DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Prevent Your Users from Using Breached Passwords

How to Prevent Your Users from Using Breached Passwords

12
Comments 2
4 min read
Argon2 for Dovecot on Debian

Argon2 for Dovecot on Debian

10
Comments
2 min read
Uncover Bad Network Traffic on your Phone

Uncover Bad Network Traffic on your Phone

28
Comments 1
2 min read
Explain OAuth like I'm Five

Explain OAuth like I'm Five

50
Comments 3
1 min read
Keeping tabs on shady internet authorities -- What is Certificate Transparency?

Keeping tabs on shady internet authorities -- What is Certificate Transparency?

42
Comments 2
3 min read
Don't Put Personal Information in Code!

Don't Put Personal Information in Code!

35
Comments 2
2 min read
is LDAP still relevant in terms of being a security source provider?

is LDAP still relevant in terms of being a security source provider?

7
Comments 1
1 min read
Five weak spots of iOS app security and how to address them

Five weak spots of iOS app security and how to address them

14
Comments 1
4 min read
Encrypting Files in a Post-PGP Age

Encrypting Files in a Post-PGP Age

24
Comments 3
5 min read
Announcing PassProtect - Proactive Web Security

Announcing PassProtect - Proactive Web Security

9
Comments
3 min read
What is the OAuth 2.0 Implicit Grant Type?

What is the OAuth 2.0 Implicit Grant Type?

10
Comments
6 min read
Securing Dependencies for Rails 5.2 Active Storage

Securing Dependencies for Rails 5.2 Active Storage

6
Comments
6 min read
What is CSP? Why & How to Add it to Your Website.

What is CSP? Why & How to Add it to Your Website.

128
Comments 10
9 min read
Security and the Future of it with Laura Bell

Security and the Future of it with Laura Bell

37
Comments 2
4 min read
Setting Up a CentOS Server

Setting Up a CentOS Server

46
Comments
8 min read
EFAIL mitigations

EFAIL mitigations

14
Comments 5
1 min read
Five Tips for Better MongoDB Hosting on Azure

Five Tips for Better MongoDB Hosting on Azure

8
Comments
5 min read
Security with Haskell

Security with Haskell

61
Comments 2
2 min read
Computer Security Algorithms package in csharp

Computer Security Algorithms package in csharp

86
Comments
1 min read
Cryptoheist!

Cryptoheist!

37
Comments 5
6 min read
Error messages in login process: Privacy and Security

Error messages in login process: Privacy and Security

11
Comments
3 min read
GDPR Is Making Changes In Tech Data Strategy, Are you ready?

GDPR Is Making Changes In Tech Data Strategy, Are you ready?

18
Comments 10
3 min read
Immutable infrastructure can be dramatically more secure

Immutable infrastructure can be dramatically more secure

19
Comments
3 min read
Breaking bad to make good: Firefox CVE-2017–7843

Breaking bad to make good: Firefox CVE-2017–7843

29
Comments
3 min read
Kristina Balaam on Breaking in to Security

Kristina Balaam on Breaking in to Security

91
Comments
5 min read
NMandelbrot : running arbitrary code on client

NMandelbrot : running arbitrary code on client

8
Comments
2 min read
Everything you need to know about Linux Logs

Everything you need to know about Linux Logs

17
Comments
1 min read
WebAuthn: A Developer's Guide to What's on the Horizon

WebAuthn: A Developer's Guide to What's on the Horizon

9
Comments
3 min read
Check Your Passwords for Pwnage - The Pythonic Way

Check Your Passwords for Pwnage - The Pythonic Way

35
Comments 3
2 min read
Web Developer Security Checklist V1

Web Developer Security Checklist V1

310
Comments 12
5 min read
Automating your reconnaissance workflow with meg

Automating your reconnaissance workflow with meg

22
Comments
3 min read
RESTful Security: Plug the Leaks!

RESTful Security: Plug the Leaks!

74
Comments 11
2 min read
Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky

Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky

151
Comments 2
5 min read
The Fundamentals of Security Every Developer Should Understand

The Fundamentals of Security Every Developer Should Understand

332
Comments 9
1 min read
How to DOS Yourself With Argon2

How to DOS Yourself With Argon2

15
Comments
3 min read
What is the OAuth 2.0 Authorization Code Grant Type?

What is the OAuth 2.0 Authorization Code Grant Type?

13
Comments
5 min read
Better passwords in Ruby applications with the Pwned Passwords API

Better passwords in Ruby applications with the Pwned Passwords API

108
Comments 8
6 min read
What are some fundamentals of security every developer should understand?

What are some fundamentals of security every developer should understand?

195
Comments 47
1 min read
A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation

A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation

7
Comments
6 min read
What's the big deal with privacy?

What's the big deal with privacy?

26
Comments 21
1 min read
Beefing Up Your Spring Security with Two-Factor Authentication

Beefing Up Your Spring Security with Two-Factor Authentication

16
Comments 1
10 min read
Crypto Is Hard

Crypto Is Hard

10
Comments
1 min read
An in-depth look at CVE-2018-8778 or why integer overflows are still a thing!

An in-depth look at CVE-2018-8778 or why integer overflows are still a thing!

14
Comments 1
8 min read
How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

6
Comments 1
8 min read
Beware of browser extensions that track you everywhere

Beware of browser extensions that track you everywhere

109
Comments 15
1 min read
Testing A WordPress Plugin Can Be Fun!

Testing A WordPress Plugin Can Be Fun!

10
Comments 2
9 min read
Java - JVM Security Information Gathering

Java - JVM Security Information Gathering

10
Comments
2 min read
AWS S3 or the Pandora's box

AWS S3 or the Pandora's box

11
Comments
1 min read
How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

18
Comments 7
2 min read
AWS and Messy Git Practices: SecDSM March MiniCTF Solution

AWS and Messy Git Practices: SecDSM March MiniCTF Solution

34
Comments 2
5 min read
Operation FGTNY 🗽 - Solving the H1-212 CTF.

Operation FGTNY 🗽 - Solving the H1-212 CTF.

11
Comments
11 min read
Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

12
Comments
4 min read
An analysis of logic flaws in web-of-trust services

An analysis of logic flaws in web-of-trust services

16
Comments
5 min read
Protect your Node.js app from Cross-Site Request Forgery

Protect your Node.js app from Cross-Site Request Forgery

160
Comments
6 min read
GitHub for Bug Bounty Hunters

GitHub for Bug Bounty Hunters

15
Comments
4 min read
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

12
Comments
3 min read
A House of Cards: An Exploration of Security When Building Docker Containers

A House of Cards: An Exploration of Security When Building Docker Containers

31
Comments 2
10 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

13
Comments
2 min read
Find security issues before the code goes into production

Find security issues before the code goes into production

20
Comments 1
7 min read
Beyond the login screen - Part II

Beyond the login screen - Part II

14
Comments
5 min read
loading...