DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Agile and the Beast

The Agile and the Beast

14
Comments
3 min read
What is DevSecOps?

What is DevSecOps?

58
Comments 3
5 min read
I have been banned from Lobste.rs, ask me anything.

I have been banned from Lobste.rs, ask me anything.

40
Comments 24
6 min read
乗っ取りに成功: dev.to をハッキング [翻訳記事]

乗っ取りに成功: dev.to をハッキング [翻訳記事]

8
Comments
2 min read
Java Map keys should always be Comparable

Java Map keys should always be Comparable

16
Comments 1
3 min read
Segurança no MongoDB - Parte 2 - Autorização

Segurança no MongoDB - Parte 2 - Autorização

17
Comments 3
4 min read
How to set Firebase security rules for your Flamelink project

How to set Firebase security rules for your Flamelink project

8
Comments
9 min read
Do not leak your codebase in private projects

Do not leak your codebase in private projects

15
Comments 3
1 min read
ハリネズミ本:1日目

ハリネズミ本:1日目

10
Comments
1 min read
Segurança no MongoDB - parte 1

Segurança no MongoDB - parte 1

18
Comments 1
4 min read
The Meltdown of the Web.

The Meltdown of the Web.

56
Comments 16
4 min read
Runtime Container Image Security with Anchore and OpenShift

Runtime Container Image Security with Anchore and OpenShift

7
Comments
1 min read
Implementing one time passwords in Crystal

Implementing one time passwords in Crystal

16
Comments
3 min read
Pwned Together: Hacking dev.to

Pwned Together: Hacking dev.to

153
Comments 24
4 min read
Keeping Your App Secure with NPM

Keeping Your App Secure with NPM

12
Comments
3 min read
Build a One-time Password Token for MFA with Okta

Build a One-time Password Token for MFA with Okta

9
Comments
11 min read
How to use SSH properly and what is SSH Agent Forwarding

How to use SSH properly and what is SSH Agent Forwarding

117
Comments 22
4 min read
Flatter Data

Flatter Data

16
Comments
2 min read
Security holes in PHP

Security holes in PHP

15
Comments 14
1 min read
Start assessing the security of your Android application

Start assessing the security of your Android application

15
Comments 1
8 min read
ウェブサーバー のセキュリティの道具: NIKTO

ウェブサーバー のセキュリティの道具: NIKTO

9
Comments 1
1 min read
Prevent phishing on the web with crypto

Prevent phishing on the web with crypto

38
Comments 2
3 min read
The ultimate PHP security checklist

The ultimate PHP security checklist

16
Comments
2 min read
Brakeman

Brakeman

6
Comments
1 min read
I Published My AWS Secret Key to GitHub

I Published My AWS Secret Key to GitHub

7
Comments
4 min read
Build a Simple REST API with Node and OAuth 2.0

Build a Simple REST API with Node and OAuth 2.0

22
Comments
17 min read
Handling Passwords

Handling Passwords

16
Comments 12
2 min read
PSA - Posting your preferences and phishing.

PSA - Posting your preferences and phishing.

18
Comments
2 min read
I'm 18 and I do systems security, Ask Me Anything!

I'm 18 and I do systems security, Ask Me Anything!

26
Comments 30
1 min read
Build and Understand a Simple Node.js Website with User Authentication

Build and Understand a Simple Node.js Website with User Authentication

12
Comments 2
22 min read
Security Tips for a PHP Application

Security Tips for a PHP Application

236
Comments 18
3 min read
BlackHat - Let's Talk About Security

BlackHat - Let's Talk About Security

19
Comments
1 min read
You might need a Web Application Security Scanner - but which one?

You might need a Web Application Security Scanner - but which one?

35
Comments 7
3 min read
Loading environment variables in JS apps

Loading environment variables in JS apps

168
Comments 19
3 min read
2FA, SMS, and you

2FA, SMS, and you

18
Comments 4
3 min read
Welcome to Los Angeles 2019

Welcome to Los Angeles 2019

56
Comments
5 min read
I'd rather you did not ...

I'd rather you did not ...

12
Comments 1
1 min read
Spoof a commit on GitHub. From Anyone.

Spoof a commit on GitHub. From Anyone.

106
Comments 14
2 min read
From data leak to account takeover

From data leak to account takeover

63
Comments 5
3 min read
Set up your Android app for Offensive Security

Set up your Android app for Offensive Security

23
Comments 2
6 min read
Offensive security on an Android app

Offensive security on an Android app

28
Comments 7
5 min read
Storing confidential data in the cloud securely with Cryptomator

Storing confidential data in the cloud securely with Cryptomator

87
Comments 3
6 min read
Why you should practice security to better secure your application.

Why you should practice security to better secure your application.

23
Comments 2
4 min read
SQL: Where spaces may not matter

SQL: Where spaces may not matter

60
Comments 8
4 min read
How to Build 2 Factor Auth for Home Wi-Fi?

How to Build 2 Factor Auth for Home Wi-Fi?

17
Comments
2 min read
Docker Security Best-Practices

Docker Security Best-Practices

160
Comments 3
4 min read
Kubernetes Security Best-Practices

Kubernetes Security Best-Practices

110
Comments 6
10 min read
I was billed for 14k USD on Amazon Web Services 😱

I was billed for 14k USD on Amazon Web Services 😱

349
Comments 90
3 min read
Crypto-anchors - an innovative technology for supply chain security and visibility

Crypto-anchors - an innovative technology for supply chain security and visibility

23
Comments 1
2 min read
How to install Let's Encrypt on Apache running Ubuntu 16.04

How to install Let's Encrypt on Apache running Ubuntu 16.04

9
Comments
1 min read
Tech Blog has moved to blog.osninja.io

Tech Blog has moved to blog.osninja.io

6
Comments
1 min read
Learn from others mistakes: How not to write a PHP install script

Learn from others mistakes: How not to write a PHP install script

36
Comments 2
6 min read
Local development with HTTPS on OSX

Local development with HTTPS on OSX

61
Comments 13
5 min read
Free website vulnerability scanner for developers

Free website vulnerability scanner for developers

14
Comments 2
1 min read
Spot the malware

Spot the malware

41
Comments 9
2 min read
OAuth 2.0 from the Command Line

OAuth 2.0 from the Command Line

12
Comments
7 min read
Everyone is watching what you do online. How user tracking with cookies works

Everyone is watching what you do online. How user tracking with cookies works

39
Comments 1
5 min read
Virus in eslint-scope 3.7.2

Virus in eslint-scope 3.7.2

47
Comments 1
1 min read
Hive Mind, security in distributed IoT

Hive Mind, security in distributed IoT

25
Comments 5
4 min read
Do password rules impact security?

Do password rules impact security?

37
Comments 25
1 min read
loading...