DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ethical Hacking : Users password cracking

Ethical Hacking : Users password cracking

5
Comments
17 min read
Security news weekly round-up - 23rd August 2024

Security news weekly round-up - 23rd August 2024

2
Comments
4 min read
A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

4
Comments
7 min read
Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

55
Comments
3 min read
Implementing Access Requests and Approvals in your App

Implementing Access Requests and Approvals in your App

19
Comments
4 min read
How do I keep my digital life safe? (And you should too)

How do I keep my digital life safe? (And you should too)

3
Comments 5
5 min read
How SSL Certificates Work?

How SSL Certificates Work?

Comments
2 min read
Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

7
Comments
4 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯

How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯

40
Comments 4
21 min read
Sign in with Apple for Node.js

Sign in with Apple for Node.js

Comments
7 min read
PHP Tips | How to assymetric/symmetric encryption 🔒

PHP Tips | How to assymetric/symmetric encryption 🔒

10
Comments
3 min read
Kaniko : Révolutionner vos builds Docker en toute sécurité

Kaniko : Révolutionner vos builds Docker en toute sécurité

1
Comments
5 min read
🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰

🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰

6
Comments
3 min read
VPC explained!

VPC explained!

Comments
9 min read
Alien biohazard approach to security

Alien biohazard approach to security

Comments
2 min read
🔒 应用技巧: MongoDB安全、合规性与零信任 🔑

🔒 应用技巧: MongoDB安全、合规性与零信任 🔑

5
Comments
1 min read
Everything you need to know about Base64

Everything you need to know about Base64

25
Comments 1
5 min read
Is Amazon Q Developer Secure?

Is Amazon Q Developer Secure?

10
Comments
4 min read
How to Check TLS Configuration of URLs with Curl and Bash Script

How to Check TLS Configuration of URLs with Curl and Bash Script

2
Comments
4 min read
🚀 Kubernetes RBAC and Role Aggregation Made Easy

🚀 Kubernetes RBAC and Role Aggregation Made Easy

4
Comments
4 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

2
Comments
3 min read
Git: Keeping your email safe in public repositories

Git: Keeping your email safe in public repositories

2
Comments 4
2 min read
Exploring Common Deployment Models for Web Application Firewalls (WAF)

Exploring Common Deployment Models for Web Application Firewalls (WAF)

7
Comments
3 min read
How Laravel's TrimStrings Middleware Can Cause Issues

How Laravel's TrimStrings Middleware Can Cause Issues

2
Comments
2 min read
loading...