DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Quick and dirty .htaccess for small personal sites

Quick and dirty .htaccess for small personal sites

73
Comments 11
9 min read
Setting up a company's IT

Setting up a company's IT

4
Comments 6
1 min read
Automate AWS security group with CloudFlare IPs

Automate AWS security group with CloudFlare IPs

49
Comments 3
4 min read
On Cross-Site Scripting and Content Security Policy

On Cross-Site Scripting and Content Security Policy

11
Comments
7 min read
[Video] The State of HTTP Headers with Andrew Betts

[Video] The State of HTTP Headers with Andrew Betts

12
Comments
1 min read
Security Sprint: Falco

Security Sprint: Falco

38
Comments
3 min read
Let's talk about OSC

Let's talk about OSC

30
Comments
2 min read
An Intro On HTTP Security

An Intro On HTTP Security

63
Comments 8
8 min read
Stolen Access Tokens and You

Stolen Access Tokens and You

29
Comments
4 min read
Protect your data with WarShield

Protect your data with WarShield

32
Comments 9
1 min read
a few lessons learned storing secrets in aws parameter store

a few lessons learned storing secrets in aws parameter store

7
Comments
4 min read
IoT botnet construction tool "Mirai" was asked in Most famous Japanese information technology examinations

IoT botnet construction tool "Mirai" was asked in Most famous Japanese information technology examinations

8
Comments 4
1 min read
Stop using sudo pip install

Stop using sudo pip install

78
Comments 22
2 min read
AWS S3 file upload from client side

AWS S3 file upload from client side

13
Comments 1
2 min read
Store Encrypted Files in Google Drive

Store Encrypted Files in Google Drive

31
Comments 3
12 min read
The day I hacked Troy Hunt's website to delete my data

The day I hacked Troy Hunt's website to delete my data

42
Comments 1
4 min read
Keybase, crypto made simple

Keybase, crypto made simple

7
Comments
1 min read
managing passwords and other secrets across teams

managing passwords and other secrets across teams

10
Comments 3
3 min read
HSTS Preloading using Nginx, Letsencrypt and Capistrano.😎

HSTS Preloading using Nginx, Letsencrypt and Capistrano.😎

15
Comments 2
1 min read
The Intelligent Symbiosis

The Intelligent Symbiosis

6
Comments
9 min read
What security updates should one follow?

What security updates should one follow?

13
Comments
1 min read
How do you authenticate your users?

How do you authenticate your users?

6
Comments 10
1 min read
Store Passwords With KeePass

Store Passwords With KeePass

84
Comments 14
3 min read
Understanding Android Debug Bridge

Understanding Android Debug Bridge

51
Comments 7
11 min read
Anchore Security Bundle Policies

Anchore Security Bundle Policies

8
Comments
1 min read
Introduction to U2F

Introduction to U2F

12
Comments
1 min read
Useful Commands for Log Analysis: Part 2 — Sed

Useful Commands for Log Analysis: Part 2 — Sed

9
Comments
5 min read
This Facebook Security Breach was "Intended Functionality"

This Facebook Security Breach was "Intended Functionality"

59
Comments 38
2 min read
Policy-Based Client-Side Encryption in Angular

Policy-Based Client-Side Encryption in Angular

18
Comments 3
12 min read
Hardening Services With Systemd

Hardening Services With Systemd

10
Comments
3 min read
Web Developer Security Checklist V2

Web Developer Security Checklist V2

285
Comments 20
8 min read
セキュリティ文化は、計画的で、且つ、持続可能である必要がある [翻訳記事]

セキュリティ文化は、計画的で、且つ、持続可能である必要がある [翻訳記事]

6
Comments
1 min read
I reported a security vulnerability. Now what?

I reported a security vulnerability. Now what?

17
Comments 5
1 min read
Implementing Impersonation

Implementing Impersonation

40
Comments 2
5 min read
PHP Pseudo Random String

PHP Pseudo Random String

7
Comments
1 min read
Keybase - Crypto made simple

Keybase - Crypto made simple

5
Comments
6 min read
A good reason not to use OAuth only accounts in your apps

A good reason not to use OAuth only accounts in your apps

14
Comments 18
1 min read
Browser Based Cyber Threats

Browser Based Cyber Threats

13
Comments 3
2 min read
Anchore Security Policy Bundles and Container Security Fundamentals

Anchore Security Policy Bundles and Container Security Fundamentals

7
Comments
1 min read
PHP Security: Introduction

PHP Security: Introduction

77
Comments 15
2 min read
Do you know that DNS queries do not protect your privacy?

Do you know that DNS queries do not protect your privacy?

13
Comments 1
1 min read
Tips to Improve MongoDB Security

Tips to Improve MongoDB Security

13
Comments
3 min read
PHP Security: Passwords

PHP Security: Passwords

32
Comments 21
4 min read
OWASP - Who?

OWASP - Who?

91
Comments 11
4 min read
Developing Style: Sinatra Security, Decorator Design Pattern

Developing Style: Sinatra Security, Decorator Design Pattern

14
Comments
14 min read
Three Steps For Increasing The Security of Your Web Apps

Three Steps For Increasing The Security of Your Web Apps

194
Comments 16
6 min read
Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

206
Comments 12
5 min read
Finding Common Security Issues in Python Code with Bandit

Finding Common Security Issues in Python Code with Bandit

41
Comments
1 min read
Raising security awareness with a CTF competition... did you already participate in one, how it was?

Raising security awareness with a CTF competition... did you already participate in one, how it was?

7
Comments
1 min read
Openldap Tutorial – Practical Realtime Implementation and Integration

Openldap Tutorial – Practical Realtime Implementation and Integration

11
Comments
1 min read
Revenge Hacking Is Hitting the Big Time

Revenge Hacking Is Hitting the Big Time

29
Comments 4
1 min read
Build a Desktop App with Electron and Authentication

Build a Desktop App with Electron and Authentication

29
Comments
10 min read
Securing Internal Services Behind an OAuth2 Provider with Caddy

Securing Internal Services Behind an OAuth2 Provider with Caddy

13
Comments
6 min read
Java Map keys should always be Comparable

Java Map keys should always be Comparable

16
Comments 1
3 min read
The Agile and the Beast

The Agile and the Beast

14
Comments
3 min read
What is DevSecOps?

What is DevSecOps?

58
Comments 3
5 min read
I have been banned from Lobste.rs, ask me anything.

I have been banned from Lobste.rs, ask me anything.

40
Comments 24
6 min read
乗っ取りに成功: dev.to をハッキング [翻訳記事]

乗っ取りに成功: dev.to をハッキング [翻訳記事]

8
Comments
2 min read
Segurança no MongoDB - Parte 2 - Autorização

Segurança no MongoDB - Parte 2 - Autorização

17
Comments 3
4 min read
How to set Firebase security rules for your Flamelink project

How to set Firebase security rules for your Flamelink project

8
Comments
9 min read
loading...