career Story

My Career Story

77
Comments 11
6 min read
loading...