DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Um guia sobre normas de segurança da informação

Um guia sobre normas de segurança da informação

13
Comments
4 min read
Stuck with Authentication For Your New Product/Website?

Stuck with Authentication For Your New Product/Website?

4
Comments
2 min read
Plugging Git Leaks: Preventing and Fixing Information Exposure in Repositories

Plugging Git Leaks: Preventing and Fixing Information Exposure in Repositories

5
Comments
6 min read
Predictive vs. Adaptive SDLC: What is the Difference?

Predictive vs. Adaptive SDLC: What is the Difference?

7
Comments
5 min read
Password Attacks CounterMeasures ⚔

Password Attacks CounterMeasures ⚔

30
Comments 2
6 min read
Uploading a large file from web

Uploading a large file from web

8
Comments
6 min read
Authentication in 2020

Authentication in 2020

40
Comments
3 min read
Controlling access to files uploaded by users

Controlling access to files uploaded by users

5
Comments
3 min read
Generating Random Password in Python - Practical Guide

Generating Random Password in Python - Practical Guide

24
Comments 6
7 min read
User Authentication, In 2020

User Authentication, In 2020

100
Comments 12
4 min read
Pod Security Policy on EKS

Pod Security Policy on EKS

14
Comments 1
8 min read
Update your Azure profile information

Update your Azure profile information

4
Comments 1
3 min read
JS-X-Ray 1.0

JS-X-Ray 1.0

7
Comments
3 min read
AngularJS Security Fundamentals

AngularJS Security Fundamentals

7
Comments
7 min read
Introduction to industrial security

Introduction to industrial security

38
Comments
3 min read
Progress Check: From 1400pts to 77000pts

Progress Check: From 1400pts to 77000pts

14
Comments 2
2 min read
Week 2: Knowing the penetration testing steps

Week 2: Knowing the penetration testing steps

18
Comments 1
4 min read
Security tips for Djangonauts

Security tips for Djangonauts

35
Comments 1
3 min read
What To Do With VPN? 20 Ways To Use Your VPN

What To Do With VPN? 20 Ways To Use Your VPN

10
Comments 4
7 min read
How to protect Serverless (Open)API's?

How to protect Serverless (Open)API's?

95
Comments 2
19 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

2
Comments
1 min read
Kubernetes: part 5 — RBAC authorization with a Role and RoleBinding example

Kubernetes: part 5 — RBAC authorization with a Role and RoleBinding example

11
Comments 1
8 min read
Migrating From Authy to Bitwarden for 2FA Codes

Migrating From Authy to Bitwarden for 2FA Codes

6
Comments
8 min read
The most basic security for Spring Boot with Thymeleaf

The most basic security for Spring Boot with Thymeleaf

19
Comments 4
2 min read
Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer

Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer

7
Comments
2 min read
First Streaming Ever - Git Security

First Streaming Ever - Git Security

7
Comments
1 min read
The 10 most critical API security risks - Part 9: Improper Assets Management

The 10 most critical API security risks - Part 9: Improper Assets Management

7
Comments
2 min read
Blocking Disposable Emails

Blocking Disposable Emails

6
Comments 2
5 min read
Java - secure an endpoint using Spring Security

Java - secure an endpoint using Spring Security

13
Comments
12 min read
Inspecting Web Traffic with Burp Suite Proxy

Inspecting Web Traffic with Burp Suite Proxy

10
Comments
7 min read
Secure by Design

Secure by Design

11
Comments 1
6 min read
Investigation into Postgres malware (hack?)

Investigation into Postgres malware (hack?)

50
Comments 15
6 min read
SSO: OAuth 2.0 vs. OpenID Connect vs. SAML

SSO: OAuth 2.0 vs. OpenID Connect vs. SAML

16
Comments
2 min read
The right way of accessing Azure services from inside your Azure Kubernetes Cluster

The right way of accessing Azure services from inside your Azure Kubernetes Cluster

8
Comments
6 min read
Testing Laravel API endpoints with jwt-auth

Testing Laravel API endpoints with jwt-auth

24
Comments
3 min read
Deploying Fast and Secure Web App on AWS — Part 1a

Deploying Fast and Secure Web App on AWS — Part 1a

8
Comments
6 min read
Fixing security vulnerabilities in npm dependencies in less than 3 mins

Fixing security vulnerabilities in npm dependencies in less than 3 mins

20
Comments 5
3 min read
Simplify AWS IAM Role Trust Policies in Organizations

Simplify AWS IAM Role Trust Policies in Organizations

8
Comments
2 min read
Outsourcing security with 1Password, Authy, and Privacy.com

Outsourcing security with 1Password, Authy, and Privacy.com

50
Comments 5
5 min read
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

7
Comments
5 min read
How to make server access sharing easy and secure ?

How to make server access sharing easy and secure ?

7
Comments
2 min read
Handling JWT securely on your client

Handling JWT securely on your client

7
Comments
1 min read
Hacker101 CTF - H1 Thermostat

Hacker101 CTF - H1 Thermostat

16
Comments 4
4 min read
How to get the verified flag on your commits in GitHub

How to get the verified flag on your commits in GitHub

7
Comments
5 min read
Spring Boot: Auto Configuration and Projects

Spring Boot: Auto Configuration and Projects

14
Comments
4 min read
Unified Permissions Model

Unified Permissions Model

9
Comments
2 min read
Are security fixes safe to automate?

Are security fixes safe to automate?

6
Comments 1
1 min read
Attacks in times of fear

Attacks in times of fear

38
Comments
2 min read
The 10 most critical API security risks - Part 8: Injection

The 10 most critical API security risks - Part 8: Injection

17
Comments 1
2 min read
Github bot @dependabot fixes security vulnerabilities

Github bot @dependabot fixes security vulnerabilities

18
Comments 7
2 min read
Don't Let the Hackers Get onto your Files, either Personal or Professional.

Don't Let the Hackers Get onto your Files, either Personal or Professional.

13
Comments
5 min read
Facelock Authentication for Linux

Facelock Authentication for Linux

10
Comments 2
1 min read
I know what you did.

I know what you did.

23
Comments 1
2 min read
Keybase overview 🔐

Keybase overview 🔐

6
Comments
3 min read
Why Include Browser Updates As Part Of Your Dev Cycle?

Why Include Browser Updates As Part Of Your Dev Cycle?

3
Comments
2 min read
Hacker101 CTF - Petshop Pro

Hacker101 CTF - Petshop Pro

35
Comments 12
5 min read
Kali Linux Inside Docker

Kali Linux Inside Docker

26
Comments 2
1 min read
OverTheWire Bandit Level 8 Level 9 walk-through

OverTheWire Bandit Level 8 Level 9 walk-through

4
Comments
2 min read
Hacker101 CTF - BugDB v1

Hacker101 CTF - BugDB v1

16
Comments
2 min read
Hacker101 CTF - BugDB v3

Hacker101 CTF - BugDB v3

11
Comments
3 min read
loading...