DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
10 Things Every Programmer Must Do Before Launching a Website 🚀

10 Things Every Programmer Must Do Before Launching a Website 🚀

Comments
2 min read
Knowing when to stop: an edge-first approach to AI safety

Knowing when to stop: an edge-first approach to AI safety

Comments
1 min read
Day 24 — Design for Resilience (The Last Stand)

Day 24 — Design for Resilience (The Last Stand)

3
Comments
2 min read
The Username Detective Tool I Wish I Found Sooner: WhatsMyName

The Username Detective Tool I Wish I Found Sooner: WhatsMyName

Comments
3 min read
Application security: thinking backwards

Application security: thinking backwards

Comments
2 min read
Want To Be a Hacker? Getting Started with Ethical Hacking (TryHackMe Journey)

Want To Be a Hacker? Getting Started with Ethical Hacking (TryHackMe Journey)

Comments
5 min read
Tokenomics' Hidden Flaw: Why Economic Models Need Privacy to Prevent Manipulation

Tokenomics' Hidden Flaw: Why Economic Models Need Privacy to Prevent Manipulation

1
Comments 2
5 min read
Day 23 — Secure By Design (Black Forest Shadow)

Day 23 — Secure By Design (Black Forest Shadow)

3
Comments
3 min read
Cloud Security with AWS IAM - A quick hands-on

Cloud Security with AWS IAM - A quick hands-on

Comments
3 min read
How I Removed Malware from a Hacked WordPress Site: A Step-by-Step Case Study

How I Removed Malware from a Hacked WordPress Site: A Step-by-Step Case Study

Comments
4 min read
Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Comments
4 min read
HIPAA Mobile QA Checklist: Your Testing Pipeline is a Compliance Risk

HIPAA Mobile QA Checklist: Your Testing Pipeline is a Compliance Risk

1
Comments
5 min read
Rule of Two Piece

Rule of Two Piece

Comments 1
7 min read
Azure Backup & Disaster Recovery

Azure Backup & Disaster Recovery

Comments
8 min read
4 Days, 18,599 Lines: What Happens When You Go All-In on Pure C

4 Days, 18,599 Lines: What Happens When You Go All-In on Pure C

Comments
5 min read
AI Agent-Level Attacks & Autonomous Exploit Generation: Can AI Hack Itself?

AI Agent-Level Attacks & Autonomous Exploit Generation: Can AI Hack Itself?

Comments
4 min read
How to Start an RDP Session From macOS With Windows App

How to Start an RDP Session From macOS With Windows App

Comments
4 min read
🚀 Terraform Day 14: Hosting a Secure Static Website with S3 & CloudFront

🚀 Terraform Day 14: Hosting a Secure Static Website with S3 & CloudFront

Comments
2 min read
Security isn’t just about code

Security isn’t just about code

Comments 1
1 min read
How to Turn Cloud "Trash" into a Golden 100GB Encrypted Vault (LVM + rclone)

How to Turn Cloud "Trash" into a Golden 100GB Encrypted Vault (LVM + rclone)

Comments
2 min read
Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Comments
4 min read
I Was Tired of Spam, So I Built My Own Temporary Email System

I Was Tired of Spam, So I Built My Own Temporary Email System

1
Comments 2
7 min read
Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Comments 1
3 min read
When Your Users Are Bots, Not People

When Your Users Are Bots, Not People

Comments
3 min read
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
loading...