DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
RSA: How Maths will protect us while P!=NP

RSA: How Maths will protect us while P!=NP

42
Comments 1
8 min read
How to develop more secure solutions without the hassle

How to develop more secure solutions without the hassle

6
Comments
5 min read
Please don't commit .env

Please don't commit .env

142
Comments 85
4 min read
Poll: Do You Know What "Idempotent" Means?

Poll: Do You Know What "Idempotent" Means?

141
Comments 19
2 min read
Awesome Golang Security 🕶🔐

Awesome Golang Security 🕶🔐

102
Comments 7
1 min read
Learn How to Hack, Capture the Flag for Beginners!

Learn How to Hack, Capture the Flag for Beginners!

123
Comments 3
2 min read
How to be Secure in the Cloud

How to be Secure in the Cloud

34
Comments 3
7 min read
Why You Should Care What You Npm Install

Why You Should Care What You Npm Install

56
Comments 8
4 min read
I dis-agree to all Google's Terms and Policy

I dis-agree to all Google's Terms and Policy

40
Comments 45
1 min read
Facebook Lied : A Facebook Feature Which Kills Another Feature

Facebook Lied : A Facebook Feature Which Kills Another Feature

43
Comments 15
2 min read
How I hate the term «Ethical Hacker» !

How I hate the term «Ethical Hacker» !

51
Comments 15
2 min read
XSS in Ghost

XSS in Ghost

71
Comments 12
9 min read
Awesome PHP Security 🕶🐘🔐

Awesome PHP Security 🕶🐘🔐

45
Comments 2
1 min read
Pragmatic Privacy for Programmers (Part 1)

Pragmatic Privacy for Programmers (Part 1)

39
Comments 1
8 min read
Create a Secure Spring REST API

Create a Secure Spring REST API

17
Comments
9 min read
Protect Application Assets: How to Secure Your Secrets

Protect Application Assets: How to Secure Your Secrets

5
Comments
7 min read
Let's Encrypt: Certbot For OpenBSD's httpd

Let's Encrypt: Certbot For OpenBSD's httpd

23
Comments 2
4 min read
Effective Communication Security / Beyond 'Use Signal Use Tor'

Effective Communication Security / Beyond 'Use Signal Use Tor'

15
Comments 6
3 min read
How to Securely Store a Password in Java

How to Securely Store a Password in Java

118
Comments 21
11 min read
Mixed Content: Fetching data from HTTPS and HTTP

Mixed Content: Fetching data from HTTPS and HTTP

78
Comments 13
7 min read
How to build JWT Authorization in Angular with Router Guards and HTTP Interceptor

How to build JWT Authorization in Angular with Router Guards and HTTP Interceptor

18
Comments 1
1 min read
What It’s Like To Work Through A Security Incident

What It’s Like To Work Through A Security Incident

92
Comments 7
10 min read
Build a Basic App with Spring Boot and JPA using PostgreSQL

Build a Basic App with Spring Boot and JPA using PostgreSQL

8
Comments
19 min read
This is raw

This is raw

6
Comments
2 min read
Demystifying STRIDE Threat Models

Demystifying STRIDE Threat Models

46
Comments 2
5 min read
Password manager recommendations?

Password manager recommendations?

90
Comments 140
1 min read
3 things you might see in your logs once your site is public

3 things you might see in your logs once your site is public

45
Comments 3
4 min read
Security & HTTP Headers

Security & HTTP Headers

128
Comments 6
4 min read
npm package discovered to have bitcoin-stealing backdoor

npm package discovered to have bitcoin-stealing backdoor

73
Comments 33
1 min read
Net Core security - NWebSec to the rescue!

Net Core security - NWebSec to the rescue!

80
Comments 8
3 min read
Why Facebook's api starts with a for loop

Why Facebook's api starts with a for loop

1140
Comments 41
5 min read
Why Hash Maps are Randomized

Why Hash Maps are Randomized

36
Comments 3
2 min read
Beware of the findOne function

Beware of the findOne function

85
Comments 16
3 min read
I'm a security auditor and researcher, Ask Me Anything!

I'm a security auditor and researcher, Ask Me Anything!

38
Comments 32
2 min read
How do we improve security in the npm ecosystem?

How do we improve security in the npm ecosystem?

24
Comments 21
1 min read
How to deal with the event-stream vulnerability

How to deal with the event-stream vulnerability

35
Comments 5
2 min read
A Hypothetical Case of a Phishing Attack

A Hypothetical Case of a Phishing Attack

88
Comments 8
6 min read
Security Sprint: using Seccomp for secure containers.

Security Sprint: using Seccomp for secure containers.

20
Comments
3 min read
NPM... we all knew this would happen eventually

NPM... we all knew this would happen eventually

7
Comments 2
2 min read
セキュリティの分野で Haskell を使用する [翻訳記事]

セキュリティの分野で Haskell を使用する [翻訳記事]

11
Comments 2
2 min read
Should you care about XSS in Vue.js?

Should you care about XSS in Vue.js?

35
Comments 8
5 min read
The How To Of Port Forwarding With SSH

The How To Of Port Forwarding With SSH

51
Comments
5 min read
Comcast is proxying all unencrypted content

Comcast is proxying all unencrypted content

36
Comments 8
1 min read
Using rel=noopener in an anchor tag

Using rel=noopener in an anchor tag

8
Comments
1 min read
Fantastic Passwords and how to generate them

Fantastic Passwords and how to generate them

34
Comments 14
2 min read
WordPress penetration testing

WordPress penetration testing

12
Comments 1
1 min read
HTTPS on static websites?

HTTPS on static websites?

5
Comments
1 min read
Memory leak, redirect loop, deadlock, XSS, CSRF, XEE, ..., understanding bugs by using too buggy web application

Memory leak, redirect loop, deadlock, XSS, CSRF, XEE, ..., understanding bugs by using too buggy web application

61
Comments 3
2 min read
SSH Login Notifications in Slack

SSH Login Notifications in Slack

11
Comments 1
1 min read
SSH Agents In Depth

SSH Agents In Depth

16
Comments
5 min read
How to create a simple Honeypot to protect your Forms against Spammers

How to create a simple Honeypot to protect your Forms against Spammers

135
Comments 32
3 min read
How to properly use passwords

How to properly use passwords

28
Comments 12
3 min read
Security Sprint: The new Internet

Security Sprint: The new Internet

54
Comments 6
2 min read
On defaults in Kubernetes RBAC

On defaults in Kubernetes RBAC

23
Comments
4 min read
Using SSH-Agent to Simplify Your SSH Experience

Using SSH-Agent to Simplify Your SSH Experience

13
Comments
4 min read
What I learned about cryptography in 3 weeks

What I learned about cryptography in 3 weeks

49
Comments 18
2 min read
Wrestling Control of my Webcam

Wrestling Control of my Webcam

19
Comments 5
7 min read
How do you use an SVG as background image without affecting security?

How do you use an SVG as background image without affecting security?

11
Comments 10
1 min read
Users are in for a bad experience with the Mojave app restrictions

Users are in for a bad experience with the Mojave app restrictions

8
Comments
3 min read
How to start a basic bruteforcing attack with anyForm v1.0-0

How to start a basic bruteforcing attack with anyForm v1.0-0

7
Comments 3
2 min read
loading...