DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Refactoring 028 - Replace Consecutive IDs with Dark Keys

Refactoring 028 - Replace Consecutive IDs with Dark Keys

1
Comments 1
8 min read
The Basics of Python and Cybersecurity: A Beginner’s Guide

The Basics of Python and Cybersecurity: A Beginner’s Guide

2
Comments 1
4 min read
💎 ANN: oauth2 v2.0.10 released

💎 ANN: oauth2 v2.0.10 released

6
Comments 2
6 min read
How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

8
Comments
2 min read
Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

4
Comments
5 min read
🚨 Monitoring in 2025: 6 Rules That Saved My Projects

🚨 Monitoring in 2025: 6 Rules That Saved My Projects

Comments
1 min read
Top 6 BoldSign Features That Make E-Signatures Effortless

Top 6 BoldSign Features That Make E-Signatures Effortless

3
Comments
4 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

Comments
3 min read
Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

1
Comments
5 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

1
Comments
4 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.