DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Recovering from Accidentally Pushing Sensitive Information to a Remote Git Repository

Recovering from Accidentally Pushing Sensitive Information to a Remote Git Repository

12
Comments 5
2 min read
Basic Kotlin/Java + Spring app with GitHub OAuth 2.0

Basic Kotlin/Java + Spring app with GitHub OAuth 2.0

3
Comments
5 min read
How to use Kubernetes Secret to pull private Docker Images from DockerHub

How to use Kubernetes Secret to pull private Docker Images from DockerHub

Comments
2 min read
Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
Password hashing using Bcrypt in Python

Password hashing using Bcrypt in Python

Comments
6 min read
Streamlining Your Data Transfer

Streamlining Your Data Transfer

1
Comments
6 min read
Automate Weekly Newsletter

Automate Weekly Newsletter

4
Comments
2 min read
What is pkill?

What is pkill?

1
Comments 1
2 min read
Best Practices When Designing AWS Architecture: Security and Operational Excellence

Best Practices When Designing AWS Architecture: Security and Operational Excellence

1
Comments
2 min read
Seguridad en Golang

Seguridad en Golang

13
Comments 2
5 min read
Prisma + ZenStack: An Alternative to PostgREST

Prisma + ZenStack: An Alternative to PostgREST

17
Comments
4 min read
Laravel Security: Advanced Techniques to Keep Your Web App Safe

Laravel Security: Advanced Techniques to Keep Your Web App Safe

Comments
2 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
Korunuyor musunuz?

Korunuyor musunuz?

Comments 2
4 min read
Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

1
Comments
2 min read
Must-know Javascript object property security

Must-know Javascript object property security

2
Comments
1 min read
Choosing dependencies using deps.dev

Choosing dependencies using deps.dev

9
Comments
2 min read
🚀 Secure Your Android App: Best Practices for App Security and Privacy 🔒

🚀 Secure Your Android App: Best Practices for App Security and Privacy 🔒

Comments
2 min read
Quebrando pipelines Jenkins no Windows

Quebrando pipelines Jenkins no Windows

2
Comments
2 min read
🛜 What is ARP Spoofing?

🛜 What is ARP Spoofing?

3
Comments
8 min read
What is Chmod?

What is Chmod?

1
Comments 2
1 min read
Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

7
Comments
6 min read
Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

2
Comments
4 min read
Are your PDFs Actually Redacted? Double Check!

Are your PDFs Actually Redacted? Double Check!

1
Comments
3 min read
API SECURITY, how to protect your API against vulnerability risks

API SECURITY, how to protect your API against vulnerability risks

2
Comments
4 min read
Best Security Practices for Docker in 2023

Best Security Practices for Docker in 2023

20
Comments 4
8 min read
Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Comments
7 min read
Depend(abot) on Umbraco patching

Depend(abot) on Umbraco patching

1
Comments
3 min read
DelegateCall in Solidity — With Some Code Examples

DelegateCall in Solidity — With Some Code Examples

Comments
5 min read
Use Amazon CodeWhisperer for Your AWS Security

Use Amazon CodeWhisperer for Your AWS Security

6
Comments 6
4 min read
Multi-tenancy authentication done right

Multi-tenancy authentication done right

3
Comments
8 min read
What Does 2FA Actually Mean?

What Does 2FA Actually Mean?

3
Comments
3 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

7
Comments
4 min read
COMMON API VULNERABILITIES

COMMON API VULNERABILITIES

Comments
6 min read
When checking your Python package sources matters

When checking your Python package sources matters

2
Comments
4 min read
Guide to Face Detection and Recognition Software Development

Guide to Face Detection and Recognition Software Development

7
Comments
15 min read
API Rate Limiting Cheat Sheet

API Rate Limiting Cheat Sheet

6
Comments 2
5 min read
Step-up authentication in Keycloak + Spring Boot

Step-up authentication in Keycloak + Spring Boot

2
Comments 1
8 min read
Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Comments
10 min read
Rethinking Security: The Need for Cookie Support in Native Mobile Applications

Rethinking Security: The Need for Cookie Support in Native Mobile Applications

1
Comments 2
3 min read
đź”’Security Tips for Frontend

đź”’Security Tips for Frontend

8
Comments
4 min read
How to Secure the Web: A Comprehensive Guide to Authentication Strategies for Developers

How to Secure the Web: A Comprehensive Guide to Authentication Strategies for Developers

26
Comments 13
8 min read
How to get information about the provenance of Python packages installed

How to get information about the provenance of Python packages installed

3
Comments
6 min read
ReVen: a Reverse Engineering Toolkit AIO

ReVen: a Reverse Engineering Toolkit AIO

Comments
5 min read
AWS CDK template validation during synthesis with Cloudformation Guard

AWS CDK template validation during synthesis with Cloudformation Guard

Comments
2 min read
How Authentication and Authorization Work for SPAs

How Authentication and Authorization Work for SPAs

4
Comments
13 min read
NGINX vs Apache : A Comparison of Web Servers

NGINX vs Apache : A Comparison of Web Servers

2
Comments 2
3 min read
A Dualidade do Bitcoin: Privacidade versus TransparĂŞncia

A Dualidade do Bitcoin: Privacidade versus TransparĂŞncia

9
Comments
4 min read
Credentials substitution at runtime in Python

Credentials substitution at runtime in Python

1
Comments
2 min read
Improve AWS security and compliance with cdk-nag

Improve AWS security and compliance with cdk-nag

3
Comments
6 min read
Building a SvelteKit Demo Page with Web Component and Passkey Login for passkeys.eu

Building a SvelteKit Demo Page with Web Component and Passkey Login for passkeys.eu

1
Comments
9 min read
Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

2
Comments
4 min read
How to implement a Mesh Network on AWS

How to implement a Mesh Network on AWS

13
Comments 1
9 min read
Six security risks of user input in ruby code

Six security risks of user input in ruby code

Comments
4 min read
A beginner's guide to Termius: the ultimate terminal

A beginner's guide to Termius: the ultimate terminal

15
Comments 10
3 min read
Managing network security aspects in the public cloud

Managing network security aspects in the public cloud

2
Comments
4 min read
System Design : Vertical And Horizontal Scaling

System Design : Vertical And Horizontal Scaling

Comments 1
2 min read
Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 2.

Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 2.

1
Comments
3 min read
Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 1.

Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 1.

Comments
4 min read
Unlocking the Power of Linux Capabilities: Exposing Port 80 without Root Access

Unlocking the Power of Linux Capabilities: Exposing Port 80 without Root Access

Comments
3 min read
loading...