DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Configure security for an Azure subscription

Configure security for an Azure subscription

4
Comments 1
2 min read
You gotta keep privileges separated

You gotta keep privileges separated

9
Comments
6 min read
Waves Technical Review

Waves Technical Review

12
Comments 1
6 min read
Data privacy by DNS leak prevention

Data privacy by DNS leak prevention

6
Comments
4 min read
Securing JWT by TOTP, meet the new JWTS

Securing JWT by TOTP, meet the new JWTS

10
Comments
8 min read
From URL JWT token authentication & manually authorizing HttpContext in .Net core MVC

From URL JWT token authentication & manually authorizing HttpContext in .Net core MVC

11
Comments
2 min read
Pushing Left, Like a Boss! -- Part 2: Security Requirements

Pushing Left, Like a Boss! -- Part 2: Security Requirements

33
Comments 18
1 min read
Better, Faster, Lighter Java with Java 12 and JHipster 6

Better, Faster, Lighter Java with Java 12 and JHipster 6

11
Comments
8 min read
What Security Through Obscurity Is, and Why It's Evil

What Security Through Obscurity Is, and Why It's Evil

128
Comments 15
5 min read
How to Learn Penetration Testing: A Beginners Tutorial

How to Learn Penetration Testing: A Beginners Tutorial

722
Comments 17
9 min read
MySQL/MariaDB: like a Petya ransomware for MySQL and ‘root’@’%’ access

MySQL/MariaDB: like a Petya ransomware for MySQL and ‘root’@’%’ access

9
Comments 2
3 min read
An overview about hash functions: Theory and Security

An overview about hash functions: Theory and Security

6
Comments
6 min read
How to Find Subdomains on a Website (And Why You Should)

How to Find Subdomains on a Website (And Why You Should)

212
Comments 11
4 min read
Tip #5 - audit your project for vulnerabilities in your open source dependencies

Tip #5 - audit your project for vulnerabilities in your open source dependencies

9
Comments
2 min read
How does Tor really work?

How does Tor really work?

161
Comments 4
17 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

75
Comments 5
1 min read
AWS White Paper Walkthrough - Security Overview of AWS Lambda March 2019 30:44

AWS White Paper Walkthrough - Security Overview of AWS Lambda March 2019

16
Comments 2
1 min read
Security Headers to use on your webserver

Security Headers to use on your webserver

159
Comments 9
15 min read
Root-Me: ExploitMe – Basic Buffer Overflow

Root-Me: ExploitMe – Basic Buffer Overflow

16
Comments 1
3 min read
Why HTTPS Makes A Difference

Why HTTPS Makes A Difference

93
Comments 9
3 min read
The Fast Track to AWS Security - Feb 26 2019 34:20

The Fast Track to AWS Security - Feb 26 2019

20
Comments
1 min read
Protecting Your API Keys - Rails

Protecting Your API Keys - Rails

11
Comments 1
2 min read
Learning Python Networking

Learning Python Networking

11
Comments
1 min read
Do your tech demos share too much?

Do your tech demos share too much?

5
Comments 1
4 min read
ClamAV: Fixing freshclam's Hanging Up

ClamAV: Fixing freshclam's Hanging Up

5
Comments 1
2 min read
Mastering Python for Networking and Security

Mastering Python for Networking and Security

10
Comments
2 min read
Solving a CTF challenge

Solving a CTF challenge

20
Comments 1
3 min read
How to Hire a Cybersecurity Expert (Before It’s Too Late)

How to Hire a Cybersecurity Expert (Before It’s Too Late)

5
Comments 2
4 min read
Top 3 Development Trends in 2019

Top 3 Development Trends in 2019

61
Comments 2
3 min read
CIA: Confidentiality, Integrity and Availability

CIA: Confidentiality, Integrity and Availability

15
Comments 2
4 min read
Facebook stored hundreds of millions of passwords in plaintext

Facebook stored hundreds of millions of passwords in plaintext

66
Comments 29
1 min read
Levelling-up your SSH Private Key from RSA to ED25519 + Symmetric Password Protection

Levelling-up your SSH Private Key from RSA to ED25519 + Symmetric Password Protection

12
Comments
2 min read
This is why I use KeyCloak?

This is why I use KeyCloak?

4
Comments
2 min read
Securing environment variables with lastpass

Securing environment variables with lastpass

17
Comments 3
2 min read
Share a NAT-GW through TGW

Share a NAT-GW through TGW

1
Comments
3 min read
Firestore Database Structure and Security:

Firestore Database Structure and Security:

16
Comments
6 min read
Top 10 Tips to Secure SSH Your Server

Top 10 Tips to Secure SSH Your Server

76
Comments 4
4 min read
Azure Key Vault

Azure Key Vault

6
Comments
3 min read
Secure Your Mobile App - Episode Four (Secure User Auth)

Secure Your Mobile App - Episode Four (Secure User Auth)

6
Comments
5 min read
Secure Your Mobile App - Episode Three (Securing Data in Transit)

Secure Your Mobile App - Episode Three (Securing Data in Transit)

5
Comments
4 min read
Monit: email alerting on an SSH logins

Monit: email alerting on an SSH logins

18
Comments
3 min read
What is CTF and how to get started!

What is CTF and how to get started!

560
Comments 21
3 min read
Break the Ice — Hardware CTF

Break the Ice — Hardware CTF

16
Comments
7 min read
Privacy by design (Pragmatic Privacy for Programmers, Part 3)

Privacy by design (Pragmatic Privacy for Programmers, Part 3)

10
Comments 2
6 min read
Secure Your Mobile App - Episode Two (Securing Data at Rest)

Secure Your Mobile App - Episode Two (Securing Data at Rest)

8
Comments
5 min read
Logging Activity With Laravel and Pusher

Logging Activity With Laravel and Pusher

11
Comments
3 min read
Secure Your Mobile App - Episode One (Protecting the Code)

Secure Your Mobile App - Episode One (Protecting the Code)

4
Comments
9 min read
Securing Logic App Http triggers

Securing Logic App Http triggers

6
Comments
5 min read
A Quick Guide to OAuth 2.0 with Spring Security

A Quick Guide to OAuth 2.0 with Spring Security

20
Comments
12 min read
Security For Your Web Apps - And Why It's Important

Security For Your Web Apps - And Why It's Important

82
Comments 2
5 min read
Docker images and playing cards: a security illustration

Docker images and playing cards: a security illustration

11
Comments
2 min read
This Why You Should Start doing Code Reviews

This Why You Should Start doing Code Reviews

11
Comments 1
2 min read
Phones Are Scary

Phones Are Scary

5
Comments 3
4 min read
Authentication, Authorization, and OAuth

Authentication, Authorization, and OAuth

15
Comments
4 min read
Root Me: ELF-CrackPass with NSA's Ghidra

Root Me: ELF-CrackPass with NSA's Ghidra

17
Comments 6
7 min read
Nevertheless, Paula Coded

Nevertheless, Paula Coded

47
Comments 3
2 min read
The anatomy of a critical vulnerability

The anatomy of a critical vulnerability

13
Comments
4 min read
10 Awesome Security Tips for Python Enthusiasts

10 Awesome Security Tips for Python Enthusiasts

59
Comments
4 min read
Phishing my company. An infosec lesson for businesses

Phishing my company. An infosec lesson for businesses

7
Comments 1
5 min read
How to avoid leaking secrets to the npm registry

How to avoid leaking secrets to the npm registry

42
Comments
2 min read
loading...