DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Beware of the findOne function

Beware of the findOne function

84
Comments 16
3 min read
I'm a security auditor and researcher, Ask Me Anything!

I'm a security auditor and researcher, Ask Me Anything!

38
Comments 32
2 min read
How do we improve security in the npm ecosystem?

How do we improve security in the npm ecosystem?

24
Comments 21
1 min read
How to deal with the event-stream vulnerability

How to deal with the event-stream vulnerability

35
Comments 5
2 min read
A Hypothetical Case of a Phishing Attack

A Hypothetical Case of a Phishing Attack

88
Comments 8
6 min read
Security Sprint: using Seccomp for secure containers.

Security Sprint: using Seccomp for secure containers.

20
Comments
3 min read
NPM... we all knew this would happen eventually

NPM... we all knew this would happen eventually

7
Comments 2
2 min read
セキュリティの分野で Haskell を使用する [翻訳記事]

セキュリティの分野で Haskell を使用する [翻訳記事]

11
Comments 2
2 min read
Should you care about XSS in Vue.js?

Should you care about XSS in Vue.js?

33
Comments 8
5 min read
Using rel=noopener in an anchor tag

Using rel=noopener in an anchor tag

8
Comments
1 min read
Fantastic Passwords and how to generate them

Fantastic Passwords and how to generate them

34
Comments 14
2 min read
WordPress penetration testing

WordPress penetration testing

12
Comments 1
1 min read
The How To Of Port Forwarding With SSH

The How To Of Port Forwarding With SSH

51
Comments
5 min read
HTTPS on static websites?

HTTPS on static websites?

5
Comments
1 min read
Memory leak, redirect loop, deadlock, XSS, CSRF, XEE, ..., understanding bugs by using too buggy web application

Memory leak, redirect loop, deadlock, XSS, CSRF, XEE, ..., understanding bugs by using too buggy web application

61
Comments 3
2 min read
SSH Login Notifications in Slack

SSH Login Notifications in Slack

11
Comments 1
1 min read
How to create a simple Honeypot to protect your Forms against Spammers

How to create a simple Honeypot to protect your Forms against Spammers

96
Comments 30
3 min read
How to properly use passwords

How to properly use passwords

28
Comments 12
3 min read
Security Sprint: The new Internet

Security Sprint: The new Internet

54
Comments 6
2 min read
SSH Agents In Depth

SSH Agents In Depth

13
Comments
5 min read
On defaults in Kubernetes RBAC

On defaults in Kubernetes RBAC

21
Comments
4 min read
Using SSH-Agent to Simplify Your SSH Experience

Using SSH-Agent to Simplify Your SSH Experience

12
Comments
4 min read
Wrestling Control of my Webcam

Wrestling Control of my Webcam

19
Comments 5
7 min read
How do you use an SVG as background image without affecting security?

How do you use an SVG as background image without affecting security?

11
Comments 10
1 min read
What I learned about cryptography in 3 weeks

What I learned about cryptography in 3 weeks

49
Comments 18
2 min read
Users are in for a bad experience with the Mojave app restrictions

Users are in for a bad experience with the Mojave app restrictions

8
Comments
3 min read
The container is in danger!

The container is in danger!

21
Comments 10
2 min read
Demystifying SOP and CSP, featuring CORS

Demystifying SOP and CSP, featuring CORS

15
Comments 1
11 min read
Quick and dirty .htaccess for small personal sites

Quick and dirty .htaccess for small personal sites

70
Comments 11
9 min read
Setting up a company's IT

Setting up a company's IT

4
Comments 6
1 min read
On Cross-Site Scripting and Content Security Policy

On Cross-Site Scripting and Content Security Policy

11
Comments
7 min read
[Video] The State of HTTP Headers with Andrew Betts

[Video] The State of HTTP Headers with Andrew Betts

12
Comments
1 min read
Automate AWS security group with CloudFlare IPs

Automate AWS security group with CloudFlare IPs

48
Comments 3
4 min read
Security Sprint: Falco

Security Sprint: Falco

37
Comments
3 min read
Let's talk about OSC

Let's talk about OSC

30
Comments
2 min read
An Intro On HTTP Security

An Intro On HTTP Security

63
Comments 8
8 min read
Stolen Access Tokens and You

Stolen Access Tokens and You

29
Comments
4 min read
Protect your data with WarShield

Protect your data with WarShield

32
Comments 9
1 min read
a few lessons learned storing secrets in aws parameter store

a few lessons learned storing secrets in aws parameter store

7
Comments
4 min read
IoT botnet construction tool "Mirai" was asked in Most famous Japanese information technology examinations

IoT botnet construction tool "Mirai" was asked in Most famous Japanese information technology examinations

8
Comments 4
1 min read
Stop using sudo pip install

Stop using sudo pip install

78
Comments 22
2 min read
AWS S3 file upload from client side

AWS S3 file upload from client side

13
Comments 1
2 min read
The day I hacked Troy Hunt's website to delete my data

The day I hacked Troy Hunt's website to delete my data

42
Comments 1
4 min read
Keybase, crypto made simple

Keybase, crypto made simple

7
Comments
1 min read
managing passwords and other secrets across teams

managing passwords and other secrets across teams

10
Comments 3
3 min read
Store Encrypted Files in Google Drive

Store Encrypted Files in Google Drive

30
Comments 3
12 min read
HSTS Preloading using Nginx, Letsencrypt and Capistrano.😎

HSTS Preloading using Nginx, Letsencrypt and Capistrano.😎

15
Comments 2
1 min read
What security updates should one follow?

What security updates should one follow?

13
Comments
1 min read
How do you authenticate your users?

How do you authenticate your users?

6
Comments 10
1 min read
Store Passwords With KeePass

Store Passwords With KeePass

84
Comments 14
3 min read
Anchore Security Bundle Policies

Anchore Security Bundle Policies

8
Comments
1 min read
Understanding Android Debug Bridge

Understanding Android Debug Bridge

49
Comments 7
11 min read
Introduction to U2F

Introduction to U2F

12
Comments
1 min read
Useful Commands for Log Analysis: Part 2 — Sed

Useful Commands for Log Analysis: Part 2 — Sed

9
Comments
5 min read
This Facebook Security Breach was "Intended Functionality"

This Facebook Security Breach was "Intended Functionality"

59
Comments 38
2 min read
Policy-Based Client-Side Encryption in Angular

Policy-Based Client-Side Encryption in Angular

18
Comments 3
12 min read
Web Developer Security Checklist V2

Web Developer Security Checklist V2

285
Comments 20
8 min read
セキュリティ文化は、計画的で、且つ、持続可能である必要がある [翻訳記事]

セキュリティ文化は、計画的で、且つ、持続可能である必要がある [翻訳記事]

6
Comments
1 min read
I reported a security vulnerability. Now what?

I reported a security vulnerability. Now what?

17
Comments 5
1 min read
Implementing Impersonation

Implementing Impersonation

40
Comments 2
5 min read
loading...