DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
5 security blogs you should follow

5 security blogs you should follow

18
Comments
2 min read
Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

75
Comments 2
7 min read
Argo CD secrets management using Sops

Argo CD secrets management using Sops

20
Comments 1
3 min read
Como seria a sua vida se a internet fosse feita de sites do http://governo?

Como seria a sua vida se a internet fosse feita de sites do http://governo?

12
Comments 1
6 min read
0x00SEC CTF - Exercise #6

0x00SEC CTF - Exercise #6

6
Comments
3 min read
Generating a QR code with React hooks and JavaScript

Generating a QR code with React hooks and JavaScript

8
Comments
2 min read
0x00SEC CTF - Exercise #5

0x00SEC CTF - Exercise #5

5
Comments
4 min read
0x00SEC CTF - Exercise #4

0x00SEC CTF - Exercise #4

3
Comments 1
4 min read
Why should you care about Privacy?

Why should you care about Privacy?

3
Comments
4 min read
SSL: What it is and types of SSL

SSL: What it is and types of SSL

8
Comments
2 min read
21 Best Practices for AWS Cloud Security

21 Best Practices for AWS Cloud Security

11
Comments
9 min read
Automatic Renewal of Puppet Certificates

Automatic Renewal of Puppet Certificates

9
Comments 1
3 min read
CVE-2020-10187

CVE-2020-10187

18
Comments 2
1 min read
How to securely store JWT tokens.

How to securely store JWT tokens.

451
Comments 54
6 min read
🔐 Intro to managing secrets using Mozilla SOPS 🔐

🔐 Intro to managing secrets using Mozilla SOPS 🔐

5
Comments
2 min read
Securely Storing JWTs in (Flutter) Web Apps

Securely Storing JWTs in (Flutter) Web Apps

41
Comments 19
7 min read
How to store your little secrets.

How to store your little secrets.

15
Comments 1
6 min read
How to Perform a Cyber Security Risk Assessment: A Step-by-Step Guide

How to Perform a Cyber Security Risk Assessment: A Step-by-Step Guide

17
Comments 2
4 min read
How to Safely use Google Application Credentials on Heroku

How to Safely use Google Application Credentials on Heroku

2
Comments 1
2 min read
Create your own CAPTCHA - part 1 - Architecture

Create your own CAPTCHA - part 1 - Architecture

77
Comments 2
3 min read
How to keep your Javascript projects safe

How to keep your Javascript projects safe

97
Comments
8 min read
A Developer’s guide to Code Signing Certificates

A Developer’s guide to Code Signing Certificates

14
Comments
4 min read
Use your Yubikey to its Fullest

Use your Yubikey to its Fullest

26
Comments 4
9 min read
Add AppSec to Your CircleCI Pipeline With the StackHawk Orb

Add AppSec to Your CircleCI Pipeline With the StackHawk Orb

6
Comments
6 min read
Disable logging of (sensitive) arguments in Active Job

Disable logging of (sensitive) arguments in Active Job

4
Comments
2 min read
Testing sign-up with real emails - Selenium Java email API tutorial (with examples)

Testing sign-up with real emails - Selenium Java email API tutorial (with examples)

7
Comments
5 min read
Security and performance tips and tricks for your GraphQL servers

Security and performance tips and tricks for your GraphQL servers

13
Comments 1
7 min read
Rate limiting using Python and Redis

Rate limiting using Python and Redis

25
Comments 2
5 min read
JWT Bearer Authentication/Authorization with Spring Security 5 in a Spring Boot App (outdated)

JWT Bearer Authentication/Authorization with Spring Security 5 in a Spring Boot App (outdated)

48
Comments 3
7 min read
MQTT security

MQTT security

5
Comments
1 min read
How to learn web application security

How to learn web application security

676
Comments 17
4 min read
One-step to prevent potential NoSQL Injection in your mongodb application

One-step to prevent potential NoSQL Injection in your mongodb application

18
Comments 9
3 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

28
Comments
3 min read
What's new in OAuth 2.1?

What's new in OAuth 2.1?

5
Comments
14 min read
How to Backup MySQL Databases on Ubuntu VPS Server Automatically

How to Backup MySQL Databases on Ubuntu VPS Server Automatically

8
Comments
2 min read
A Complete Guide to Man in The Middle Attacks

A Complete Guide to Man in The Middle Attacks

25
Comments
10 min read
OpenHAB Home Automation

OpenHAB Home Automation

4
Comments 2
5 min read
Hacker101 CTF - Photo Gallery

Hacker101 CTF - Photo Gallery

28
Comments 8
5 min read
ハードウェアのハッキング

ハードウェアのハッキング

6
Comments
1 min read
From Firewalls to Security Groups

From Firewalls to Security Groups

32
Comments
6 min read
Simplifying "Login With Twitter" using Python and Flask.

Simplifying "Login With Twitter" using Python and Flask.

9
Comments
5 min read
How to set Proxy for Docker Containers in Linux Machines?

How to set Proxy for Docker Containers in Linux Machines?

3
Comments
3 min read
Thinking about Web Application Security

Thinking about Web Application Security

5
Comments 1
4 min read
How to Ensure Security in Your SaaS Application

How to Ensure Security in Your SaaS Application

9
Comments
8 min read
Pwnagotchi - Web UI over Bluetooth

Pwnagotchi - Web UI over Bluetooth

26
Comments
2 min read
Cloud Networking and Security

Cloud Networking and Security

7
Comments 2
3 min read
How to secure your Raspberry Pi - or - how my Raspberry Pi was hacked

How to secure your Raspberry Pi - or - how my Raspberry Pi was hacked

16
Comments 2
6 min read
Authenticating a React App with Laravel Sanctum - Part 4

Authenticating a React App with Laravel Sanctum - Part 4

21
Comments 1
5 min read
The Math of Password Hashing Algorithms and Entropy

The Math of Password Hashing Algorithms and Entropy

6
Comments
9 min read
Deploying a Bastion Host in AWS using CloudFormation

Deploying a Bastion Host in AWS using CloudFormation

9
Comments
4 min read
A Beginner's Guide To Role-Based Access Control on Azure.

A Beginner's Guide To Role-Based Access Control on Azure.

34
Comments 1
6 min read
No more passwords

No more passwords

6
Comments
2 min read
AWS Landing Zone versus AWS Control Tower

AWS Landing Zone versus AWS Control Tower

7
Comments
3 min read
Data Storage Security: 5 Best Practices to Secure Your Data

Data Storage Security: 5 Best Practices to Secure Your Data

6
Comments 1
2 min read
How to encrypt the NVS volume on the ESP32

How to encrypt the NVS volume on the ESP32

14
Comments 15
6 min read
มาตรวจดูกันว่าโปรเจค Android, iOS project เราปลอดภัยแค่ไหนด้วย MobSF

มาตรวจดูกันว่าโปรเจค Android, iOS project เราปลอดภัยแค่ไหนด้วย MobSF

7
Comments
1 min read
Extending markdown with template engine, and security?

Extending markdown with template engine, and security?

4
Comments
1 min read
How to avoid Insecure Binder Configuration in JAVA

How to avoid Insecure Binder Configuration in JAVA

10
Comments 1
2 min read
Speeding up Linux disk encryption

Speeding up Linux disk encryption

9
Comments
24 min read
Fixing weak crypto in OpenSSL based applications

Fixing weak crypto in OpenSSL based applications

6
Comments
16 min read
loading...