DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

Comments
5 min read
How to Become a Firewall Administrator: A Comprehensive Guide

How to Become a Firewall Administrator: A Comprehensive Guide

Comments
9 min read
A Quick Look at the Problem of Data Poisoning in Language Models

A Quick Look at the Problem of Data Poisoning in Language Models

Comments
2 min read
Encryption Symmetric

Encryption Symmetric

Comments
3 min read
Backpack - Configure User Access Control and Permissions in 10 minutes

Backpack - Configure User Access Control and Permissions in 10 minutes

Comments
4 min read
Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash: A Robust Module for Secure Password Hashing

9
Comments
3 min read
Understanding Git Tags and Checkout

Understanding Git Tags and Checkout

9
Comments 1
7 min read
Bypassing Bot Detection Software with Selenium in Python

Bypassing Bot Detection Software with Selenium in Python

10
Comments
2 min read
Meme Monday

Meme Monday

14
Comments
1 min read
The Rise of AI in Cybersecurity: Opportunities and Challenges

The Rise of AI in Cybersecurity: Opportunities and Challenges

9
Comments 2
2 min read
Security news weekly round-up - 25th October 2024

Security news weekly round-up - 25th October 2024

1
Comments
5 min read
How to create a sudo user

How to create a sudo user

Comments
4 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

Comments
1 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments
3 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Comments
3 min read
Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
The Importance of Regular Software Updates and Patching Vulnerabilities

The Importance of Regular Software Updates and Patching Vulnerabilities

Comments
4 min read
Secret Linux Commands:

Secret Linux Commands:

Comments 1
1 min read
Implementación de Autenticación Segura en Node.js con JWT

Implementación de Autenticación Segura en Node.js con JWT

Comments
4 min read
nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

Comments
1 min read
Security news weekly round-up - 1st November 2024

Security news weekly round-up - 1st November 2024

1
Comments
4 min read
Move hardcoded secrets to a Secrets Manager

Move hardcoded secrets to a Secrets Manager

1
Comments
2 min read
AWS Web Application Firewall (WAF)

AWS Web Application Firewall (WAF)

5
Comments
6 min read
E-wallet Security: How Developers Can Ensure Transaction Protection

E-wallet Security: How Developers Can Ensure Transaction Protection

Comments
2 min read
🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

Comments
3 min read
Beyond AES — Modern Encryption for Laravel with XChaCha20

Beyond AES — Modern Encryption for Laravel with XChaCha20

Comments
2 min read
Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Comments
6 min read
Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Comments
3 min read
Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

80
Comments 12
4 min read
Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Comments
2 min read
Container Security Scanning: Vulnerabilities, Risks and Tooling

Container Security Scanning: Vulnerabilities, Risks and Tooling

Comments
10 min read
Access Token or ID Token? Which to Use and Why?

Access Token or ID Token? Which to Use and Why?

Comments
3 min read
BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

Comments
43 min read
How to optimize BitNinja for weak servers

How to optimize BitNinja for weak servers

8
Comments
5 min read
Error 403 Unauthorized: Understanding Its Implications for Apache Security

Error 403 Unauthorized: Understanding Its Implications for Apache Security

Comments
6 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Comments
4 min read
Elevate Your Next.js Security: Middleware Authorization with Userfront

Elevate Your Next.js Security: Middleware Authorization with Userfront

Comments
4 min read
Understanding Namespaces in Kubernetes

Understanding Namespaces in Kubernetes

10
Comments
6 min read
AWS Security Group vs NACL: What’s the Difference?

AWS Security Group vs NACL: What’s the Difference?

1
Comments
2 min read
Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

1
Comments
9 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
New tools for effortless policy creation and testing in Cerbos Hub

New tools for effortless policy creation and testing in Cerbos Hub

Comments
3 min read
Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails

Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails

3
Comments
6 min read
Storing passwords safely (C#)

Storing passwords safely (C#)

51
Comments 26
6 min read
The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

Comments
2 min read
The Dynamic Application Security Testing Process: A Step-by-Step Guide

The Dynamic Application Security Testing Process: A Step-by-Step Guide

Comments
4 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
Enhancing data security with FIM (file integrity monitoring) 🔐

Enhancing data security with FIM (file integrity monitoring) 🔐

1
Comments
1 min read
How I Secured My Containerized Application Using Anchore (Day 29 Project)

How I Secured My Containerized Application Using Anchore (Day 29 Project)

Comments
3 min read
What Is WebAuthN: A Developer's Guide To WebAuthN

What Is WebAuthN: A Developer's Guide To WebAuthN

Comments
6 min read
Ten Must-Have Endpoint Security Tools for 2025

Ten Must-Have Endpoint Security Tools for 2025

Comments
2 min read
DevOps Prerequisite (Part 9): SSL and TLS

DevOps Prerequisite (Part 9): SSL and TLS

Comments
4 min read
Issue 66 of AWS Cloud Security Weekly

Issue 66 of AWS Cloud Security Weekly

1
Comments
1 min read
K8s Plugins For Solid Security

K8s Plugins For Solid Security

Comments
2 min read
Hidden Risk Of Relying On Labels In Kubernetes Security

Hidden Risk Of Relying On Labels In Kubernetes Security

Comments
2 min read
Whats Information Security?

Whats Information Security?

Comments
1 min read
Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

1
Comments
1 min read
loading...