DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Detect Dos, ping etc.. using SNORT

Detect Dos, ping etc.. using SNORT

8
Comments
1 min read
The ultra secure chat

The ultra secure chat

6
Comments
4 min read
How to secure your Gatsby app with security headers

How to secure your Gatsby app with security headers

7
Comments
3 min read
Billion Laughs Attack examples

Billion Laughs Attack examples

6
Comments
3 min read
CSRF and Cross-Origin Requests by Example

CSRF and Cross-Origin Requests by Example

71
Comments
9 min read
Introduction to Hashing

Introduction to Hashing

26
Comments 7
3 min read
GCP Cloud SQL Secure connection

GCP Cloud SQL Secure connection

9
Comments
6 min read
Pass: the simple CLI password manager

Pass: the simple CLI password manager

3
Comments 2
2 min read
Secure your Elasticsearch Cluster

Secure your Elasticsearch Cluster

5
Comments
2 min read
How to password-protect your website with Cloudflare Workers

How to password-protect your website with Cloudflare Workers

6
Comments
4 min read
Using Google Tag Manager with a Content-Security-Policy

Using Google Tag Manager with a Content-Security-Policy

21
Comments 7
3 min read
Illustrated Notes on Web Security Essentials

Illustrated Notes on Web Security Essentials

20
Comments 1
2 min read
Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

9
Comments
3 min read
Easy understanding of web protocols - HTTP and HTTPS

Easy understanding of web protocols - HTTP and HTTPS

51
Comments
6 min read
Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps

Adding OAuth2 support to your Meetup API Custom Connector for Azure Logic Apps

3
Comments
3 min read
Adding Authorization to a Serverless Node.js App

Adding Authorization to a Serverless Node.js App

7
Comments
7 min read
The 6 Aspects You Must Secure On Your MongoDB Instances

The 6 Aspects You Must Secure On Your MongoDB Instances

13
Comments
8 min read
What's an API Gateway and How Do You Choose the Right One

What's an API Gateway and How Do You Choose the Right One

20
Comments 2
8 min read
Learn from Data Breach

Learn from Data Breach

3
Comments 1
2 min read
The $81 million Bangladesh bank heist that was assisted with improper software security practices in place

The $81 million Bangladesh bank heist that was assisted with improper software security practices in place

3
Comments 1
8 min read
My perfect AWS and Kubernetes role-based access control and the reality

My perfect AWS and Kubernetes role-based access control and the reality

7
Comments
10 min read
localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄

localStorage vs cookies: the "tabs vs spaces" sterile debate of web development 🙄

60
Comments 19
3 min read
How to make the internet a safer place as a developer

How to make the internet a safer place as a developer

18
Comments 3
5 min read
How to add ReCaptcha to your React app

How to add ReCaptcha to your React app

19
Comments 2
4 min read
Security news weekly round-up - 27th November 2020

Security news weekly round-up - 27th November 2020

3
Comments
3 min read
Clean up your digital hygiene

Clean up your digital hygiene

7
Comments 2
12 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

23
Comments 5
5 min read
Enabling pgAudit, pgcrypto and scram-SHA-256 in Distributed SQL

Enabling pgAudit, pgcrypto and scram-SHA-256 in Distributed SQL

11
Comments
7 min read
Certificates for your Cloud backend

Certificates for your Cloud backend

25
Comments 2
5 min read
Find The Cube

Find The Cube

8
Comments
3 min read
hardware fingerprinting with Canvas, WebGL, AudioContext

hardware fingerprinting with Canvas, WebGL, AudioContext

3
Comments
1 min read
Honeypot Deployment and Customization

Honeypot Deployment and Customization

7
Comments
7 min read
Segurança da Informação com Spring Security e JWT

Segurança da Informação com Spring Security e JWT

5
Comments
10 min read
Improving Website Security

Improving Website Security

12
Comments
4 min read
How I learned Threat Intel by contributing to an open-source project

How I learned Threat Intel by contributing to an open-source project

7
Comments
4 min read
Identifying Web Developer Awareness of Attack Attempts

Identifying Web Developer Awareness of Attack Attempts

4
Comments
1 min read
Integrate Azure Active Directory (AD) with AWS Cognito User Pool

Integrate Azure Active Directory (AD) with AWS Cognito User Pool

10
Comments 7
5 min read
Warnings against using unofficial installers

Warnings against using unofficial installers

6
Comments 11
1 min read
ArgoCD: a Helm chart deployment, and working with Helm Secrets via AWS KMS

ArgoCD: a Helm chart deployment, and working with Helm Secrets via AWS KMS

7
Comments
13 min read
Kubernetes: ServiceAccounts, JWT-tokens, authentication, and RBAC authorization

Kubernetes: ServiceAccounts, JWT-tokens, authentication, and RBAC authorization

9
Comments
8 min read
Spring Security

Spring Security

11
Comments
1 min read
Notes from "The truth about cookies, tokens and APIs" by Phillipe de Ryck

Notes from "The truth about cookies, tokens and APIs" by Phillipe de Ryck

8
Comments
5 min read
Azure Resource Lock – Simple 2 Steps

Azure Resource Lock – Simple 2 Steps

4
Comments
3 min read
The importance of protecting your APIs with SSL pinning

The importance of protecting your APIs with SSL pinning

11
Comments
5 min read
How to hack unsecure web application

How to hack unsecure web application

69
Comments 1
5 min read
AzureFunBytes - Episode 21 - @Azure Security with @deanbryen

AzureFunBytes - Episode 21 - @Azure Security with @deanbryen

7
Comments
1 min read
This week on the #425Show

This week on the #425Show

2
Comments
3 min read
Bypassing policies in Azure

Bypassing policies in Azure

7
Comments
3 min read
Gradle plugin to deeply hide secrets keys on Android

Gradle plugin to deeply hide secrets keys on Android

2
Comments
1 min read
Why use Key Vault in ADF?

Why use Key Vault in ADF?

4
Comments
1 min read
What is AWS Landing Zone

What is AWS Landing Zone

9
Comments
4 min read
AzureFunBytes New Episode on Microsoft @LearnTV Reminder - 11/19/2020 - @Azure Security with @deanbryen

AzureFunBytes New Episode on Microsoft @LearnTV Reminder - 11/19/2020 - @Azure Security with @deanbryen

6
Comments
1 min read
NGINX ModSecurity WAF

NGINX ModSecurity WAF

4
Comments
2 min read
Nginx Server Security: Nginx Hardening

Nginx Server Security: Nginx Hardening

16
Comments
1 min read
Are you logging your NodeJS code?

Are you logging your NodeJS code?

9
Comments
4 min read
[Discuss] Enterprise security best practices for managing vulnerabilities at scale

[Discuss] Enterprise security best practices for managing vulnerabilities at scale

4
Comments
1 min read
WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi security explained

WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi security explained

62
Comments 1
8 min read
GitHub Advanced Security from Azure DevOps?

GitHub Advanced Security from Azure DevOps?

9
Comments
4 min read
Membuat Otentikasi JWT dengan PHP Native

Membuat Otentikasi JWT dengan PHP Native

15
Comments 9
7 min read
Biggest Data Breaches of 2020

Biggest Data Breaches of 2020

12
Comments 2
2 min read
loading...