DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
đŸ€« Secrets, environment variables & config files: the Ruby On Rails case

đŸ€« Secrets, environment variables & config files: the Ruby On Rails case

71
Comments 4
7 min read
Seeking any help/resources for MacOS logging using Splunk

Seeking any help/resources for MacOS logging using Splunk

3
Comments
1 min read
Demo: restrict access to Azure key vault using service endpoints

Demo: restrict access to Azure key vault using service endpoints

6
Comments
4 min read
A DSL For Seccomp Rules

A DSL For Seccomp Rules

5
Comments
3 min read
What is "enumeration" anyway?!

What is "enumeration" anyway?!

10
Comments 1
2 min read
Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

Hacking GitHub's Auth with Unicode's Turkish Dotless 'I'

9
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
Beef up your HTTPS sites with a Content Security Policy

Beef up your HTTPS sites with a Content Security Policy

56
Comments 2
4 min read
Avoid Java serialization

Avoid Java serialization

11
Comments
2 min read
How to identify and fix open-source vulnerabilities

How to identify and fix open-source vulnerabilities

21
Comments 2
5 min read
Web security 101

Web security 101

190
Comments
11 min read
How to use variables in bamboo for building and deploying and how to store sensitive information

How to use variables in bamboo for building and deploying and how to store sensitive information

9
Comments
2 min read
KeePass: SSH keys passwords storage and decryption on Linux

KeePass: SSH keys passwords storage and decryption on Linux

18
Comments
4 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Kotlin: A Beginner's Guide and Tutorial

Kotlin: A Beginner's Guide and Tutorial

13
Comments
12 min read
Policy-Based Authorization In Angular Using JWT

Policy-Based Authorization In Angular Using JWT

16
Comments
19 min read
Password Managers are Safer and More Convenient for You

Password Managers are Safer and More Convenient for You

12
Comments 3
14 min read
Managing your Public and Private Container Registries

Managing your Public and Private Container Registries

7
Comments
2 min read
KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

KeePass: an MFA TOTP codes, a browser’s passwords, SSH keys passwords storage configuration and Secret Service integration

11
Comments
14 min read
Configure your Java XML-parsers to prevent XXE

Configure your Java XML-parsers to prevent XXE

5
Comments
2 min read
Introduction - Episode 0 of the Your Secure Life Podcast

Introduction - Episode 0 of the Your Secure Life Podcast

9
Comments
3 min read
Chromium: Linux, keyrings && Secret Service, passwords encryption and store

Chromium: Linux, keyrings && Secret Service, passwords encryption and store

8
Comments 1
8 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Instagram Phishing Attack 2019

Instagram Phishing Attack 2019

11
Comments
4 min read
GIT Cache Helpers

GIT Cache Helpers

6
Comments
2 min read
What do HTTP and HTTPS mean and why does it matter today

What do HTTP and HTTPS mean and why does it matter today

8
Comments
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
Designing for Real-World HTTPS

Designing for Real-World HTTPS

36
Comments
9 min read
Authentication and Authorization Ă  la Rails bcrypt

Authentication and Authorization Ă  la Rails bcrypt

21
Comments 4
10 min read
AUTHeNtication VS AUTHoriZation

AUTHeNtication VS AUTHoriZation

127
Comments 7
2 min read
Steal That Api Key With A Man In The Middle Attack

Steal That Api Key With A Man In The Middle Attack

50
Comments 2
9 min read
What are online cookies and how do they work

What are online cookies and how do they work

3
Comments
3 min read
Make a Rubber Ducky for $3 with Digispark

Make a Rubber Ducky for $3 with Digispark

10
Comments 9
3 min read
How to learn as a developer from the 90's

How to learn as a developer from the 90's

36
Comments 2
5 min read
On.NET Episode: Securing your Azure applications with Azure.Identity

On.NET Episode: Securing your Azure applications with Azure.Identity

12
Comments
1 min read
Configuring the free TLS/SSL certificates on Azure App Service

Configuring the free TLS/SSL certificates on Azure App Service

65
Comments 5
3 min read
Content Security Policy Jhipster (Spring Boot)

Content Security Policy Jhipster (Spring Boot)

5
Comments
3 min read
SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

34
Comments
10 min read
Shift Security Left: Be A Secure Developer

Shift Security Left: Be A Secure Developer

16
Comments 1
4 min read
The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

14
Comments
1 min read
How do you practice safe public wifi access?

How do you practice safe public wifi access?

91
Comments 67
1 min read
Serverless: traits, best practices & security risks

Serverless: traits, best practices & security risks

86
Comments 1
2 min read
Protect and Monitor Your Front End Application

Protect and Monitor Your Front End Application

57
Comments
2 min read
Hello administrator, I can see you

Hello administrator, I can see you

20
Comments
3 min read
bsidesTLV

bsidesTLV

8
Comments
1 min read
OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

28
Comments
7 min read
The care and feeding of an IoT device

The care and feeding of an IoT device

20
Comments 2
4 min read
A cron job that could save you from a ransomware attack

A cron job that could save you from a ransomware attack

454
Comments 42
5 min read
Using WebAssembly With CSP Headers

Using WebAssembly With CSP Headers

11
Comments 4
3 min read
Understand JWT in 3 minutes

Understand JWT in 3 minutes

56
Comments 6
2 min read
A deeper look into PHP Hash Algorithms

A deeper look into PHP Hash Algorithms

8
Comments 2
4 min read
How Facebook Avoids Ad Blockers

How Facebook Avoids Ad Blockers

12
Comments
3 min read
Environment variables in Azure Functions with Key Vault

Environment variables in Azure Functions with Key Vault

17
Comments
3 min read
Protecting applications with OAuth2 Proxy

Protecting applications with OAuth2 Proxy

8
Comments
2 min read
Understanding CORS

Understanding CORS

694
Comments 18
7 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

8
Comments
7 min read
Heroku vs DigitalOcean: Getting Started with DigitalOcean

Heroku vs DigitalOcean: Getting Started with DigitalOcean

7
Comments
5 min read
AWS: RDS Certificate Authority SSL certificate upgrade

AWS: RDS Certificate Authority SSL certificate upgrade

8
Comments
4 min read
07 best practices when using AWS SSM Parameter Store

07 best practices when using AWS SSM Parameter Store

21
Comments 4
10 min read
loading...