DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Linux Special Permissions: A Comprehensive Guide with Examples

Linux Special Permissions: A Comprehensive Guide with Examples

6
Comments
3 min read
Linux Access Control Lists (ACLs): A Simplified Guide with Examples

Linux Access Control Lists (ACLs): A Simplified Guide with Examples

4
Comments
2 min read
How can I secure a NestJS & Firebase API?

How can I secure a NestJS & Firebase API?

1
Comments 1
1 min read
Security in FastAPI: Best practices to protect your application (Part I)

Security in FastAPI: Best practices to protect your application (Part I)

3
Comments
4 min read
JWT vs Session Authentication

JWT vs Session Authentication

217
Comments 25
3 min read
How to remove your personal info from Google

How to remove your personal info from Google

3
Comments 2
3 min read
Creating stronger passwords with AuthKit

Creating stronger passwords with AuthKit

5
Comments
7 min read
Understanding Ethernet and Fiber Op

Understanding Ethernet and Fiber Op

1
Comments
3 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
What's New With AWS Security? | January Edition

What's New With AWS Security? | January Edition

Comments
3 min read
Authorization and Authentication in Django

Authorization and Authentication in Django

1
Comments
2 min read
How to Host Static Webpage-CloudFront with S3 (part1)

How to Host Static Webpage-CloudFront with S3 (part1)

3
Comments
4 min read
My Developer Nightmare

My Developer Nightmare

10
Comments
3 min read
Is Using Firebase on Client-Side Safe? đź”’

Is Using Firebase on Client-Side Safe? đź”’

7
Comments
3 min read
Microsoft Entra ID

Microsoft Entra ID

Comments
1 min read
Azure Monitor Parte 2: Dicas para Garantir a Segurança de VMs no Azure

Azure Monitor Parte 2: Dicas para Garantir a Segurança de VMs no Azure

1
Comments
3 min read
Enhancing Security: Passport.Js

Enhancing Security: Passport.Js

1
Comments
3 min read
How to protect sensitive information in SharePoint Online using Purview Sensitivity Labels

How to protect sensitive information in SharePoint Online using Purview Sensitivity Labels

3
Comments
11 min read
How to Do Authorization - A Decision Framework: Part 2

How to Do Authorization - A Decision Framework: Part 2

25
Comments
5 min read
Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Comments
5 min read
JWT can fit as an authentication system with a blacklist technique

JWT can fit as an authentication system with a blacklist technique

5
Comments 11
3 min read
Elastic Search 8.x : ELK Setup over TLS/SSL

Elastic Search 8.x : ELK Setup over TLS/SSL

1
Comments
13 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
Banana encryption: Decoding Caesar Cipher with Power Automate

Banana encryption: Decoding Caesar Cipher with Power Automate

12
Comments 4
2 min read
DIY Home Security Camera System

DIY Home Security Camera System

105
Comments 4
8 min read
Introduction to Web Application Security

Introduction to Web Application Security

4
Comments 2
3 min read
Security Logger

Security Logger

Comments
2 min read
Odoo security concept

Odoo security concept

3
Comments 4
7 min read
AWS Locksmith: Encrypting S3 and EBS with Amazon KMS

AWS Locksmith: Encrypting S3 and EBS with Amazon KMS

5
Comments 2
4 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Navigating the Cloud: Unveiling the Best Lifetime Plans for Cloud Storage

Navigating the Cloud: Unveiling the Best Lifetime Plans for Cloud Storage

Comments
4 min read
This is a post for newbies to ask for help

This is a post for newbies to ask for help

2
Comments 3
1 min read
Best Practices in API Key Management and Utilization

Best Practices in API Key Management and Utilization

2
Comments
3 min read
Serverless Technology: Static to Dynamic

Serverless Technology: Static to Dynamic

Comments
3 min read
How to Setup CloudFront with S3 bucket for Presigned URLs

How to Setup CloudFront with S3 bucket for Presigned URLs

2
Comments
4 min read
How to Improve Your Website Security in 2024

How to Improve Your Website Security in 2024

2
Comments
5 min read
Azure Firewall

Azure Firewall

1
Comments
4 min read
Why is Web App and API Security Testing So Critical?

Why is Web App and API Security Testing So Critical?

Comments
4 min read
Getting Started with DevSecOps: An Introduction to CNAPP

Getting Started with DevSecOps: An Introduction to CNAPP

4
Comments
6 min read
Learning GitHub Actions in a Simple Way

Learning GitHub Actions in a Simple Way

12
Comments
6 min read
🛡️4 Top Database Security Tools in 2024 🏆🔥

🛡️4 Top Database Security Tools in 2024 🏆🔥

17
Comments 2
3 min read
Top 10 Tips for Password Protection in AWS

Top 10 Tips for Password Protection in AWS

Comments
3 min read
Veracode & AzDevOps: Trabalhando com Task Groups

Veracode & AzDevOps: Trabalhando com Task Groups

2
Comments
2 min read
ÂżEs AWS seguro?

ÂżEs AWS seguro?

6
Comments 1
10 min read
How to Secure Your Network from Hackers?

How to Secure Your Network from Hackers?

5
Comments
4 min read
WordPress: Empowering the Web with User-Friendly CMS and Dynamic Plugin Architecture

WordPress: Empowering the Web with User-Friendly CMS and Dynamic Plugin Architecture

Comments
8 min read
Reverse Shell on MetaSploitable3 Windows

Reverse Shell on MetaSploitable3 Windows

2
Comments
3 min read
Dorking of Google

Dorking of Google

Comments
2 min read
O que vem depois do Pentesting?

O que vem depois do Pentesting?

14
Comments
13 min read
Set Default Sharing to “People with Existing Access” in SharePoint Online

Set Default Sharing to “People with Existing Access” in SharePoint Online

1
Comments
5 min read
IPv4 surcharge — Your AWS bill is going up this February

IPv4 surcharge — Your AWS bill is going up this February

10
Comments 1
5 min read
AWS Well-Architected Review in Action

AWS Well-Architected Review in Action

1
Comments
4 min read
Hardening The Home Lab

Hardening The Home Lab

11
Comments
3 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Secure Development Practices to Safeguard Your Software

Secure Development Practices to Safeguard Your Software

Comments
3 min read
S3 Bucket Takeover Neutralization

S3 Bucket Takeover Neutralization

Comments
4 min read
We removed cookies, pixels, and tags from the website and console

We removed cookies, pixels, and tags from the website and console

2
Comments
8 min read
Security auditing your Linux OS with Lynis

Security auditing your Linux OS with Lynis

9
Comments 1
4 min read
Restrict GitHub branches to specific prefixes

Restrict GitHub branches to specific prefixes

Comments
1 min read
Streamlining Security Management

Streamlining Security Management

3
Comments
5 min read
loading...