DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Generate Password Protected PDF in Ruby on Rails with WickedPDF.

Generate Password Protected PDF in Ruby on Rails with WickedPDF.

20
Comments 1
3 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

15
Comments 1
4 min read
Dealing with CORS

Dealing with CORS

393
Comments 14
4 min read
A commenting system that is easy to self-host (and completely free)

A commenting system that is easy to self-host (and completely free)

6
Comments 1
1 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Lab HashStack - Part 2

Lab HashStack - Part 2

5
Comments
2 min read
How to Upgrade From Windows 7 to Linux

How to Upgrade From Windows 7 to Linux

10
Comments
5 min read
Regula: Validate Terraform for Policy Compliance with Open Policy Agent

Regula: Validate Terraform for Policy Compliance with Open Policy Agent

8
Comments
8 min read
Simple Access Control in Vaadin

Simple Access Control in Vaadin

9
Comments
7 min read
Safeguard your blog content in Reactjs and CSS

Safeguard your blog content in Reactjs and CSS

12
Comments 3
5 min read
Port Swigger Academy CTF - Validation of CSRF token depends on request method

Port Swigger Academy CTF - Validation of CSRF token depends on request method

13
Comments
3 min read
How to Validate Credit Card Numbers using Luhn's Algorithm

How to Validate Credit Card Numbers using Luhn's Algorithm

9
Comments
3 min read
Secure AWS Environments by deploying apps in Private/Public Subnets

Secure AWS Environments by deploying apps in Private/Public Subnets

10
Comments
10 min read
Why We should care about Floating-Point Numbers?

Why We should care about Floating-Point Numbers?

20
Comments 1
2 min read
Why PE needs Original First Thunk(OFT)?

Why PE needs Original First Thunk(OFT)?

6
Comments
2 min read
Designing Effective Peer to Peer Networks

Designing Effective Peer to Peer Networks

14
Comments
14 min read
How do you convince clients that security is not an option?

How do you convince clients that security is not an option?

5
Comments 4
2 min read
What a developer needs to know about 2FA

What a developer needs to know about 2FA

17
Comments
6 min read
Let Google do Secret Management

Let Google do Secret Management

7
Comments 1
4 min read
Security: How to secure your VPS server

Security: How to secure your VPS server

16
Comments
2 min read
JavaScript frameworks security report 2019

JavaScript frameworks security report 2019

78
Comments 1
4 min read
A collection of my favorites DNS servers

A collection of my favorites DNS servers

49
Comments 3
2 min read
How To Validate GitHub Webhooks With Laravel and PHP

How To Validate GitHub Webhooks With Laravel and PHP

17
Comments 2
3 min read
Stuffing of Credentials?

Stuffing of Credentials?

17
Comments 6
3 min read
Securing Windows Server 2019

Securing Windows Server 2019

4
Comments 2
2 min read
The Secret: Kubernetes Secrets and AWS SSM

The Secret: Kubernetes Secrets and AWS SSM

6
Comments 1
1 min read
Hide your f🤬🤬king API keys and credentials from versioned code

Hide your f🤬🤬king API keys and credentials from versioned code

142
Comments 9
2 min read
Securing WordPress

Securing WordPress

12
Comments
3 min read
Secure Data Lake with AWS Lake Formation Tutorial

Secure Data Lake with AWS Lake Formation Tutorial

7
Comments 1
4 min read
Angular Security Checklist

Angular Security Checklist

92
Comments 1
1 min read
#Hash Vs Encryption?

#Hash Vs Encryption?

14
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Finding exposed .git repositories

Finding exposed .git repositories

12
Comments 5
3 min read
Why coordinated security vulnerability disclosure policies are important

Why coordinated security vulnerability disclosure policies are important

8
Comments
2 min read
JwtToken vs Cookie vs SessionID

JwtToken vs Cookie vs SessionID

34
Comments 5
3 min read
Telegram isn't really encrypted, but you can easily encrypt chats with this service

Telegram isn't really encrypted, but you can easily encrypt chats with this service

7
Comments 6
1 min read
Host your own OpenVPN server in a few seconds

Host your own OpenVPN server in a few seconds

95
Comments 15
4 min read
SMB: metadata in RPC

SMB: metadata in RPC

7
Comments
4 min read
What is Phishing?

What is Phishing?

7
Comments
3 min read
Securing a large Gatsby site with a CSP

Securing a large Gatsby site with a CSP

16
Comments
5 min read
Sanitizing, Escaping, and Encoding

Sanitizing, Escaping, and Encoding

10
Comments
4 min read
Building and Securing MobX Apps with Auth0

Building and Securing MobX Apps with Auth0

8
Comments
1 min read
What the fudge is public-key🔑 cryptography?

What the fudge is public-key🔑 cryptography?

41
Comments 1
1 min read
Security best practices for Go & Java

Security best practices for Go & Java

13
Comments 1
2 min read
Choosing a Safe and Memorable Password

Choosing a Safe and Memorable Password

9
Comments
8 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
Security tips for APIs & MongoDB

Security tips for APIs & MongoDB

67
Comments
2 min read
JavaScript innerHTML, innerText, and textContent

JavaScript innerHTML, innerText, and textContent

48
Comments
3 min read
What is an HMAC?

What is an HMAC?

30
Comments 2
4 min read
The many faces of Cross-Site Scripting

The many faces of Cross-Site Scripting

15
Comments
4 min read
Mutual TLS authentication in REST services with Kotlin

Mutual TLS authentication in REST services with Kotlin

6
Comments
1 min read
Developer's Guide to Common Vulnerabilities and How to Prevent Them

Developer's Guide to Common Vulnerabilities and How to Prevent Them

6
Comments
1 min read
AWS open source news and updates #2

AWS open source news and updates #2

11
Comments
5 min read
API Security Best Practices

API Security Best Practices

104
Comments
35 min read
HTML attributes to improve your users' two factor authentication experience

HTML attributes to improve your users' two factor authentication experience

137
Comments
6 min read
CCPA: Are you making changes?

CCPA: Are you making changes?

5
Comments 2
1 min read
Random Number and Card Shuffling Algorithm

Random Number and Card Shuffling Algorithm

65
Comments 2
5 min read
3rd party libraries, are they a risk?

3rd party libraries, are they a risk?

8
Comments 3
1 min read
Terrier: An Open-Source Tool for Identifying and Analyzing Container and Image Components

Terrier: An Open-Source Tool for Identifying and Analyzing Container and Image Components

12
Comments
13 min read
Nginx: How to create an SSL Self-Signed Certificate on Ubuntu

Nginx: How to create an SSL Self-Signed Certificate on Ubuntu

16
Comments 1
2 min read
loading...