DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing WordPress

Securing WordPress

12
Comments
3 min read
Secure Data Lake with AWS Lake Formation Tutorial

Secure Data Lake with AWS Lake Formation Tutorial

7
Comments 1
4 min read
Angular Security Checklist

Angular Security Checklist

92
Comments 1
1 min read
#Hash Vs Encryption?

#Hash Vs Encryption?

15
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Finding exposed .git repositories

Finding exposed .git repositories

12
Comments 5
3 min read
Why coordinated security vulnerability disclosure policies are important

Why coordinated security vulnerability disclosure policies are important

8
Comments
2 min read
JwtToken vs Cookie vs SessionID

JwtToken vs Cookie vs SessionID

34
Comments 5
3 min read
Data Protection and protecting your users in light of GDPR

Data Protection and protecting your users in light of GDPR

6
Comments 2
6 min read
Telegram isn't really encrypted, but you can easily encrypt chats with this service

Telegram isn't really encrypted, but you can easily encrypt chats with this service

7
Comments 6
1 min read
Host your own OpenVPN server in a few seconds

Host your own OpenVPN server in a few seconds

98
Comments 15
4 min read
What is Phishing?

What is Phishing?

7
Comments
3 min read
SMB: metadata in RPC

SMB: metadata in RPC

7
Comments
4 min read
Securing a large Gatsby site with a CSP

Securing a large Gatsby site with a CSP

16
Comments
5 min read
Sanitizing, Escaping, and Encoding

Sanitizing, Escaping, and Encoding

10
Comments
4 min read
Building and Securing MobX Apps with Auth0

Building and Securing MobX Apps with Auth0

8
Comments
1 min read
Get 2FA Codes From The Terminal

Get 2FA Codes From The Terminal

8
Comments 1
3 min read
What the fudge is public-key🔑 cryptography?

What the fudge is public-key🔑 cryptography?

41
Comments 1
1 min read
Security best practices for Go & Java

Security best practices for Go & Java

13
Comments 1
2 min read
Choosing a Safe and Memorable Password

Choosing a Safe and Memorable Password

9
Comments
8 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
Security tips for APIs & MongoDB

Security tips for APIs & MongoDB

67
Comments
2 min read
JavaScript innerHTML, innerText, and textContent

JavaScript innerHTML, innerText, and textContent

49
Comments
3 min read
What is an HMAC?

What is an HMAC?

30
Comments 2
4 min read
The many faces of Cross-Site Scripting

The many faces of Cross-Site Scripting

15
Comments
4 min read
loading...