DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Shamir's Secret Sharing Scheme in JavaScript

Shamir's Secret Sharing Scheme in JavaScript

19
Comments 3
2 min read
Secure Your Node.js Application With JSON Web Token

Secure Your Node.js Application With JSON Web Token

166
Comments 13
5 min read
JS&Friends Conf: DevOps+IoT+Security - Diana Rodriguez

JS&Friends Conf: DevOps+IoT+Security - Diana Rodriguez

4
Comments
3 min read
Improving Form and AJAX Security

Improving Form and AJAX Security

12
Comments
13 min read
A 12 Point Web Hosting Security Checklist 2024

A 12 Point Web Hosting Security Checklist 2024

10
Comments 2
11 min read
A Bank Should Authenticate With You - And Vice Versa

A Bank Should Authenticate With You - And Vice Versa

12
Comments 5
4 min read
What are the worst security practices you've ever witnessed?

What are the worst security practices you've ever witnessed?

90
Comments 169
1 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
localStorage VS sessionStorage

localStorage VS sessionStorage

20
Comments 1
3 min read
Pushing Left, Like a Boss — Part 5.8 — Securing Your Cookies

Pushing Left, Like a Boss — Part 5.8 — Securing Your Cookies

36
Comments
1 min read
Securing containers with proxy reverses

Securing containers with proxy reverses

9
Comments
6 min read
Using JWT-Authentication (Auth0) with NestJS 🔐

Using JWT-Authentication (Auth0) with NestJS 🔐

13
Comments 2
1 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
Don't be tracked ⚙️ Tweak the Firefox configurations

Don't be tracked ⚙️ Tweak the Firefox configurations

38
Comments
3 min read
Android Security: Don't leave WebView debugging enabled in production

Android Security: Don't leave WebView debugging enabled in production

4
Comments 2
1 min read
How To Sign Your Commits On GitHub With GPG.

How To Sign Your Commits On GitHub With GPG.

68
Comments 6
8 min read
That Time I Shipped Insecure Code

That Time I Shipped Insecure Code

15
Comments 2
6 min read
So Many Auths!

So Many Auths!

9
Comments
6 min read
Making the website secure by adding additional HTTP headers in Netlify (and Zeit Now)

Making the website secure by adding additional HTTP headers in Netlify (and Zeit Now)

8
Comments
4 min read
What is JWT? how to create one?

What is JWT? how to create one?

8
Comments
3 min read
Generating 2FA One-Time Passwords in JS Using Web Crypto API

Generating 2FA One-Time Passwords in JS Using Web Crypto API

84
Comments 9
11 min read
How To Secure Your AWS S3 Bucket With Cloudflare

How To Secure Your AWS S3 Bucket With Cloudflare

6
Comments
4 min read
Kubernetes Open Sourced their Security Audit. That's Awesome.

Kubernetes Open Sourced their Security Audit. That's Awesome.

14
Comments
4 min read
The Comprehensive Guide to WordPress Security in 2019

The Comprehensive Guide to WordPress Security in 2019

59
Comments 1
13 min read
Securing secret key in Android using Keystore

Securing secret key in Android using Keystore

7
Comments
4 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

28
Comments 11
8 min read
Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

3
Comments
1 min read
Learn the Django User Authentication System

Learn the Django User Authentication System

12
Comments
2 min read
Negotiating security requirements with clients

Negotiating security requirements with clients

5
Comments
2 min read
Five things I knew about security, before I knew anything about security

Five things I knew about security, before I knew anything about security

88
Comments 8
5 min read
6 Best Practices for Successful SIEM Implementation

6 Best Practices for Successful SIEM Implementation

12
Comments
5 min read
What Is Step-Up Authentication, and When Should You Use It?

What Is Step-Up Authentication, and When Should You Use It?

5
Comments
1 min read
Creating and Remembering a Strong Passphrase

Creating and Remembering a Strong Passphrase

3
Comments 1
3 min read
How Do I Hunt Down Social Media Accounts Using Sherlock?

How Do I Hunt Down Social Media Accounts Using Sherlock?

15
Comments 2
2 min read
Secure Docker : Enable Docker Content Trust

Secure Docker : Enable Docker Content Trust

10
Comments
2 min read
Deception Technology as a Strategy for Cyber Security

Deception Technology as a Strategy for Cyber Security

4
Comments
5 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
OverTheWire Bandit Level 2 Level 3 walk-through

OverTheWire Bandit Level 2 Level 3 walk-through

5
Comments
1 min read
Systemd security w/o User directive

Systemd security w/o User directive

4
Comments 1
1 min read
How to Improve Your Azure Security with the Secure DevOps Kit for Azure (AzSK)

How to Improve Your Azure Security with the Secure DevOps Kit for Azure (AzSK)

9
Comments
6 min read
Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

87
Comments 3
4 min read
Locking javascript to a domain: Part I

Locking javascript to a domain: Part I

33
Comments 8
3 min read
Access Control

Access Control

36
Comments
6 min read
5 must-do security tips for developers

5 must-do security tips for developers

105
Comments 8
3 min read
What's the best way to report a security hole to a small company?

What's the best way to report a security hole to a small company?

2
Comments 2
1 min read
Xss JaVaSCRipt PoLYglOTs

Xss JaVaSCRipt PoLYglOTs

33
Comments 2
3 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
Pushing Left, Like a Boss — Part 5.7 — URL Parameters

Pushing Left, Like a Boss — Part 5.7 — URL Parameters

7
Comments
1 min read
Hacking 101

Hacking 101

26
Comments 1
8 min read
Cookie Expiry Pitfalls

Cookie Expiry Pitfalls

6
Comments
2 min read
Can WordPress Developers and Security Researchers get along?

Can WordPress Developers and Security Researchers get along?

33
Comments
7 min read
Osgood and CouchDB

Osgood and CouchDB

4
Comments
5 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

51
Comments
3 min read
Pushing Left, Like a Boss — Part 5.6 — Redirects and Forwards

Pushing Left, Like a Boss — Part 5.6 — Redirects and Forwards

8
Comments
1 min read
How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

158
Comments 29
6 min read
How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

87
Comments 6
7 min read
.innerHTML Cross-site Scripting

.innerHTML Cross-site Scripting

22
Comments 3
3 min read
Reconfirmable: integrating Devise into a non-standard registration system

Reconfirmable: integrating Devise into a non-standard registration system

11
Comments 1
5 min read
Snyk Security Review

Snyk Security Review

9
Comments
1 min read
Environment variables in Node.js. The Right way!

Environment variables in Node.js. The Right way!

69
Comments 18
4 min read
loading...