DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Never Mess With Cross Site Scripting And Here'is The Reason Why

Never Mess With Cross Site Scripting And Here'is The Reason Why

16
Comments
3 min read
5 reasons to start using Ubuntu

5 reasons to start using Ubuntu

6
Comments
4 min read
Cloud-Based CRM System: Is it Safe and What Are the Benefits?

Cloud-Based CRM System: Is it Safe and What Are the Benefits?

4
Comments 1
4 min read
Take a walk with OAuth 2.0

Take a walk with OAuth 2.0

104
Comments 3
9 min read
2FAnotifier and multi-factor authentication

2FAnotifier and multi-factor authentication

10
Comments
1 min read
Zero-Knowlege Authentication with JavaScript

Zero-Knowlege Authentication with JavaScript

11
Comments
3 min read
How to Keep your Code Secure

How to Keep your Code Secure

32
Comments 3
10 min read
Enabling TLS Just got a Little Bit Easier

Enabling TLS Just got a Little Bit Easier

8
Comments 1
3 min read
Two-Factor Authentication

Two-Factor Authentication

10
Comments
4 min read
Jackson Deserialization Vulnerability

Jackson Deserialization Vulnerability

13
Comments
2 min read
Home Security System with low cost

Home Security System with low cost

7
Comments 9
2 min read
🛠 Setup WildFly SSL

🛠 Setup WildFly SSL

9
Comments
2 min read
Use Auth0 to secure your NestJS application

Use Auth0 to secure your NestJS application

65
Comments 6
7 min read
American Kingpin: A Software Crime Thriller

American Kingpin: A Software Crime Thriller

146
Comments 10
1 min read
Introduction to Angr

Introduction to Angr

3
Comments
4 min read
Security in Dependencies

Security in Dependencies

4
Comments
4 min read
Managing Server Access, SSH Keys and our solution!

Managing Server Access, SSH Keys and our solution!

11
Comments 2
5 min read
npm security tips to keep you safe of malicious modules

npm security tips to keep you safe of malicious modules

52
Comments 1
2 min read
5 Reasons that Depict the Importance of Code Reviews

5 Reasons that Depict the Importance of Code Reviews

12
Comments
4 min read
How we mitigated one of the largest CC (DDoS) attacks

How we mitigated one of the largest CC (DDoS) attacks

7
Comments 1
3 min read
Why should you use "noopener"? Beware of security Flaws.

Why should you use "noopener"? Beware of security Flaws.

100
Comments 8
4 min read
8 Best WordPress Malware Scanners in 2024[Updated]

8 Best WordPress Malware Scanners in 2024[Updated]

11
Comments 2
7 min read
Cryptography git commits

Cryptography git commits

62
Comments 2
5 min read
How much github is secure?

How much github is secure?

5
Comments 1
1 min read
Shamir's Secret Sharing Scheme in JavaScript

Shamir's Secret Sharing Scheme in JavaScript

20
Comments 3
2 min read
Secure Your Node.js Application With JSON Web Token

Secure Your Node.js Application With JSON Web Token

166
Comments 13
5 min read
JS&Friends Conf: DevOps+IoT+Security - Diana Rodriguez

JS&Friends Conf: DevOps+IoT+Security - Diana Rodriguez

4
Comments
3 min read
Improving Form and AJAX Security

Improving Form and AJAX Security

12
Comments
13 min read
A 12 Point Web Hosting Security Checklist 2024

A 12 Point Web Hosting Security Checklist 2024

10
Comments 3
11 min read
A Bank Should Authenticate With You - And Vice Versa

A Bank Should Authenticate With You - And Vice Versa

12
Comments 5
4 min read
What are the worst security practices you've ever witnessed?

What are the worst security practices you've ever witnessed?

90
Comments 169
1 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
localStorage VS sessionStorage

localStorage VS sessionStorage

20
Comments 1
3 min read
Pushing Left, Like a Boss — Part 5.8 — Securing Your Cookies

Pushing Left, Like a Boss — Part 5.8 — Securing Your Cookies

36
Comments
1 min read
Securing containers with proxy reverses

Securing containers with proxy reverses

9
Comments
6 min read
Using JWT-Authentication (Auth0) with NestJS 🔐

Using JWT-Authentication (Auth0) with NestJS 🔐

13
Comments 2
1 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
Don't be tracked ⚙️ Tweak the Firefox configurations

Don't be tracked ⚙️ Tweak the Firefox configurations

38
Comments
3 min read
Android Security: Don't leave WebView debugging enabled in production

Android Security: Don't leave WebView debugging enabled in production

4
Comments 2
1 min read
How To Sign Your Commits On GitHub With GPG.

How To Sign Your Commits On GitHub With GPG.

68
Comments 6
8 min read
That Time I Shipped Insecure Code

That Time I Shipped Insecure Code

15
Comments 2
6 min read
So Many Auths!

So Many Auths!

9
Comments
6 min read
Making the website secure by adding additional HTTP headers in Netlify (and Zeit Now)

Making the website secure by adding additional HTTP headers in Netlify (and Zeit Now)

8
Comments
4 min read
What is JWT? how to create one?

What is JWT? how to create one?

8
Comments
3 min read
Generating 2FA One-Time Passwords in JS Using Web Crypto API

Generating 2FA One-Time Passwords in JS Using Web Crypto API

86
Comments 9
11 min read
How To Secure Your AWS S3 Bucket With Cloudflare

How To Secure Your AWS S3 Bucket With Cloudflare

6
Comments
4 min read
Kubernetes Open Sourced their Security Audit. That's Awesome.

Kubernetes Open Sourced their Security Audit. That's Awesome.

14
Comments
4 min read
Securing secret key in Android using Keystore

Securing secret key in Android using Keystore

7
Comments
4 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

40
Comments 11
8 min read
Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

3
Comments
1 min read
Learn the Django User Authentication System

Learn the Django User Authentication System

12
Comments
2 min read
Negotiating security requirements with clients

Negotiating security requirements with clients

5
Comments
2 min read
Five things I knew about security, before I knew anything about security

Five things I knew about security, before I knew anything about security

88
Comments 8
5 min read
6 Best Practices for Successful SIEM Implementation

6 Best Practices for Successful SIEM Implementation

12
Comments
5 min read
What Is Step-Up Authentication, and When Should You Use It?

What Is Step-Up Authentication, and When Should You Use It?

5
Comments
1 min read
Picking the FB50 smart lock (CVE-2019-13143)

Picking the FB50 smart lock (CVE-2019-13143)

10
Comments
4 min read
The Comprehensive Guide to WordPress Security in 2019

The Comprehensive Guide to WordPress Security in 2019

59
Comments 1
13 min read
Creating and Remembering a Strong Passphrase

Creating and Remembering a Strong Passphrase

3
Comments 1
3 min read
How Do I Hunt Down Social Media Accounts Using Sherlock?

How Do I Hunt Down Social Media Accounts Using Sherlock?

19
Comments 2
2 min read
Secure Docker : Enable Docker Content Trust

Secure Docker : Enable Docker Content Trust

10
Comments
2 min read
loading...