DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Binary: The Language That Runs the World (and Your Wi-Fi)

Binary: The Language That Runs the World (and Your Wi-Fi)

1
Comments
3 min read
Two Timestamps, One Message: Why WebSocket Systems Need Both

Two Timestamps, One Message: Why WebSocket Systems Need Both

Comments
14 min read
Smart Security Camera

Smart Security Camera

Comments
2 min read
5 Common Security Mistakes Developers Still Make (and How to Fix Them)

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

2
Comments
5 min read
Cybersecurity Steganography: How Defenders Face Hidden Data

Cybersecurity Steganography: How Defenders Face Hidden Data

Comments
3 min read
How Simple IDs Can Leak Your Secrets

How Simple IDs Can Leak Your Secrets

Comments
3 min read
A simple way to encrypt sensitive data using python

A simple way to encrypt sensitive data using python

Comments
1 min read
Protect Your Software Supply Chain with SBOMs – Security and Compliance

Protect Your Software Supply Chain with SBOMs – Security and Compliance

Comments
6 min read
🔒 Encapsulation in Java: Building Code That Protects Itself

🔒 Encapsulation in Java: Building Code That Protects Itself

Comments
3 min read
From Setup to Role-Based Access — Building a Platform for Two Worlds

From Setup to Role-Based Access — Building a Platform for Two Worlds

Comments
1 min read
Check a list of IP addresses for proxies using IP2Proxy Dart

Check a list of IP addresses for proxies using IP2Proxy Dart

Comments
5 min read
Making Authentication Seamless: How SSO Works in Modern Systems

Making Authentication Seamless: How SSO Works in Modern Systems

Comments
3 min read
🔐 How to Set Up SSH Access for a Private GitLab Repository

🔐 How to Set Up SSH Access for a Private GitLab Repository

7
Comments
3 min read
Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Comments
3 min read
IDENTITY PROVIDERS

IDENTITY PROVIDERS

1
Comments
4 min read
Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures

Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures

5
Comments
2 min read
Chaos Engineering on AWS: Using Fault Injection Simulator (FIS) for Resilience

Chaos Engineering on AWS: Using Fault Injection Simulator (FIS) for Resilience

Comments
13 min read
Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Comments
3 min read
OpenSSL 3.6.0 Released

OpenSSL 3.6.0 Released

Comments
4 min read
Unpacking Application Security: A Comprehensive Threat Modeling Guide

Unpacking Application Security: A Comprehensive Threat Modeling Guide

2
Comments
12 min read
Cloud Architects are Movie Directors: An OCI IAM Story

Cloud Architects are Movie Directors: An OCI IAM Story

Comments
6 min read
5 MCP Myths That Are Killing Your Implementation (Let's Debate)

5 MCP Myths That Are Killing Your Implementation (Let's Debate)

Comments
3 min read
# Tamper-Evident Ledger Systems for National Budget Transparency

# Tamper-Evident Ledger Systems for National Budget Transparency

Comments
18 min read
Securely Connect to a Remote PostgreSQL Database with SSH Tunneling

Securely Connect to a Remote PostgreSQL Database with SSH Tunneling

Comments
2 min read
Hackers Éticos

Hackers Éticos

Comments
3 min read
loading...