DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Predictive vs. Adaptive SDLC: What is the Difference?

Predictive vs. Adaptive SDLC: What is the Difference?

2
Comments
5 min read
A Strategy for Passing AWS Certifications

A Strategy for Passing AWS Certifications

6
Comments 1
4 min read
Evil Session Tokens

Evil Session Tokens

13
Comments 12
2 min read
How my car insurance exposed my position

How my car insurance exposed my position

4
Comments 5
7 min read
Are Your Children Safe?

Are Your Children Safe?

14
Comments
1 min read
My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

57
Comments 14
3 min read
Clarifying Authentication and Authorization with Lupe Fiasco

Clarifying Authentication and Authorization with Lupe Fiasco

3
Comments 1
2 min read
Single Sign-On SSH: User Story

Single Sign-On SSH: User Story

3
Comments
2 min read
How Companies Prey On Your Ignorance of Tech and Your Fear of Hackers

How Companies Prey On Your Ignorance of Tech and Your Fear of Hackers

25
Comments 10
3 min read
Don't Click That Google Docs Link: An Overview of The Google Docs Phish Going Around Today

Don't Click That Google Docs Link: An Overview of The Google Docs Phish Going Around Today

7
Comments
3 min read
Authentication Best Practices in REST and GraphQL APIs

Authentication Best Practices in REST and GraphQL APIs

7
Comments
8 min read
Seven Easy Ways to Protect Your WordPress Site

Seven Easy Ways to Protect Your WordPress Site

2
Comments
4 min read
Fully Remove Zoom from your Mac

Fully Remove Zoom from your Mac

6
Comments
3 min read
Capture the Flag: It's a game for hack...I mean security professionals

Capture the Flag: It's a game for hack...I mean security professionals

59
Comments 9
10 min read
Jupyter notebook to check software for CVE vulnerabilities

Jupyter notebook to check software for CVE vulnerabilities

3
Comments
1 min read
From Cloud Security Alert to Open Source Bugfix

From Cloud Security Alert to Open Source Bugfix

9
Comments
4 min read
Hackers Exploit Two-factor Authentication to Steal Millions and How to Fix It

Hackers Exploit Two-factor Authentication to Steal Millions and How to Fix It

3
Comments
5 min read
Istio Service Mesh in 2020: Envoy In, Control Plane Simplified

Istio Service Mesh in 2020: Envoy In, Control Plane Simplified

6
Comments
4 min read
Know Your Privacy Rights: What Devices And Web Apps Are Hiding From You

Know Your Privacy Rights: What Devices And Web Apps Are Hiding From You

2
Comments
9 min read
Lessons learned while working on large-scale server software

Lessons learned while working on large-scale server software

26
Comments
2 min read
Enviorment variables to keep your app safe

Enviorment variables to keep your app safe

5
Comments
2 min read
Unfolding & Sugar Coating for Kubernetes RBAC

Unfolding & Sugar Coating for Kubernetes RBAC

6
Comments
2 min read
Interferencias, privacy activism

Interferencias, privacy activism

2
Comments 3
1 min read
Sorry, I hacked you.

Sorry, I hacked you.

12
Comments 7
3 min read
How to scan your AWS account for old access keys using python

How to scan your AWS account for old access keys using python

5
Comments
3 min read
What's the best way to connect to an machine behind CGNAT.

What's the best way to connect to an machine behind CGNAT.

7
Comments
1 min read
Analizando un método de bypass de sistemas WAF

Analizando un método de bypass de sistemas WAF

5
Comments
2 min read
The Root Cause of Input-Based Security Vulnerabilities – Don’t Fear the Grammar

The Root Cause of Input-Based Security Vulnerabilities – Don’t Fear the Grammar

8
Comments
3 min read
NKN SDK: powering client side communication without servers

NKN SDK: powering client side communication without servers

6
Comments
3 min read
7 Web Application Security Best Practices You Need to Know

7 Web Application Security Best Practices You Need to Know

7
Comments
1 min read
How to Verify Your Mastodon Account with Keybase

How to Verify Your Mastodon Account with Keybase

9
Comments
3 min read
Self-hosted team password manager using KeeWeb

Self-hosted team password manager using KeeWeb

10
Comments
5 min read
Building simple systems for better security & reliability

Building simple systems for better security & reliability

10
Comments
2 min read
Back to Basics – Updating WordPress Strategies

Back to Basics – Updating WordPress Strategies

5
Comments
16 min read
Scan your PHP project for CVEs

Scan your PHP project for CVEs

7
Comments 2
1 min read
DevSecOps with Azure Pipelines

DevSecOps with Azure Pipelines

4
Comments
1 min read
How to avoid cascading failures in distributed systems

How to avoid cascading failures in distributed systems

14
Comments
3 min read
We spent a day gaming… at work!

We spent a day gaming… at work!

8
Comments 1
4 min read
Detect man in the Middle

Detect man in the Middle

4
Comments
1 min read
Secure Remote File Access for Network Attached Storage (NAS)

Secure Remote File Access for Network Attached Storage (NAS)

8
Comments
4 min read
Decrypting BCrypt

Decrypting BCrypt

2
Comments
5 min read
Use nsh to Run Secure Remote Commands

Use nsh to Run Secure Remote Commands

15
Comments
7 min read
Distributing software with the JFrog Platform

Distributing software with the JFrog Platform

6
Comments
2 min read
Insecure

Insecure

4
Comments
3 min read
Security study notes

Security study notes

8
Comments
1 min read
Secure your Cookies (Secure and HttpOnly flags)

Secure your Cookies (Secure and HttpOnly flags)

1
Comments 8
3 min read
Top ten tips for studying for Security+ exam in 2020

Top ten tips for studying for Security+ exam in 2020

7
Comments
2 min read
Secure your Azure web applications

Secure your Azure web applications

8
Comments
1 min read
ASP.NET Core (not that secret) User Secrets Explained

ASP.NET Core (not that secret) User Secrets Explained

8
Comments
4 min read
How could I make a secure site?

How could I make a secure site?

6
Comments 2
1 min read
Writing a simple example of Feistal Cipher

Writing a simple example of Feistal Cipher

5
Comments
1 min read
Is the API-key enough? Common API security issues - and how to fix them.

Is the API-key enough? Common API security issues - and how to fix them.

6
Comments
3 min read
IncrementURL

IncrementURL

3
Comments
4 min read
Secure Machine Learning

Secure Machine Learning

10
Comments
4 min read
Devart SecureBridge Now Supports Android 64-bit

Devart SecureBridge Now Supports Android 64-bit

6
Comments
1 min read
Preventing Accidents in the Workplace - with AWS

Preventing Accidents in the Workplace - with AWS

8
Comments
3 min read
Securing a Webapp - Step 1: Start As You Mean To Go On

Securing a Webapp - Step 1: Start As You Mean To Go On

6
Comments 4
7 min read
Is Open-Source Cryptography Really Secure?

Is Open-Source Cryptography Really Secure?

39
Comments
3 min read
Github Action for Javascript Vulnerability Scanning

Github Action for Javascript Vulnerability Scanning

5
Comments
3 min read
What is AWS S3 and 5Ws for using it?

What is AWS S3 and 5Ws for using it?

9
Comments 2
6 min read
loading...