DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Password Strength Checker in Python

Building a Password Strength Checker in Python

4
Comments
3 min read
Streamlining SSH Key Management

Streamlining SSH Key Management

5
Comments
4 min read
You do not know, what you do not know.

You do not know, what you do not know.

Comments
2 min read
Securing Your Website with Basic Auth for NGINX

Securing Your Website with Basic Auth for NGINX

1
Comments
4 min read
AWS Security Groups, Instance Types, and EC2 Pricing - Week Ten

AWS Security Groups, Instance Types, and EC2 Pricing - Week Ten

Comments
3 min read
🔐 Information Security and Data Privacy: Protect Your Online Information

🔐 Information Security and Data Privacy: Protect Your Online Information

2
Comments
3 min read
How to Generate RSA Key Using JavaScript and Python

How to Generate RSA Key Using JavaScript and Python

Comments
4 min read
Guardians of the Records: Casting Spells for Secure Sharing in Dataverse

Guardians of the Records: Casting Spells for Secure Sharing in Dataverse

11
Comments
3 min read
Security news weekly round-up - 11th October 2024

Security news weekly round-up - 11th October 2024

1
Comments
3 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments 1
6 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

1
Comments
2 min read
How to optimize BitNinja for weak servers

How to optimize BitNinja for weak servers

7
Comments
5 min read
Top 10 Tips with Code Examples: C# Application Security

Top 10 Tips with Code Examples: C# Application Security

11
Comments 1
8 min read
Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Comments
5 min read
5 AI-Powered Content Detectors to Help Identify AI-Generated Text

5 AI-Powered Content Detectors to Help Identify AI-Generated Text

2
Comments
5 min read
What happens when a user tries to access a resource in AWS ?

What happens when a user tries to access a resource in AWS ?

Comments
1 min read
Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

1
Comments
7 min read
API7 Enterprise v3.2.16: Integrated Secret Providers

API7 Enterprise v3.2.16: Integrated Secret Providers

1
Comments
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

2
Comments 1
5 min read
Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Comments
4 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

11
Comments 3
10 min read
Dockerfile Best Practices: Writing Efficient and Secure Docker Images

Dockerfile Best Practices: Writing Efficient and Secure Docker Images

50
Comments 4
4 min read
BotKube: Integrando o agente de monitoramento com o Slack

BotKube: Integrando o agente de monitoramento com o Slack

4
Comments
2 min read
Create a self-signed certificate with your own root CA

Create a self-signed certificate with your own root CA

1
Comments
2 min read
ImplementaciĂłn de AutenticaciĂłn Segura en Node.js con JWT

ImplementaciĂłn de AutenticaciĂłn Segura en Node.js con JWT

2
Comments
4 min read
Introduction to Minder

Introduction to Minder

2
Comments
2 min read
E-commerce website vulnerability bounty practice sharing(I)

E-commerce website vulnerability bounty practice sharing(I)

Comments
2 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
Identity and Access Management (IAM) on AWS

Identity and Access Management (IAM) on AWS

Comments
3 min read
Building a Simple Python-Based Firewall for Home Networks

Building a Simple Python-Based Firewall for Home Networks

8
Comments
2 min read
Top 11 CI/CD Tools for 2024

Top 11 CI/CD Tools for 2024

10
Comments
7 min read
Guia super Resumido do PCI-DSS

Guia super Resumido do PCI-DSS

1
Comments
6 min read
Wednesday Links - Edition 2024-09-04

Wednesday Links - Edition 2024-09-04

Comments
1 min read
How will NIS2 affect European Industries

How will NIS2 affect European Industries

Comments
8 min read
CĂłdigo seguro com OWASP e SSDLC - 3 OWASP API Security Top 10

CĂłdigo seguro com OWASP e SSDLC - 3 OWASP API Security Top 10

1
Comments
6 min read
Open Source Tool List for Web App Security

Open Source Tool List for Web App Security

1
Comments
4 min read
🔐 Unlocking the Secrets of Data Security: Cryptography, Encryption, and Hashing Made Simple 🛡️

🔐 Unlocking the Secrets of Data Security: Cryptography, Encryption, and Hashing Made Simple 🛡️

Comments
3 min read
Issue 60 of AWS Cloud Security Weekly

Issue 60 of AWS Cloud Security Weekly

Comments
2 min read
The Most Important Setting in Your Power Platform

The Most Important Setting in Your Power Platform

21
Comments 2
3 min read
Analyzing Preview Bot Behaviour

Analyzing Preview Bot Behaviour

Comments
3 min read
Prevention: It's Time to Save Those Millions

Prevention: It's Time to Save Those Millions

1
Comments
2 min read
Hot Takes and Cool Strategies: BSides Las Vegas 2024

Hot Takes and Cool Strategies: BSides Las Vegas 2024

Comments
6 min read
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.

Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.

Comments 1
9 min read
Build An Advanced Password Cracker With Python (Complete Guide)

Build An Advanced Password Cracker With Python (Complete Guide)

12
Comments
8 min read
Secure Data Stack: Navigating Adoption Challenges of Data Encryption

Secure Data Stack: Navigating Adoption Challenges of Data Encryption

1
Comments
5 min read
Boost Your Git Workflow: Adding SSH Keys for Secure Repository Access

Boost Your Git Workflow: Adding SSH Keys for Secure Repository Access

Comments
3 min read
CĂłmo Compartir un Secreto: Desglosando el MĂŠtodo de Adi Shamir para la Seguridad de Datos

CĂłmo Compartir un Secreto: Desglosando el MĂŠtodo de Adi Shamir para la Seguridad de Datos

Comments
4 min read
Defense in Depth approach using AWS

Defense in Depth approach using AWS

5
Comments 2
12 min read
Node.js to support ESM Require: What this means for NestJS developers and other CommonJS frameworks

Node.js to support ESM Require: What this means for NestJS developers and other CommonJS frameworks

5
Comments
8 min read
Enhancing Frontend Security: Protecting Your Applications from Modern Threats

Enhancing Frontend Security: Protecting Your Applications from Modern Threats

Comments
2 min read
Passwords: Are they going extinct?

Passwords: Are they going extinct?

6
Comments
6 min read
The Day a DDOS Attack Led to the Most Awkward Hello World

The Day a DDOS Attack Led to the Most Awkward Hello World

15
Comments
2 min read
Issue 63 of AWS Cloud Security Weekly

Issue 63 of AWS Cloud Security Weekly

5
Comments
3 min read
More Secure JWT | A Better Experience

More Secure JWT | A Better Experience

8
Comments
6 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

13
Comments
4 min read
Security news weekly round-up - 4th October 2024

Security news weekly round-up - 4th October 2024

1
Comments
3 min read
Introduction to System Design: A Beginner-Friendly Guide

Introduction to System Design: A Beginner-Friendly Guide

5
Comments
6 min read
Project Overview: AWS Inspector in Jenkins Pipeline

Project Overview: AWS Inspector in Jenkins Pipeline

15
Comments
3 min read
How to Use Secrets in GitHub Actions Workflows

How to Use Secrets in GitHub Actions Workflows

13
Comments 1
4 min read
loading...