DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protecting Employees Using Secure AWS Solutions

Protecting Employees Using Secure AWS Solutions

8
Comments
2 min read
Reverse-engineering the pin code authentication flow for mobile apps

Reverse-engineering the pin code authentication flow for mobile apps

13
Comments 1
5 min read
Understanding and Exploiting Log4J Vulnerability

Understanding and Exploiting Log4J Vulnerability

15
Comments
5 min read
Apache Log4j : Return of the JNDI

Apache Log4j : Return of the JNDI

27
Comments 10
6 min read
What is Bcrypt and Why?

What is Bcrypt and Why?

10
Comments
3 min read
Why is your employer keen on keeping strangers out?

Why is your employer keen on keeping strangers out?

2
Comments
1 min read
Privacy and confidentiality in security testing

Privacy and confidentiality in security testing

3
Comments 1
5 min read
🛡️2FA with Python.

🛡️2FA with Python.

30
Comments 5
2 min read
Quickest Way to Secure API Keys on the Frontend (In Minutes)

Quickest Way to Secure API Keys on the Frontend (In Minutes)

465
Comments 28
3 min read
Peer For Peer (P4P) Identity Management in Social Networks

Peer For Peer (P4P) Identity Management in Social Networks

3
Comments
8 min read
How BASIC knowledge helps us solve a ~2 million views question

How BASIC knowledge helps us solve a ~2 million views question

6
Comments 2
7 min read
What I Learned About the Log4j Vulnerability

What I Learned About the Log4j Vulnerability

8
Comments
2 min read
How to Integrate Biometrics in React Native - Overview of 3 Approaches

How to Integrate Biometrics in React Native - Overview of 3 Approaches

3
Comments
5 min read
Log4j Vulnerability

Log4j Vulnerability

2
Comments
3 min read
Scaffolding Spring Boot, Freemarker and JDI - Building DDTJ, Day 2

Scaffolding Spring Boot, Freemarker and JDI - Building DDTJ, Day 2

6
Comments
8 min read
Set up emails that don’t get blocked

Set up emails that don’t get blocked

2
Comments
4 min read
Hacking: Local File Inclusion

Hacking: Local File Inclusion

6
Comments
2 min read
Common algorithms and data structures in JavaScript: objects and hashing

Common algorithms and data structures in JavaScript: objects and hashing

28
Comments 1
9 min read
How To Protect Your Code While Using Gulp

How To Protect Your Code While Using Gulp

6
Comments
4 min read
How to Check if a Java Project Depends on A Vulnerable Version of Log4j

How to Check if a Java Project Depends on A Vulnerable Version of Log4j

8
Comments
5 min read
Log4j vulnerability

Log4j vulnerability

5
Comments 2
9 min read
Trust No One - Be Warned!

Trust No One - Be Warned!

7
Comments
2 min read
Keyless entry (into your remote server)

Keyless entry (into your remote server)

6
Comments
4 min read
Log4j 2: New vulnerability on DoS in 2.16.0 and below

Log4j 2: New vulnerability on DoS in 2.16.0 and below

9
Comments 3
1 min read
To find company admin panels

To find company admin panels

4
Comments 2
1 min read
loading...