DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Take the pain to learn user authentication before you use an external provider

Take the pain to learn user authentication before you use an external provider

8
Comments 3
6 min read
CORS Error Explained and How to Fix It?

CORS Error Explained and How to Fix It?

31
Comments 3
3 min read
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

1
Comments
1 min read
Secure protected API with HMAC! Next Level of API Keys 🔐

Secure protected API with HMAC! Next Level of API Keys 🔐

8
Comments
4 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

130
Comments 7
8 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Segurança de IA

Segurança de IA

2
Comments
6 min read
The internet is on fire again. This time it's XZ

The internet is on fire again. This time it's XZ

1
Comments 1
3 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
Server access with SSH certificates - deep dive

Server access with SSH certificates - deep dive

1
Comments
3 min read
Security news weekly round-up - 29th March 2024

Security news weekly round-up - 29th March 2024

5
Comments 1
4 min read
An Introductory Guide to AWS Identity and Access Management

An Introductory Guide to AWS Identity and Access Management

Comments
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

4
Comments
6 min read
Solving AWS Network Puzzles with Mathematics - Part 1

Solving AWS Network Puzzles with Mathematics - Part 1

3
Comments
7 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

68
Comments 3
8 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
60 Years of the IBM System/360: A Legacy of Reliability and Security

60 Years of the IBM System/360: A Legacy of Reliability and Security

2
Comments 1
2 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

4
Comments
6 min read
Creating Passkey Authentication in a Rails 7 Application

Creating Passkey Authentication in a Rails 7 Application

2
Comments
4 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
Convert to workload identity federation

Convert to workload identity federation

Comments
2 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
loading...