DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ruby on Rails password validation

Ruby on Rails password validation

Comments
1 min read
Linux security LAB Broken Spaceship

Linux security LAB Broken Spaceship

6
Comments 2
1 min read
O uso antiético de um leitor de código de barras

O uso antiético de um leitor de código de barras

2
Comments 1
2 min read
Overview of Containerization with Docker.

Overview of Containerization with Docker.

Comments
3 min read
Introdução ao SSH

Introdução ao SSH

54
Comments
3 min read
Writing secure code for web applications🔓

Writing secure code for web applications🔓

1
Comments
4 min read
Kaynak IP’ye göre AWS Erişiminin Engellenmesi

Kaynak IP’ye göre AWS Erişiminin Engellenmesi

1
Comments 1
2 min read
CodeCommit Access from EC2

CodeCommit Access from EC2

4
Comments
6 min read
Throttling Rails logins with Rack Attack

Throttling Rails logins with Rack Attack

6
Comments 2
2 min read
Secure GitHub Actions by pull_request_target

Secure GitHub Actions by pull_request_target

4
Comments
7 min read
Extensive Guide to Gnu Privacy Guard (GPG)

Extensive Guide to Gnu Privacy Guard (GPG)

6
Comments
10 min read
Web Application Security 101

Web Application Security 101

2
Comments
1 min read
I'm a little iffy on Passkeys

I'm a little iffy on Passkeys

1
Comments
6 min read
JavaScript and Basic Security

JavaScript and Basic Security

6
Comments
3 min read
Gerando certificado SSL com certbot na Oracle Cloud Infrastructure

Gerando certificado SSL com certbot na Oracle Cloud Infrastructure

Comments
2 min read
Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

5
Comments
4 min read
How APISIX protects against the OWASP top 10 API security threats

How APISIX protects against the OWASP top 10 API security threats

22
Comments
12 min read
7 princípios básicos de segurança em cloud

7 princípios básicos de segurança em cloud

Comments
2 min read
Adding reCAPTCHA in MERN Application

Adding reCAPTCHA in MERN Application

Comments 1
3 min read
Cross-site Scripting and how to fix it

Cross-site Scripting and how to fix it

Comments
4 min read
Ever wondered if AI will someday provide a polynomial-time solution for a discrete logarithm? Let's talk about it!

Ever wondered if AI will someday provide a polynomial-time solution for a discrete logarithm? Let's talk about it!

Comments
2 min read
Running web scraping service securely

Running web scraping service securely

6
Comments
6 min read
The Unrivaled Strength of Java in Powering Backend Technologies

The Unrivaled Strength of Java in Powering Backend Technologies

1
Comments
2 min read
Kimlik Doğrulama Mekanizmaları

Kimlik Doğrulama Mekanizmaları

Comments 1
4 min read
My idea about hardening the cookie storage

My idea about hardening the cookie storage

1
Comments 2
1 min read
Introducing The Border0 Terraform Provider

Introducing The Border0 Terraform Provider

Comments
5 min read
PSRule module for Azure DevOps available for feedback

PSRule module for Azure DevOps available for feedback

1
Comments
1 min read
Cybersecurity and AI deep in the heart of Texas Cyber Summit

Cybersecurity and AI deep in the heart of Texas Cyber Summit

1
Comments
11 min read
How we cut our AWS costs by more than 50%

How we cut our AWS costs by more than 50%

2
Comments
3 min read
🚀 API authorization in API Maker

🚀 API authorization in API Maker

12
Comments
5 min read
Rethinking Password Strength Estimation: Beyond Composition Rules

Rethinking Password Strength Estimation: Beyond Composition Rules

4
Comments
4 min read
Understand CORS 🌐 in Easy Way🦾

Understand CORS 🌐 in Easy Way🦾

Comments
1 min read
Your Daily CVE Reminder 🦸🏻‍♀️

Your Daily CVE Reminder 🦸🏻‍♀️

3
Comments
3 min read
Unlocking the Power of WordPress: A Web Developer's Guide

Unlocking the Power of WordPress: A Web Developer's Guide

1
Comments
2 min read
Understanding the Fundamentals of API Security

Understanding the Fundamentals of API Security

8
Comments 1
8 min read
What is Password Hashing?

What is Password Hashing?

Comments
4 min read
Building a Secure Next.js Application with Redux Toolkit Query and cookie tokens

Building a Secure Next.js Application with Redux Toolkit Query and cookie tokens

30
Comments 3
7 min read
🐣 Step-by-Step Guide to Data Masking 🎭

🐣 Step-by-Step Guide to Data Masking 🎭

6
Comments
4 min read
The Future of Cyber security: Safeguarding Nigeria's Society

The Future of Cyber security: Safeguarding Nigeria's Society

Comments
2 min read
Using Tatum Key Management System(KMS) to sign transactions

Using Tatum Key Management System(KMS) to sign transactions

2
Comments
5 min read
Creating a Custom AWS Config Rule with a Lambda Function to Encrypt S3 Buckets

Creating a Custom AWS Config Rule with a Lambda Function to Encrypt S3 Buckets

1
Comments
3 min read
Azure Open AI in VNet

Azure Open AI in VNet

3
Comments
2 min read
DevSecOps at Cyberdyne: The tale of a CI attestation

DevSecOps at Cyberdyne: The tale of a CI attestation

Comments
5 min read
Azure DevOps Pipeline: no secrets, no certificates

Azure DevOps Pipeline: no secrets, no certificates

6
Comments 4
5 min read
Secrets management takes more than just tools

Secrets management takes more than just tools

Comments
13 min read
Symbolic Execution Fuzzing With KLEE

Symbolic Execution Fuzzing With KLEE

Comments
2 min read
The best application security tool is education

The best application security tool is education

6
Comments
4 min read
Grasping the concept of Cyber Security: its merits and importance.

Grasping the concept of Cyber Security: its merits and importance.

Comments
2 min read
Supercharge your Repository with Code Owners

Supercharge your Repository with Code Owners

83
Comments 27
3 min read
Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

4
Comments
5 min read
Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
Javascript Deobfuscation

Javascript Deobfuscation

7
Comments
3 min read
A Python steganography API at your service.

A Python steganography API at your service.

5
Comments
2 min read
Cybersecurity Trends for 2024: What You Need to Know

Cybersecurity Trends for 2024: What You Need to Know

Comments
2 min read
Getting Started with Vagrant for Local Development Environments

Getting Started with Vagrant for Local Development Environments

8
Comments
13 min read
Best Practices for AWS IAM: Strengthening Your Security

Best Practices for AWS IAM: Strengthening Your Security

Comments
4 min read
Protecting a Static Website with JWT and Lambda@Edge

Protecting a Static Website with JWT and Lambda@Edge

9
Comments
12 min read
Step by Step Guide to Authentication with JSON Web Tokens (JWT) with express and passport

Step by Step Guide to Authentication with JSON Web Tokens (JWT) with express and passport

36
Comments 1
7 min read
Understanding and Avoiding Modern Cyber Risks - A Detailed Guide for All

Understanding and Avoiding Modern Cyber Risks - A Detailed Guide for All

2
Comments
5 min read
The cost of false positives in software security, Part 2: Large applications

The cost of false positives in software security, Part 2: Large applications

5
Comments
4 min read
loading...