DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔎 Seraphix: The Secret Scanner Toolkit Built for Speed, Scale, and Bug Bounties

🔎 Seraphix: The Secret Scanner Toolkit Built for Speed, Scale, and Bug Bounties

Comments
3 min read
I Built a CLI to Test Supabase RLS Policies

I Built a CLI to Test Supabase RLS Policies

1
Comments
1 min read
Beyond Cost: Lessons from our Migration to Hetzner

Beyond Cost: Lessons from our Migration to Hetzner

1
Comments
10 min read
When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

Comments
2 min read
Binary: The Language That Runs the World (and Your Wi-Fi)

Binary: The Language That Runs the World (and Your Wi-Fi)

1
Comments
3 min read
Two Timestamps, One Message: Why WebSocket Systems Need Both

Two Timestamps, One Message: Why WebSocket Systems Need Both

Comments
14 min read
Smart Security Camera

Smart Security Camera

Comments
2 min read
5 Common Security Mistakes Developers Still Make (and How to Fix Them)

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

2
Comments
5 min read
Cybersecurity Steganography: How Defenders Face Hidden Data

Cybersecurity Steganography: How Defenders Face Hidden Data

Comments
3 min read
How Simple IDs Can Leak Your Secrets

How Simple IDs Can Leak Your Secrets

Comments
3 min read
A simple way to encrypt sensitive data using python

A simple way to encrypt sensitive data using python

Comments
1 min read
Protect Your Software Supply Chain with SBOMs – Security and Compliance

Protect Your Software Supply Chain with SBOMs – Security and Compliance

Comments
6 min read
🔒 Encapsulation in Java: Building Code That Protects Itself

🔒 Encapsulation in Java: Building Code That Protects Itself

Comments
3 min read
Authentication Flows: Implementing Secure Session Management

Authentication Flows: Implementing Secure Session Management

Comments
2 min read
Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

7
Comments
11 min read
From Setup to Role-Based Access — Building a Platform for Two Worlds

From Setup to Role-Based Access — Building a Platform for Two Worlds

Comments
1 min read
Check a list of IP addresses for proxies using IP2Proxy Dart

Check a list of IP addresses for proxies using IP2Proxy Dart

Comments
5 min read
Building a Centralized Authentication Service for Multi-Domain Apps

Building a Centralized Authentication Service for Multi-Domain Apps

8
Comments
1 min read
Making Authentication Seamless: How SSO Works in Modern Systems

Making Authentication Seamless: How SSO Works in Modern Systems

Comments
3 min read
🔐 How to Set Up SSH Access for a Private GitLab Repository

🔐 How to Set Up SSH Access for a Private GitLab Repository

6
Comments
3 min read
Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Comments
3 min read
Templating with Go's html/template and text/template

Templating with Go's html/template and text/template

1
Comments 1
5 min read
Chaos Engineering on AWS: Using Fault Injection Simulator (FIS) for Resilience

Chaos Engineering on AWS: Using Fault Injection Simulator (FIS) for Resilience

Comments
13 min read
Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Comments
3 min read
OpenSSL 3.6.0 Released

OpenSSL 3.6.0 Released

Comments
4 min read
loading...