DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Tutorial: Credit card cracking explained — and how to prevent it

Tutorial: Credit card cracking explained — and how to prevent it

Comments
12 min read
Understanding Ports and Their Services: A Comprehensive Guide

Understanding Ports and Their Services: A Comprehensive Guide

1
Comments
2 min read
Augment Cline and your LLM with up-to-date risk insight using CodeGate

Augment Cline and your LLM with up-to-date risk insight using CodeGate

4
Comments
1 min read
Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Comments
39 min read
Authentication Vs Authorization In Backend Systems

Authentication Vs Authorization In Backend Systems

1
Comments 2
2 min read
Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

1
Comments
3 min read
Autorização em Golang

Autorização em Golang

1
Comments
1 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
A Phish on a Fork, no Chips

A Phish on a Fork, no Chips

13
Comments 1
4 min read
Leading Docker Adoption: A Senior Manager’s Perspective

Leading Docker Adoption: A Senior Manager’s Perspective

3
Comments
2 min read
How to configure CORS for Next.js

How to configure CORS for Next.js

3
Comments
7 min read
CodeMash 2025: A Community Conversation About NHI And Secrets Security

CodeMash 2025: A Community Conversation About NHI And Secrets Security

Comments
7 min read
Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

1
Comments
5 min read
Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Comments
5 min read
Token based Authentication using .NET Identity

Token based Authentication using .NET Identity

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.