DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to use SSH properly and what is SSH Agent Forwarding

How to use SSH properly and what is SSH Agent Forwarding

117
Comments 22
4 min read
Flatter Data

Flatter Data

16
Comments
2 min read
Security holes in PHP

Security holes in PHP

15
Comments 14
1 min read
Start assessing the security of your Android application

Start assessing the security of your Android application

15
Comments 1
8 min read
ウェブサーバー のセキュリティの道具: NIKTO

ウェブサーバー のセキュリティの道具: NIKTO

9
Comments 1
1 min read
Prevent phishing on the web with crypto

Prevent phishing on the web with crypto

38
Comments 2
3 min read
Handling Passwords

Handling Passwords

16
Comments 12
2 min read
The ultimate PHP security checklist

The ultimate PHP security checklist

16
Comments
2 min read
Brakeman

Brakeman

6
Comments
1 min read
I Published My AWS Secret Key to GitHub

I Published My AWS Secret Key to GitHub

7
Comments
4 min read
Build a Simple REST API with Node and OAuth 2.0

Build a Simple REST API with Node and OAuth 2.0

22
Comments
17 min read
PSA - Posting your preferences and phishing.

PSA - Posting your preferences and phishing.

18
Comments
2 min read
I'm 18 and I do systems security, Ask Me Anything!

I'm 18 and I do systems security, Ask Me Anything!

26
Comments 30
1 min read
Build and Understand a Simple Node.js Website with User Authentication

Build and Understand a Simple Node.js Website with User Authentication

12
Comments 2
22 min read
You might need a Web Application Security Scanner - but which one?

You might need a Web Application Security Scanner - but which one?

35
Comments 7
3 min read
Security Tips for a PHP Application

Security Tips for a PHP Application

236
Comments 18
3 min read
BlackHat - Let's Talk About Security

BlackHat - Let's Talk About Security

19
Comments
1 min read
Loading environment variables in JS apps

Loading environment variables in JS apps

168
Comments 19
3 min read
2FA, SMS, and you

2FA, SMS, and you

18
Comments 4
3 min read
Welcome to Los Angeles 2019

Welcome to Los Angeles 2019

56
Comments
5 min read
I'd rather you did not ...

I'd rather you did not ...

12
Comments 1
1 min read
Spoof a commit on GitHub. From Anyone.

Spoof a commit on GitHub. From Anyone.

106
Comments 14
2 min read
From data leak to account takeover

From data leak to account takeover

63
Comments 5
3 min read
Set up your Android app for Offensive Security

Set up your Android app for Offensive Security

23
Comments 2
6 min read
Offensive security on an Android app

Offensive security on an Android app

29
Comments 7
5 min read
Storing confidential data in the cloud securely with Cryptomator

Storing confidential data in the cloud securely with Cryptomator

87
Comments 3
6 min read
Why you should practice security to better secure your application.

Why you should practice security to better secure your application.

23
Comments 2
4 min read
SQL: Where spaces may not matter

SQL: Where spaces may not matter

60
Comments 8
4 min read
How to Build 2 Factor Auth for Home Wi-Fi?

How to Build 2 Factor Auth for Home Wi-Fi?

20
Comments
2 min read
Docker Security Best-Practices

Docker Security Best-Practices

160
Comments 3
4 min read
Kubernetes Security Best-Practices

Kubernetes Security Best-Practices

110
Comments 6
10 min read
I was billed for 14k USD on Amazon Web Services 😱

I was billed for 14k USD on Amazon Web Services 😱

350
Comments 90
3 min read
Crypto-anchors - an innovative technology for supply chain security and visibility

Crypto-anchors - an innovative technology for supply chain security and visibility

23
Comments 1
2 min read
How to install Let's Encrypt on Apache running Ubuntu 16.04

How to install Let's Encrypt on Apache running Ubuntu 16.04

9
Comments
1 min read
Tech Blog has moved to blog.osninja.io

Tech Blog has moved to blog.osninja.io

6
Comments
1 min read
Learn from others mistakes: How not to write a PHP install script

Learn from others mistakes: How not to write a PHP install script

36
Comments 2
6 min read
Local development with HTTPS on OSX

Local development with HTTPS on OSX

61
Comments 13
5 min read
Free website vulnerability scanner for developers

Free website vulnerability scanner for developers

14
Comments 2
1 min read
Spot the malware

Spot the malware

41
Comments 9
2 min read
Everyone is watching what you do online. How user tracking with cookies works

Everyone is watching what you do online. How user tracking with cookies works

39
Comments 1
5 min read
OAuth 2.0 from the Command Line

OAuth 2.0 from the Command Line

12
Comments
7 min read
Virus in eslint-scope 3.7.2

Virus in eslint-scope 3.7.2

47
Comments 1
1 min read
Hive Mind, security in distributed IoT

Hive Mind, security in distributed IoT

25
Comments 5
4 min read
Do password rules impact security?

Do password rules impact security?

37
Comments 25
1 min read
Upcoming OpenShift Container Security Post

Upcoming OpenShift Container Security Post

8
Comments
1 min read
Flask Tutorial: Simple User Registration and Login

Flask Tutorial: Simple User Registration and Login

27
Comments
14 min read
bro cluster source

bro cluster source

7
Comments
1 min read
Reading Passwords from STDIN in PHP

Reading Passwords from STDIN in PHP

19
Comments 2
1 min read
Painless migration of existing Helm's Tiller setup to Kubernetes Secrets

Painless migration of existing Helm's Tiller setup to Kubernetes Secrets

19
Comments
3 min read
2FA and the Heartbreak of SMS

2FA and the Heartbreak of SMS

8
Comments 3
4 min read
Bro Cluster in Containers

Bro Cluster in Containers

8
Comments
1 min read
Deploy Your Secure Vue.js App to AWS

Deploy Your Secure Vue.js App to AWS

26
Comments
20 min read
Build a Secure CRUD App with ASP.NET Core and React

Build a Secure CRUD App with ASP.NET Core and React

38
Comments
24 min read
Introducing Bancor Protocol, a standard for designing cryptocurrencies

Introducing Bancor Protocol, a standard for designing cryptocurrencies

16
Comments
2 min read
How to solve security issues. 5 Blockchain use cases in security

How to solve security issues. 5 Blockchain use cases in security

22
Comments
3 min read
What Happens If Your JWT Is Stolen?

What Happens If Your JWT Is Stolen?

48
Comments 9
12 min read
Would it be possible for routers to run Let's Encrypt?

Would it be possible for routers to run Let's Encrypt?

16
Comments 7
1 min read
How to Articulate the Value Proposition of AWS in 5 Words

How to Articulate the Value Proposition of AWS in 5 Words

28
Comments 1
4 min read
DockerCon Day 3

DockerCon Day 3

17
Comments
1 min read
DockerCon Day 2

DockerCon Day 2

8
Comments
1 min read
loading...