DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
EC2 Metadata Server and IAM Role Credentials

EC2 Metadata Server and IAM Role Credentials

3
Comments
4 min read
Delete file from Git Repository

Delete file from Git Repository

2
Comments
4 min read
How to setup Two Factor Authentication(2FA) in Node.js without third-party applications

How to setup Two Factor Authentication(2FA) in Node.js without third-party applications

25
Comments 2
7 min read
Secure Your Data APIs with Dozer: Adding Authorization to APIs

Secure Your Data APIs with Dozer: Adding Authorization to APIs

2
Comments
11 min read
KALI LINUX CHEAT SHEET 🔺🔌💻🛡

KALI LINUX CHEAT SHEET 🔺🔌💻🛡

19
Comments
1 min read
Where does Security sit in Early-Stage Software Development: the Shift Left Approach

Where does Security sit in Early-Stage Software Development: the Shift Left Approach

3
Comments
3 min read
safe-signer: creating an ethers.Signer from the third party secret storages

safe-signer: creating an ethers.Signer from the third party secret storages

Comments
2 min read
Getting masked secrets out of CircleCI

Getting masked secrets out of CircleCI

2
Comments
2 min read
Stripe Search Query Injections and How to Prevent Them

Stripe Search Query Injections and How to Prevent Them

Comments
2 min read
Understanding res.redirect and res.render in Express.js: Usage and Security Measures

Understanding res.redirect and res.render in Express.js: Usage and Security Measures

13
Comments
4 min read
Web Scraping vs Web Crawling: Exploring the Legality and Ethics of Data Extraction

Web Scraping vs Web Crawling: Exploring the Legality and Ethics of Data Extraction

8
Comments 1
6 min read
Understanding AWS IAM: Policies

Understanding AWS IAM: Policies

Comments
5 min read
Sessions & Cookies. Yum.

Sessions & Cookies. Yum.

3
Comments
3 min read
Preventing Illicit Uploads in MySQL – secure_file_priv

Preventing Illicit Uploads in MySQL – secure_file_priv

1
Comments
6 min read
AWS Config Service

AWS Config Service

2
Comments
2 min read
Building Secure Software: Ten Tips for Software Developers

Building Secure Software: Ten Tips for Software Developers

2
Comments
7 min read
How to Comply with GDPR in AWS

How to Comply with GDPR in AWS

Comments
2 min read
Role of Cryptography in Secure Digital Communication and Software Development.

Role of Cryptography in Secure Digital Communication and Software Development.

15
Comments
7 min read
5 Effective Ways to Prevent Directory Traversal

5 Effective Ways to Prevent Directory Traversal

2
Comments
5 min read
Laravel SMTP Crack: Unveiling the Vulnerability with Laravel SMTP Checker by XCATZE

Laravel SMTP Crack: Unveiling the Vulnerability with Laravel SMTP Checker by XCATZE

30
Comments 1
4 min read
AWS Security Hub

AWS Security Hub

1
Comments
2 min read
CORS in ASP.NET

CORS in ASP.NET

21
Comments 1
4 min read
How to Use Robots.txt to Improve Your Website's SEO

How to Use Robots.txt to Improve Your Website's SEO

8
Comments
3 min read
AWS IAM - Policy - Troubleshooting

AWS IAM - Policy - Troubleshooting

Comments
2 min read
AWS S3 - Bucket Policies

AWS S3 - Bucket Policies

Comments
3 min read
AWS IAM - Policy

AWS IAM - Policy

Comments
5 min read
AWS KMS - Key Material

AWS KMS - Key Material

Comments
5 min read
AWS Artifact

AWS Artifact

Comments
1 min read
AWS Organizations

AWS Organizations

Comments
2 min read
AWS IAM

AWS IAM

Comments
5 min read
AWS KMS

AWS KMS

Comments
12 min read
Bastion Host

Bastion Host

Comments
1 min read
AWS KMS - Grants

AWS KMS - Grants

Comments
2 min read
AWS ELB

AWS ELB

Comments
3 min read
AWS DynamoDB

AWS DynamoDB

Comments
2 min read
AWS S3

AWS S3

Comments
9 min read
Understanding AWS IAM: Permissions

Understanding AWS IAM: Permissions

3
Comments
4 min read
How to Handle Secrets in Kubernetes

How to Handle Secrets in Kubernetes

7
Comments 1
8 min read
AWS Landing Zones

AWS Landing Zones

Comments
1 min read
Kubernetes: Storage & Security

Kubernetes: Storage & Security

1
Comments
11 min read
Security on AWS - AWS WAF x AWS App Runner

Security on AWS - AWS WAF x AWS App Runner

4
Comments 1
10 min read
🚀 Node.js 20: Unleashing the Power of Performance and Security 💪

🚀 Node.js 20: Unleashing the Power of Performance and Security 💪

1
Comments
2 min read
The Hidden Tradeoff of Keyless Auth

The Hidden Tradeoff of Keyless Auth

Comments
2 min read
Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

1
Comments
2 min read
RBAC with API Gateway and Open Policy Agent(OPA)

RBAC with API Gateway and Open Policy Agent(OPA)

38
Comments
10 min read
Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP)

1
Comments
6 min read
What Developers Need to Know About JWTs

What Developers Need to Know About JWTs

8
Comments
20 min read
Configure Nginx Reverse Proxy on Ubuntu VMs + SSL Encryption

Configure Nginx Reverse Proxy on Ubuntu VMs + SSL Encryption

4
Comments
3 min read
HTTP Security Headers in ASP.NET

HTTP Security Headers in ASP.NET

14
Comments 2
3 min read
How to Use Cross Account IAM Role

How to Use Cross Account IAM Role

22
Comments
2 min read
Check Windows Vulnerabilities Right Now with Vuls!

Check Windows Vulnerabilities Right Now with Vuls!

3
Comments 1
4 min read
🕵️ Active Directory Groups audit w. Neo4J

🕵️ Active Directory Groups audit w. Neo4J

1
Comments 1
2 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Server Name Indication (SNI)

Server Name Indication (SNI)

14
Comments
7 min read
Applying Content Security Policy in Symfony to Reduce XSS Risks

Applying Content Security Policy in Symfony to Reduce XSS Risks

7
Comments
9 min read
Ensuring Secure User Sessions: A Guide to Logging Out Users Due to Inactivity in PHP

Ensuring Secure User Sessions: A Guide to Logging Out Users Due to Inactivity in PHP

3
Comments
2 min read
My CNCF LFX Mentorship Spring 2023 Project at Kubescape

My CNCF LFX Mentorship Spring 2023 Project at Kubescape

4
Comments
7 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

11
Comments
6 min read
Why should you use IMDSv2 and not IMDS on AWS EC2

Why should you use IMDSv2 and not IMDS on AWS EC2

12
Comments
2 min read
Symfony internals and security

Symfony internals and security

3
Comments
3 min read
loading...