DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What's the best way to report a security hole to a small company?

What's the best way to report a security hole to a small company?

2
Comments 2
1 min read
Xss JaVaSCRipt PoLYglOTs

Xss JaVaSCRipt PoLYglOTs

33
Comments 2
3 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
Pushing Left, Like a Boss — Part 5.7 — URL Parameters

Pushing Left, Like a Boss — Part 5.7 — URL Parameters

7
Comments
1 min read
Hacking 101

Hacking 101

26
Comments 1
8 min read
Cookie Expiry Pitfalls

Cookie Expiry Pitfalls

6
Comments
2 min read
Can WordPress Developers and Security Researchers get along?

Can WordPress Developers and Security Researchers get along?

33
Comments
7 min read
Osgood and CouchDB

Osgood and CouchDB

4
Comments
5 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

52
Comments
3 min read
Pushing Left, Like a Boss — Part 5.6 — Redirects and Forwards

Pushing Left, Like a Boss — Part 5.6 — Redirects and Forwards

8
Comments
1 min read
What if your laptop or hard drive with sensitive data is stolen or you lost it?

What if your laptop or hard drive with sensitive data is stolen or you lost it?

11
Comments
6 min read
How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

158
Comments 29
6 min read
How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

92
Comments 6
7 min read
.innerHTML Cross-site Scripting

.innerHTML Cross-site Scripting

25
Comments 3
3 min read
Reconfirmable: integrating Devise into a non-standard registration system

Reconfirmable: integrating Devise into a non-standard registration system

12
Comments 1
5 min read
Snyk Security Review

Snyk Security Review

9
Comments
1 min read
Environment variables in Node.js. The Right way!

Environment variables in Node.js. The Right way!

36
Comments 19
4 min read
The World's most dangerous search engine:Shodan

The World's most dangerous search engine:Shodan

17
Comments 5
1 min read
[Video] Raiders of the Javascript-based Malware

[Video] Raiders of the Javascript-based Malware

3
Comments
1 min read
Boring a server to death - The Slow Loris Attack

Boring a server to death - The Slow Loris Attack

41
Comments 2
5 min read
How to deal with GitHub spambots

How to deal with GitHub spambots

62
Comments 3
3 min read
Automate all the security!

Automate all the security!

6
Comments
1 min read
POP's cloud-based security services

POP's cloud-based security services

6
Comments
4 min read
How and when do you decide to update your app's dependencies?

How and when do you decide to update your app's dependencies?

7
Comments 1
2 min read
Why is it worthwhile automating security?

Why is it worthwhile automating security?

4
Comments
2 min read
Using EasyAuth (AppService Authentication) with ASP.NET Core

Using EasyAuth (AppService Authentication) with ASP.NET Core

13
Comments
3 min read
Secure Firestore rules for Firebase

Secure Firestore rules for Firebase

10
Comments
5 min read
The bug which worth 2k$

The bug which worth 2k$

4
Comments
1 min read
How to secure a REST API using JWT

How to secure a REST API using JWT

6
Comments
7 min read
Securing Credentials for PHP with Docker

Securing Credentials for PHP with Docker

13
Comments
12 min read
Enabling CORS in Dotnet Core

Enabling CORS in Dotnet Core

9
Comments
1 min read
AppArmor with Python

AppArmor with Python

3
Comments
2 min read
Keeping Credentials Secure in PHP

Keeping Credentials Secure in PHP

59
Comments 5
10 min read
Explain How I Secure my First Web-Application Like I Am Five

Explain How I Secure my First Web-Application Like I Am Five

8
Comments 8
1 min read
OverTheWire Bandit Level 1 Level 2 walk-through

OverTheWire Bandit Level 1 Level 2 walk-through

5
Comments
2 min read
OverTheWire Bandit Level 0 walk-through

OverTheWire Bandit Level 0 walk-through

6
Comments
1 min read
OverTheWire Bandit Level 0 Level 1 walk-through

OverTheWire Bandit Level 0 Level 1 walk-through

5
Comments
1 min read
Shall We Begin? >:-)

Shall We Begin? >:-)

9
Comments
2 min read
Reverse Engineering Game Files

Reverse Engineering Game Files

82
Comments 10
5 min read
How CloudFlare could have avoided its outage (maybe)

How CloudFlare could have avoided its outage (maybe)

18
Comments 6
3 min read
Why ‘Sign in with Apple’ is Actually Pretty Great

Why ‘Sign in with Apple’ is Actually Pretty Great

4
Comments
8 min read
Svelete & Firebase User authentication

Svelete & Firebase User authentication

16
Comments
6 min read
Are you vulnerable to a SQL injection attack? Exploiting with Sqlmap

Are you vulnerable to a SQL injection attack? Exploiting with Sqlmap

34
Comments
4 min read
Understanding SQL Injection and Prevention using Parameter Binding in PHP

Understanding SQL Injection and Prevention using Parameter Binding in PHP

32
Comments 3
1 min read
Some US prisons are banning books on coding

Some US prisons are banning books on coding

89
Comments 43
1 min read
Why Listening to the Survivors on Your Team is Vitally Important

Why Listening to the Survivors on Your Team is Vitally Important

22
Comments 2
4 min read
Application Obfuscation on iOS

Application Obfuscation on iOS

15
Comments 2
7 min read
Accessibility: Expanding the Definition

Accessibility: Expanding the Definition

13
Comments
3 min read
BCrypt == Ruby 'magic'??

BCrypt == Ruby 'magic'??

8
Comments
6 min read
Security in Insecure world

Security in Insecure world

9
Comments 1
10 min read
Be Prepared! Common Web Application Security Vulnerabilities

Be Prepared! Common Web Application Security Vulnerabilities

8
Comments
5 min read
Security Using Spring and JWT

Security Using Spring and JWT

7
Comments
16 min read
Fingerprinting Your Data

Fingerprinting Your Data

18
Comments 5
4 min read
Pushing Left, Like a Boss — Part 5.5 — File Uploads

Pushing Left, Like a Boss — Part 5.5 — File Uploads

14
Comments
2 min read
What to expect from AWS RE:Inforce?

What to expect from AWS RE:Inforce?

4
Comments 1
1 min read
Angular Authentication using JWT (JSON Web Token)

Angular Authentication using JWT (JSON Web Token)

41
Comments
1 min read
The One Thing You Should Do After Building Best-Practice Docker Image (in 3 minutes)

The One Thing You Should Do After Building Best-Practice Docker Image (in 3 minutes)

9
Comments 1
5 min read
Restrict specific fields updation in Firebase Firestore

Restrict specific fields updation in Firebase Firestore

18
Comments 5
4 min read
How to keep secure your Docker Image

How to keep secure your Docker Image

24
Comments
4 min read
Pushing Left, Like a Boss — Part 5.4 — Session Management

Pushing Left, Like a Boss — Part 5.4 — Session Management

16
Comments 1
1 min read
loading...