DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Gute Gewohnheiten für sichere Internet-Nutzung

Gute Gewohnheiten für sichere Internet-Nutzung

4
Comments 1
4 min read
Jobs in Information Security (InfoSec)

Jobs in Information Security (InfoSec)

83
Comments 9
6 min read
Healthy habits for good cybersecurity

Healthy habits for good cybersecurity

69
Comments 12
4 min read
urllib3 Sustainability and Achievements in 2019

urllib3 Sustainability and Achievements in 2019

5
Comments
3 min read
Django web security checklist before deployment | Secure your Django App

Django web security checklist before deployment | Secure your Django App

278
Comments 2
4 min read
Debugging Gmail's "Suspicious link" Warnings

Debugging Gmail's "Suspicious link" Warnings

14
Comments 1
6 min read
nfstream: a flexible network data analysis framework

nfstream: a flexible network data analysis framework

11
Comments 1
2 min read
Azure Policy - Enforce location for CosmosDB

Azure Policy - Enforce location for CosmosDB

6
Comments
1 min read
Security for the front-end developer

Security for the front-end developer

209
Comments 14
4 min read
Use strong encryption and hashing algorithms in Java

Use strong encryption and hashing algorithms in Java

15
Comments 3
2 min read
Please, sell me good services

Please, sell me good services

9
Comments 4
7 min read
Examining Security with Azure

Examining Security with Azure

49
Comments
5 min read
Security Vulnerabilities in Web Apps

Security Vulnerabilities in Web Apps

10
Comments
8 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

7
Comments 2
16 min read
Security: Released npm package 📦 for Protecting CSV Injection 🚀

Security: Released npm package 📦 for Protecting CSV Injection 🚀

16
Comments 1
2 min read
SSH keys explained

SSH keys explained

72
Comments 4
11 min read
Securing HTTPS with Certificate Pinning on Android

Securing HTTPS with Certificate Pinning on Android

15
Comments
13 min read
How have I ensured the privacy and anonymity of my website users? 🤔

How have I ensured the privacy and anonymity of my website users? 🤔

121
Comments 11
3 min read
Word bugs in software documentation and how to fix them

Word bugs in software documentation and how to fix them

79
Comments 9
4 min read
Load testing mistakes; how not to save passwords; and Go's best practices

Load testing mistakes; how not to save passwords; and Go's best practices

31
Comments
2 min read
Django News - Issue 2

Django News - Issue 2

12
Comments
2 min read
JSONsty - Creating a Secure Cloud Storage Solution for JSON

JSONsty - Creating a Secure Cloud Storage Solution for JSON

10
Comments
2 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

48
Comments 2
8 min read
🤫 Secrets, environment variables & config files: the Ruby On Rails case

🤫 Secrets, environment variables & config files: the Ruby On Rails case

71
Comments 4
7 min read
Seeking any help/resources for MacOS logging using Splunk

Seeking any help/resources for MacOS logging using Splunk

3
Comments
1 min read
Demo: restrict access to Azure key vault using service endpoints

Demo: restrict access to Azure key vault using service endpoints

6
Comments
4 min read
A DSL For Seccomp Rules

A DSL For Seccomp Rules

5
Comments
3 min read
What is "enumeration" anyway?!

What is "enumeration" anyway?!

10
Comments 1
2 min read
Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

9
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
Beef up your HTTPS sites with a Content Security Policy

Beef up your HTTPS sites with a Content Security Policy

56
Comments 2
4 min read
Avoid Java serialization

Avoid Java serialization

11
Comments
2 min read
How to identify and fix open-source vulnerabilities

How to identify and fix open-source vulnerabilities

21
Comments 2
5 min read
Web security 101

Web security 101

190
Comments
11 min read
How to use variables in bamboo for building and deploying and how to store sensitive information

How to use variables in bamboo for building and deploying and how to store sensitive information

9
Comments
2 min read
KeePass: SSH keys passwords storage and decryption on Linux

KeePass: SSH keys passwords storage and decryption on Linux

18
Comments
4 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Kotlin: A Beginner's Guide and Tutorial

Kotlin: A Beginner's Guide and Tutorial

13
Comments
12 min read
Policy-Based Authorization In Angular Using JWT

Policy-Based Authorization In Angular Using JWT

16
Comments
19 min read
Password Managers are Safer and More Convenient for You

Password Managers are Safer and More Convenient for You

12
Comments 3
14 min read
Managing your Public and Private Container Registries

Managing your Public and Private Container Registries

7
Comments
2 min read
KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

11
Comments
14 min read
Configure your Java XML-parsers to prevent XXE

Configure your Java XML-parsers to prevent XXE

5
Comments
2 min read
Introduction - Episode 0 of the Your Secure Life Podcast

Introduction - Episode 0 of the Your Secure Life Podcast

9
Comments
3 min read
Chromium: Linux, keyrings && Secret Service, passwords encryption and store

Chromium: Linux, keyrings && Secret Service, passwords encryption and store

8
Comments 1
8 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Instagram Phishing Attack 2019

Instagram Phishing Attack 2019

11
Comments
4 min read
GIT Cache Helpers

GIT Cache Helpers

6
Comments
2 min read
What do HTTP and HTTPS mean and why does it matter today

What do HTTP and HTTPS mean and why does it matter today

8
Comments
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
Designing for Real-World HTTPS

Designing for Real-World HTTPS

36
Comments
9 min read
Authentication and Authorization à la Rails bcrypt

Authentication and Authorization à la Rails bcrypt

21
Comments 4
10 min read
AUTHeNtication VS AUTHoriZation

AUTHeNtication VS AUTHoriZation

127
Comments 7
2 min read
Steal That Api Key With A Man In The Middle Attack

Steal That Api Key With A Man In The Middle Attack

50
Comments 2
9 min read
What are online cookies and how do they work

What are online cookies and how do they work

3
Comments
3 min read
Make a Rubber Ducky for $3 with Digispark

Make a Rubber Ducky for $3 with Digispark

10
Comments 9
3 min read
How to learn as a developer from the 90's

How to learn as a developer from the 90's

36
Comments 2
5 min read
On.NET Episode: Securing your Azure applications with Azure.Identity

On.NET Episode: Securing your Azure applications with Azure.Identity

12
Comments
1 min read
Configuring the free TLS/SSL certificates on Azure App Service

Configuring the free TLS/SSL certificates on Azure App Service

65
Comments 5
3 min read
loading...