DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Generic top level domains and security

Generic top level domains and security

7
Comments
5 min read
Would you send a plain text password from your website to the server over a secure connection?

Would you send a plain text password from your website to the server over a secure connection?

19
Comments 35
1 min read
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby’s native resolver.

Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby’s native resolver.

14
Comments
7 min read
Rubber Ducky

Rubber Ducky

35
Comments 3
2 min read
Tanker is hiring software engineers

Tanker is hiring software engineers

8
Comments 2
2 min read
The importance of Human security

The importance of Human security

6
Comments 2
2 min read
How to securely store API keys

How to securely store API keys

207
Comments 28
5 min read
Is Your Security Scaling Up Along with Your Operation?

Is Your Security Scaling Up Along with Your Operation?

6
Comments
1 min read
Password Managers Are Too Difficult

Password Managers Are Too Difficult

23
Comments 5
2 min read
Let's Have a Talk About App Permissions

Let's Have a Talk About App Permissions

13
Comments
4 min read
It’s All In The Timing: Timing Attacks For Dummies

It’s All In The Timing: Timing Attacks For Dummies

40
Comments 6
3 min read
2FA, phishing and U2F

2FA, phishing and U2F

18
Comments 2
5 min read
In defense of Cat5e

In defense of Cat5e

19
Comments 2
3 min read
Using end2end encryption for ensuring mobile app security and data privacy

Using end2end encryption for ensuring mobile app security and data privacy

8
Comments 2
2 min read
Use Go Channels to Build a Crawler

Use Go Channels to Build a Crawler

15
Comments
5 min read
Protect your npm account with 2FA and Authy

Protect your npm account with 2FA and Authy

18
Comments
5 min read
Docker: Restricting in- and outbound network traffic

Docker: Restricting in- and outbound network traffic

29
Comments 14
3 min read
WordPress With A Future Focused On Security

WordPress With A Future Focused On Security

10
Comments
3 min read
Fun with secrets

Fun with secrets

28
Comments
3 min read
Who do you think you are?

Who do you think you are?

11
Comments
5 min read
Network Sniffing with Fiddler

Network Sniffing with Fiddler

25
Comments 4
2 min read
Keep Your SharePoint As Secure As Your Bank’s

Keep Your SharePoint As Secure As Your Bank’s

18
Comments 1
4 min read
Acknowledgement From Intel

Acknowledgement From Intel

2
Comments
1 min read
Acknowledgement From Microsoft

Acknowledgement From Microsoft

2
Comments
4 min read
<svg%0Aonauxclick=0;[1].some(confirm)//

<svg%0Aonauxclick=0;[1].some(confirm)//

11
Comments 17
1 min read
Explain CSRF like I'm five.

Explain CSRF like I'm five.

17
Comments 1
1 min read
Ensure secured connections with HSTS (HTTP Strict Transport Security)

Ensure secured connections with HSTS (HTTP Strict Transport Security)

22
Comments
5 min read
Why Password Length is so Important

Why Password Length is so Important

36
Comments 11
4 min read
Securing Your ASP.NET Application

Securing Your ASP.NET Application

28
Comments 5
4 min read
Cheap sudo tricks

Cheap sudo tricks

4
Comments
1 min read
A full time developer and a full time hacker

A full time developer and a full time hacker

26
Comments
5 min read
Growing Importance of SSL Certificates and their Advantages

Growing Importance of SSL Certificates and their Advantages

4
Comments 1
2 min read
New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary

New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary

4
Comments
5 min read
Hack more, learn more, earn more and get invited more.

Hack more, learn more, earn more and get invited more.

31
Comments 1
7 min read
Random vs. Pseudorandom

Random vs. Pseudorandom

41
Comments 2
9 min read
Apple Silicon Is Also A Chance To Improve Security

Apple Silicon Is Also A Chance To Improve Security

2
Comments
2 min read
What are the best SEO Strategies?

What are the best SEO Strategies?

3
Comments
2 min read
Monitoring The Cloud

Monitoring The Cloud

7
Comments 3
3 min read
Network Security Monitoring with bro

Network Security Monitoring with bro

16
Comments 3
3 min read
IoT security risks: What are they and how to manage

IoT security risks: What are they and how to manage

4
Comments 1
3 min read
OverTheWire :- Bandit (Level 20–25) [CTF]

OverTheWire :- Bandit (Level 20–25) [CTF]

6
Comments
4 min read
Securely transfer data to client from server application

Securely transfer data to client from server application

6
Comments
1 min read
How to easily add HTTPS to your Server for free!

How to easily add HTTPS to your Server for free!

6
Comments
3 min read
Kerberos explained in pictures

Kerberos explained in pictures

21
Comments 3
4 min read
How to protect Big Data? Top 6 Big Data security challenges

How to protect Big Data? Top 6 Big Data security challenges

17
Comments 2
2 min read
Why We Started Using AWS Secrets Manager

Why We Started Using AWS Secrets Manager

6
Comments 2
3 min read
Invisible reCAPTCHA on mobile?

Invisible reCAPTCHA on mobile?

14
Comments 2
2 min read
How to Secure API Token

How to Secure API Token

4
Comments
2 min read
Explain OAuth2 like I'm five

Explain OAuth2 like I'm five

23
Comments 2
1 min read
Rethinking email confirmation

Rethinking email confirmation

18
Comments 4
4 min read
How I pwned hundreds of users for less than $25?

How I pwned hundreds of users for less than $25?

4
Comments
1 min read
Attacking CI/CD Tools The Crown Jewels — Series 2

Attacking CI/CD Tools The Crown Jewels — Series 2

3
Comments
1 min read
Attacking CI/CD Tools The Crown Jewels — Series 1

Attacking CI/CD Tools The Crown Jewels — Series 1

3
Comments
1 min read
OAuth for Dummies

OAuth for Dummies

73
Comments 4
2 min read
Licensed Revoked; Certificate Status Checking in PKIX

Licensed Revoked; Certificate Status Checking in PKIX

21
Comments
4 min read
SDK for Private & Ethical Access to Personal Data

SDK for Private & Ethical Access to Personal Data

3
Comments
1 min read
What is a WAF?

What is a WAF?

18
Comments 1
2 min read
Spot False Positives in Static Scans: Insecure Randomness

Spot False Positives in Static Scans: Insecure Randomness

6
Comments
4 min read
7 Cloud Computing Security Vulnerabilities and What to Do About Them

7 Cloud Computing Security Vulnerabilities and What to Do About Them

13
Comments
10 min read
What is Encryption?

What is Encryption?

22
Comments 7
5 min read
loading...