DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Kubernetes Open Sourced their Security Audit. That's Awesome.

Kubernetes Open Sourced their Security Audit. That's Awesome.

14
Comments
4 min read
Securing secret key in Android using Keystore

Securing secret key in Android using Keystore

7
Comments
4 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

40
Comments 11
8 min read
Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

3
Comments
1 min read
Learn the Django User Authentication System

Learn the Django User Authentication System

12
Comments
2 min read
Negotiating security requirements with clients

Negotiating security requirements with clients

5
Comments
2 min read
Five things I knew about security, before I knew anything about security

Five things I knew about security, before I knew anything about security

88
Comments 8
5 min read
6 Best Practices for Successful SIEM Implementation

6 Best Practices for Successful SIEM Implementation

12
Comments
5 min read
What Is Step-Up Authentication, and When Should You Use It?

What Is Step-Up Authentication, and When Should You Use It?

5
Comments
1 min read
Picking the FB50 smart lock (CVE-2019-13143)

Picking the FB50 smart lock (CVE-2019-13143)

10
Comments
4 min read
The Comprehensive Guide to WordPress Security in 2019

The Comprehensive Guide to WordPress Security in 2019

59
Comments 1
13 min read
Creating and Remembering a Strong Passphrase

Creating and Remembering a Strong Passphrase

3
Comments 1
3 min read
How Do I Hunt Down Social Media Accounts Using Sherlock?

How Do I Hunt Down Social Media Accounts Using Sherlock?

20
Comments 2
2 min read
Secure Docker : Enable Docker Content Trust

Secure Docker : Enable Docker Content Trust

10
Comments
2 min read
Deception Technology as a Strategy for Cyber Security

Deception Technology as a Strategy for Cyber Security

4
Comments
5 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
OverTheWire Bandit Level 2 Level 3 walk-through

OverTheWire Bandit Level 2 Level 3 walk-through

5
Comments
1 min read
Systemd security w/o User directive

Systemd security w/o User directive

4
Comments 1
1 min read
How to Improve Your Azure Security with the Secure DevOps Kit for Azure (AzSK)

How to Improve Your Azure Security with the Secure DevOps Kit for Azure (AzSK)

9
Comments
6 min read
Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

87
Comments 3
4 min read
Locking javascript to a domain: Part I

Locking javascript to a domain: Part I

35
Comments 8
3 min read
Access Control

Access Control

37
Comments
6 min read
5 must-do security tips for developers

5 must-do security tips for developers

105
Comments 8
3 min read
What's the best way to report a security hole to a small company?

What's the best way to report a security hole to a small company?

2
Comments 2
1 min read
Xss JaVaSCRipt PoLYglOTs

Xss JaVaSCRipt PoLYglOTs

33
Comments 2
3 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
Pushing Left, Like a Boss — Part 5.7 — URL Parameters

Pushing Left, Like a Boss — Part 5.7 — URL Parameters

7
Comments
1 min read
Hacking 101

Hacking 101

26
Comments 1
8 min read
Cookie Expiry Pitfalls

Cookie Expiry Pitfalls

6
Comments
2 min read
Can WordPress Developers and Security Researchers get along?

Can WordPress Developers and Security Researchers get along?

33
Comments
7 min read
Osgood and CouchDB

Osgood and CouchDB

4
Comments
5 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

52
Comments
3 min read
Pushing Left, Like a Boss — Part 5.6 — Redirects and Forwards

Pushing Left, Like a Boss — Part 5.6 — Redirects and Forwards

8
Comments
1 min read
What if your laptop or hard drive with sensitive data is stolen or you lost it?

What if your laptop or hard drive with sensitive data is stolen or you lost it?

11
Comments
6 min read
How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

158
Comments 29
6 min read
How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

92
Comments 6
7 min read
.innerHTML Cross-site Scripting

.innerHTML Cross-site Scripting

26
Comments 3
3 min read
Reconfirmable: integrating Devise into a non-standard registration system

Reconfirmable: integrating Devise into a non-standard registration system

12
Comments 1
5 min read
Snyk Security Review

Snyk Security Review

9
Comments
1 min read
Environment variables in Node.js. The Right way!

Environment variables in Node.js. The Right way!

37
Comments 19
4 min read
The World's most dangerous search engine:Shodan

The World's most dangerous search engine:Shodan

17
Comments 5
1 min read
[Video] Raiders of the Javascript-based Malware

[Video] Raiders of the Javascript-based Malware

3
Comments
1 min read
Boring a server to death - The Slow Loris Attack

Boring a server to death - The Slow Loris Attack

41
Comments 2
5 min read
How to deal with GitHub spambots

How to deal with GitHub spambots

62
Comments 3
3 min read
Automate all the security!

Automate all the security!

6
Comments
1 min read
POP's cloud-based security services

POP's cloud-based security services

6
Comments
4 min read
How and when do you decide to update your app's dependencies?

How and when do you decide to update your app's dependencies?

7
Comments 1
2 min read
Why is it worthwhile automating security?

Why is it worthwhile automating security?

4
Comments
2 min read
Using EasyAuth (AppService Authentication) with ASP.NET Core

Using EasyAuth (AppService Authentication) with ASP.NET Core

13
Comments
3 min read
Secure Firestore rules for Firebase

Secure Firestore rules for Firebase

10
Comments
5 min read
The bug which worth 2k$

The bug which worth 2k$

4
Comments
1 min read
How to secure a REST API using JWT

How to secure a REST API using JWT

6
Comments
7 min read
Securing Credentials for PHP with Docker

Securing Credentials for PHP with Docker

13
Comments
12 min read
Enabling CORS in Dotnet Core

Enabling CORS in Dotnet Core

9
Comments
1 min read
AppArmor with Python

AppArmor with Python

3
Comments
2 min read
Keeping Credentials Secure in PHP

Keeping Credentials Secure in PHP

59
Comments 5
10 min read
Explain How I Secure my First Web-Application Like I Am Five

Explain How I Secure my First Web-Application Like I Am Five

8
Comments 8
1 min read
OverTheWire Bandit Level 1 Level 2 walk-through

OverTheWire Bandit Level 1 Level 2 walk-through

5
Comments
2 min read
OverTheWire Bandit Level 0 walk-through

OverTheWire Bandit Level 0 walk-through

6
Comments
1 min read
OverTheWire Bandit Level 0 Level 1 walk-through

OverTheWire Bandit Level 0 Level 1 walk-through

5
Comments
1 min read
loading...