DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security🔐 Concerns with Cookies🍪.

Security🔐 Concerns with Cookies🍪.

24
Comments 8
4 min read
Build your own Remote Access VPN to AWS with WireGuard and Netmaker

Build your own Remote Access VPN to AWS with WireGuard and Netmaker

42
Comments 2
4 min read
How to use JWT authentication with Iris

How to use JWT authentication with Iris

Comments
8 min read
Securely downloading encrypted S3 objects using CloudFront

Securely downloading encrypted S3 objects using CloudFront

5
Comments
5 min read
RLS of Supabase(PostgreSQL) Is Good, But …🤔

RLS of Supabase(PostgreSQL) Is Good, But …🤔

51
Comments 4
6 min read
Unlocking the Secrets of GDPR Compliance in IT Outsourcing

Unlocking the Secrets of GDPR Compliance in IT Outsourcing

15
Comments
10 min read
Best Practices for Audit Logs in Cloud Applications

Best Practices for Audit Logs in Cloud Applications

8
Comments 1
8 min read
Deploying Code Safely: Protecting Sensitive Data in Your Projects

Deploying Code Safely: Protecting Sensitive Data in Your Projects

3
Comments
1 min read
Verifiable Random Functions (VRF) with Ruby

Verifiable Random Functions (VRF) with Ruby

11
Comments
5 min read
Server-Side Request Forgery in Rails

Server-Side Request Forgery in Rails

Comments
5 min read
Drawbacks of IP whitelist

Drawbacks of IP whitelist

7
Comments 1
2 min read
Netmaker - WireGuard Made Easy

Netmaker - WireGuard Made Easy

47
Comments 1
2 min read
The evolution of password hashing

The evolution of password hashing

5
Comments
8 min read
Workload Identity GKE - Service account k8s com permissões na GCP

Workload Identity GKE - Service account k8s com permissões na GCP

Comments
3 min read
It depends! Exploring my favourite Renovate features for dependency updates

It depends! Exploring my favourite Renovate features for dependency updates

1
Comments
6 min read
How to Hide Your Network in the AWS Cloud Using NAT Gateway

How to Hide Your Network in the AWS Cloud Using NAT Gateway

15
Comments
3 min read
Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

21
Comments 2
8 min read
Como evitar ataques de injeção de código em aplicações Node.js

Como evitar ataques de injeção de código em aplicações Node.js

Comments
4 min read
A Technical Deep Dive into Veeam Backup for AWS

A Technical Deep Dive into Veeam Backup for AWS

1
Comments
4 min read
The Ethereum Virtual Machine: Fueling the Decentralized Revolution

The Ethereum Virtual Machine: Fueling the Decentralized Revolution

25
Comments 2
13 min read
10 Essential DevOps Best Practices For Efficient Software Delivery

10 Essential DevOps Best Practices For Efficient Software Delivery

Comments 1
4 min read
What is HTTPS and how does it work?

What is HTTPS and how does it work?

36
Comments 8
5 min read
Building Trust in a Trustless World: Decentralized Applications Unveiled

Building Trust in a Trustless World: Decentralized Applications Unveiled

20
Comments 2
10 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

63
Comments 3
4 min read
What is the easiest way to do auth?

What is the easiest way to do auth?

1
Comments 6
1 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

184
Comments 12
4 min read
Authentication for Spring Boot App with Authgear and OAuth2

Authentication for Spring Boot App with Authgear and OAuth2

10
Comments 2
7 min read
AWS Blueprint for Ransomware Defense - Resumen

AWS Blueprint for Ransomware Defense - Resumen

Comments
11 min read
How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

Comments
6 min read
Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

1
Comments
9 min read
Understanding JWTs: A Simple Guide for Beginners

Understanding JWTs: A Simple Guide for Beginners

96
Comments 9
2 min read
How to Secure A Linux VPS?

How to Secure A Linux VPS?

6
Comments
4 min read
Id or UUID: Which one should you use as the primary key in your DB?

Id or UUID: Which one should you use as the primary key in your DB?

1
Comments
3 min read
RBAC for Exchange Online Mailboxes

RBAC for Exchange Online Mailboxes

2
Comments
4 min read
The essential security checklist for user identity

The essential security checklist for user identity

5
Comments
6 min read
Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

21
Comments 2
9 min read
Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

2
Comments
5 min read
In-App Authentication Made Easy With Biometric API

In-App Authentication Made Easy With Biometric API

Comments
3 min read
Demystifying AWS Partitions

Demystifying AWS Partitions

4
Comments
4 min read
NPM Security Attacks

NPM Security Attacks

Comments
2 min read
7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

1
Comments
3 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

21
Comments 2
17 min read
Docker Container Security - Practices to Consider

Docker Container Security - Practices to Consider

1
Comments
4 min read
Exploring Cross-Site Scripting with React and Tauri

Exploring Cross-Site Scripting with React and Tauri

5
Comments
5 min read
What Developers Can Learn from Taylor Swift's Re-recording Strategy

What Developers Can Learn from Taylor Swift's Re-recording Strategy

9
Comments
5 min read
Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

5
Comments
4 min read
An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

2
Comments
3 min read
Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

20
Comments 18
4 min read
Size Matters

Size Matters

7
Comments
4 min read
OpenSSL generating self-signed certificates - part 2

OpenSSL generating self-signed certificates - part 2

2
Comments
2 min read
Implementing Apple's Device Check App Attest Protocol

Implementing Apple's Device Check App Attest Protocol

Comments
8 min read
Advanced Credential Rotation for IAM Users with a Grace Period

Advanced Credential Rotation for IAM Users with a Grace Period

6
Comments
6 min read
OpenSSL verify Private Key and Certificate Match - part 3

OpenSSL verify Private Key and Certificate Match - part 3

Comments
1 min read
3 Common API Security Testing Misconceptions

3 Common API Security Testing Misconceptions

Comments
4 min read
From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

19
Comments 3
18 min read
PHP 8.2: the SensitiveParameter attribute

PHP 8.2: the SensitiveParameter attribute

15
Comments 1
1 min read
Exploring Ethereum Wallets: A Comprehensive Guide

Exploring Ethereum Wallets: A Comprehensive Guide

19
Comments 3
13 min read
Using Metlo to Secure My Personal Finance App

Using Metlo to Secure My Personal Finance App

26
Comments
4 min read
Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

2
Comments
7 min read
loading...