DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What do HTTP and HTTPS mean and why does it matter today

What do HTTP and HTTPS mean and why does it matter today

8
Comments
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
Designing for Real-World HTTPS

Designing for Real-World HTTPS

36
Comments
9 min read
Authentication and Authorization à la Rails bcrypt

Authentication and Authorization à la Rails bcrypt

21
Comments 4
10 min read
AUTHeNtication VS AUTHoriZation

AUTHeNtication VS AUTHoriZation

127
Comments 7
2 min read
Steal That Api Key With A Man In The Middle Attack

Steal That Api Key With A Man In The Middle Attack

50
Comments 2
9 min read
What are online cookies and how do they work

What are online cookies and how do they work

3
Comments
3 min read
Make a Rubber Ducky for $3 with Digispark

Make a Rubber Ducky for $3 with Digispark

10
Comments 9
3 min read
How to learn as a developer from the 90's

How to learn as a developer from the 90's

36
Comments 2
5 min read
On.NET Episode: Securing your Azure applications with Azure.Identity

On.NET Episode: Securing your Azure applications with Azure.Identity

12
Comments
1 min read
Configuring the free TLS/SSL certificates on Azure App Service

Configuring the free TLS/SSL certificates on Azure App Service

65
Comments 5
3 min read
Content Security Policy Jhipster (Spring Boot)

Content Security Policy Jhipster (Spring Boot)

5
Comments
3 min read
SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

34
Comments
10 min read
Shift Security Left: Be A Secure Developer

Shift Security Left: Be A Secure Developer

16
Comments 1
4 min read
The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

14
Comments
1 min read
How do you practice safe public wifi access?

How do you practice safe public wifi access?

91
Comments 67
1 min read
Serverless: traits, best practices & security risks

Serverless: traits, best practices & security risks

86
Comments 1
2 min read
Protect and Monitor Your Front End Application

Protect and Monitor Your Front End Application

57
Comments
2 min read
Hello administrator, I can see you

Hello administrator, I can see you

20
Comments
3 min read
bsidesTLV

bsidesTLV

8
Comments
1 min read
OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

28
Comments
7 min read
The care and feeding of an IoT device

The care and feeding of an IoT device

20
Comments 2
4 min read
A cron job that could save you from a ransomware attack

A cron job that could save you from a ransomware attack

454
Comments 42
5 min read
Using WebAssembly With CSP Headers

Using WebAssembly With CSP Headers

11
Comments 4
3 min read
Understand JWT in 3 minutes

Understand JWT in 3 minutes

56
Comments 6
2 min read
A deeper look into PHP Hash Algorithms

A deeper look into PHP Hash Algorithms

8
Comments 2
4 min read
How Facebook Avoids Ad Blockers

How Facebook Avoids Ad Blockers

12
Comments
3 min read
Environment variables in Azure Functions with Key Vault

Environment variables in Azure Functions with Key Vault

17
Comments
3 min read
Protecting applications with OAuth2 Proxy

Protecting applications with OAuth2 Proxy

8
Comments
2 min read
Understanding CORS

Understanding CORS

694
Comments 18
7 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

8
Comments
7 min read
Heroku vs DigitalOcean: Getting Started with DigitalOcean

Heroku vs DigitalOcean: Getting Started with DigitalOcean

7
Comments
5 min read
AWS: RDS Certificate Authority SSL certificate upgrade

AWS: RDS Certificate Authority SSL certificate upgrade

8
Comments
4 min read
07 best practices when using AWS SSM Parameter Store

07 best practices when using AWS SSM Parameter Store

21
Comments 4
10 min read
Advantage of TLS 1.3 over TLS 1.2

Advantage of TLS 1.3 over TLS 1.2

9
Comments 1
3 min read
Best analogy for Authentication vs Authorization I've found so far

Best analogy for Authentication vs Authorization I've found so far

14
Comments
1 min read
🔴 LIVE [Role-based auth in Angular 8] 🔑

🔴 LIVE [Role-based auth in Angular 8] 🔑

39
Comments 1
1 min read
Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

6
Comments
3 min read
aws security automation concepts for beginners (s3).

aws security automation concepts for beginners (s3).

8
Comments
3 min read
Build your own RDP Honeypot

Build your own RDP Honeypot

7
Comments
4 min read
Implementing Access Control with Netlify Identity and Netlify Functions

Implementing Access Control with Netlify Identity and Netlify Functions

18
Comments 1
2 min read
Ways to Improve Web Application Security

Ways to Improve Web Application Security

5
Comments 1
5 min read
Avoid This AWS Security Blunder, or Make The News

Avoid This AWS Security Blunder, or Make The News

10
Comments 4
7 min read
The Importance of Inventory

The Importance of Inventory

5
Comments
6 min read
What is: SAML – an overview, its structure, and requests tracing between a Jenkins and Okta SSO

What is: SAML – an overview, its structure, and requests tracing between a Jenkins and Okta SSO

25
Comments 1
16 min read
Seamless SSO login for Microsoft Teams Tabs

Seamless SSO login for Microsoft Teams Tabs

13
Comments 2
7 min read
Handling data breaches in cloud; security assessment in Go; & scalability challenges

Handling data breaches in cloud; security assessment in Go; & scalability challenges

22
Comments
2 min read
Serverless: hidden costs, lock-in fears & security best practices

Serverless: hidden costs, lock-in fears & security best practices

57
Comments
2 min read
7 Open-Source Tools for Securing Your Code

7 Open-Source Tools for Securing Your Code

19
Comments
4 min read
ASP.NET Core 3.0 MVC Secure Authentication

ASP.NET Core 3.0 MVC Secure Authentication

6
Comments
8 min read
Port Swigger Academy CTF - CSRF vulnerability with no defenses

Port Swigger Academy CTF - CSRF vulnerability with no defenses

10
Comments 3
3 min read
Bypassing GitHub's OAuth flow

Bypassing GitHub's OAuth flow

13
Comments
2 min read
"I never sent that!" An Intro to CSRF (Updated)

"I never sent that!" An Intro to CSRF (Updated)

8
Comments
7 min read
Online Security 101 or why you Should use a Password Manager

Online Security 101 or why you Should use a Password Manager

9
Comments
3 min read
Letsencrypt https generator for Koa Apps

Letsencrypt https generator for Koa Apps

6
Comments
2 min read
My Top 5 Azure Security Announcements from Microsoft Ignite 2019

My Top 5 Azure Security Announcements from Microsoft Ignite 2019

13
Comments
5 min read
CORS headers with dot net core 3

CORS headers with dot net core 3

9
Comments
3 min read
Secure better your website with SameSite cookies

Secure better your website with SameSite cookies

6
Comments
2 min read
How I built my Pwnagotchi

How I built my Pwnagotchi

21
Comments 7
3 min read
Where should I save my passwords ? To more specific which editor ?

Where should I save my passwords ? To more specific which editor ?

6
Comments 4
1 min read
loading...