DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Technical Deep Dive into Veeam Backup for AWS

A Technical Deep Dive into Veeam Backup for AWS

3
Comments
4 min read
The Ethereum Virtual Machine: Fueling the Decentralized Revolution

The Ethereum Virtual Machine: Fueling the Decentralized Revolution

24
Comments 2
13 min read
What is HTTPS and how does it work?

What is HTTPS and how does it work?

36
Comments 8
5 min read
Building Trust in a Trustless World: Decentralized Applications Unveiled

Building Trust in a Trustless World: Decentralized Applications Unveiled

20
Comments 2
10 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

64
Comments 3
4 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

186
Comments 12
4 min read
What is the easiest way to do auth?

What is the easiest way to do auth?

1
Comments 6
1 min read
How to Secure Your Router: A Comprehensive Guide to Fortify Your Home Network

How to Secure Your Router: A Comprehensive Guide to Fortify Your Home Network

Comments
5 min read
Authentication for Spring Boot App with Authgear and OAuth2

Authentication for Spring Boot App with Authgear and OAuth2

10
Comments 2
7 min read
AWS Blueprint for Ransomware Defense - Resumen

AWS Blueprint for Ransomware Defense - Resumen

Comments
11 min read
How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

Comments
6 min read
How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

1
Comments
4 min read
Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

1
Comments
9 min read
Understanding JWTs: A Simple Guide for Beginners

Understanding JWTs: A Simple Guide for Beginners

106
Comments 9
2 min read
How to Secure A Linux VPS?

How to Secure A Linux VPS?

7
Comments
4 min read
Id or UUID: Which one should you use as the primary key in your DB?

Id or UUID: Which one should you use as the primary key in your DB?

1
Comments
3 min read
RBAC for Exchange Online Mailboxes

RBAC for Exchange Online Mailboxes

7
Comments
4 min read
Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

21
Comments 2
9 min read
How to use hCAPTCHA with Iris

How to use hCAPTCHA with Iris

Comments
3 min read
Demystifying AWS Partitions

Demystifying AWS Partitions

4
Comments
4 min read
NPM Security Attacks

NPM Security Attacks

Comments
2 min read
7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

2
Comments
3 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

21
Comments 2
17 min read
Docker Container Security - Practices to Consider

Docker Container Security - Practices to Consider

1
Comments
4 min read
loading...