DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is TCP/IP ? Introduction TCP/IP Packet.

What is TCP/IP ? Introduction TCP/IP Packet.

2
Comments
3 min read
Securing Node.js Applications with the Built-in Crypto Module: A Guide for Developers with code.

Securing Node.js Applications with the Built-in Crypto Module: A Guide for Developers with code.

5
Comments
3 min read
Types of Privilege Escalation Attacks

Types of Privilege Escalation Attacks

Comments
3 min read
Securing your Flutter apps with Multi-Factor Authentication

Securing your Flutter apps with Multi-Factor Authentication

10
Comments 1
14 min read
Understanding and Mitigating CRLF Injection

Understanding and Mitigating CRLF Injection

Comments
4 min read
Snowflake Roles and Access Control: What You Need to Know 101

Snowflake Roles and Access Control: What You Need to Know 101

5
Comments
18 min read
🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

41
Comments
4 min read
Understanding and Preventing NULL Pointer Dereference

Understanding and Preventing NULL Pointer Dereference

4
Comments
6 min read
An Introduction to OAuth 2.0 with Node.js and Passport.js

An Introduction to OAuth 2.0 with Node.js and Passport.js

5
Comments
3 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Solving a critical bug in the default Rails caching library

Solving a critical bug in the default Rails caching library

10
Comments 2
6 min read
Multi-Factor Authentication in the Cloud

Multi-Factor Authentication in the Cloud

6
Comments 5
6 min read
Maximizing Magento 2 Security: Advanced Techniques for Experienced Developers

Maximizing Magento 2 Security: Advanced Techniques for Experienced Developers

2
Comments 1
7 min read
You need to learn docker... security!

You need to learn docker... security!

5
Comments
2 min read
A Guide to ACID In MySQL

A Guide to ACID In MySQL

1
Comments
6 min read
Vulnerabilidade de Software Para Devs

Vulnerabilidade de Software Para Devs

35
Comments 1
4 min read
Blazing a Trail: Web App Development with Microsoft Blazor in 2023

Blazing a Trail: Web App Development with Microsoft Blazor in 2023

9
Comments 2
11 min read
How to Protect Software Intellectual Property Rights When Outsourcing Product Development

How to Protect Software Intellectual Property Rights When Outsourcing Product Development

4
Comments 1
12 min read
Locking Down Your RESTful API: Essential Practices for Bulletproof Security

Locking Down Your RESTful API: Essential Practices for Bulletproof Security

1
Comments
3 min read
govulncheck

govulncheck

Comments
1 min read
PostgreSQL 14: TLS 接続

PostgreSQL 14: TLS 接続

3
Comments
2 min read
PostgreSQL 12: TLS 接続

PostgreSQL 12: TLS 接続

1
Comments
2 min read
5 Way to Prevent Out of Bounds Write

5 Way to Prevent Out of Bounds Write

1
Comments
6 min read
Securing GraphQL APIs with Shield: Best Practices and Common Pitfalls

Securing GraphQL APIs with Shield: Best Practices and Common Pitfalls

11
Comments
8 min read
LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

2
Comments
1 min read
Detect and Prevent Cross-Site Scripting (XSS) in Your Web Application

Detect and Prevent Cross-Site Scripting (XSS) in Your Web Application

5
Comments
9 min read
How to Generate an SSRS Report as a Password-Protected PDF Using the Bold Reports Report Writer

How to Generate an SSRS Report as a Password-Protected PDF Using the Bold Reports Report Writer

3
Comments
5 min read
Hosting Checker - How to find out where the website is hosted via Terminal?

Hosting Checker - How to find out where the website is hosted via Terminal?

8
Comments
3 min read
Generate cryptographically-protected passwords with PHP

Generate cryptographically-protected passwords with PHP

1
Comments 1
1 min read
Selecting the Best Authorization for Your API Integrations

Selecting the Best Authorization for Your API Integrations

Comments
6 min read
Web Security: Understanding Request Smuggling

Web Security: Understanding Request Smuggling

25
Comments 3
3 min read
Secure your Dockerfile for SSG with NextJS and Prisma

Secure your Dockerfile for SSG with NextJS and Prisma

5
Comments
4 min read
High level guide for developing IBM QRadar Apps

High level guide for developing IBM QRadar Apps

6
Comments
4 min read
API Limiting: Best Practices and Implementation

API Limiting: Best Practices and Implementation

6
Comments
8 min read
Stack Cloud/Network/Security Certifications

Stack Cloud/Network/Security Certifications

Comments
4 min read
Hostname Verification: Preventing Man-in-the-Middle Attacks

Hostname Verification: Preventing Man-in-the-Middle Attacks

Comments
3 min read
Infrastructure Security using Azure Devops

Infrastructure Security using Azure Devops

Comments
2 min read
“Continue with Google” – How OAuth system work?

“Continue with Google” – How OAuth system work?

1
Comments
7 min read
The Ultimate Guide to Web Application Security (As a developer)

The Ultimate Guide to Web Application Security (As a developer)

Comments
4 min read
How to Prevent Out of Bounds Read

How to Prevent Out of Bounds Read

Comments
4 min read
Create JSON Web Tokens for development and testing

Create JSON Web Tokens for development and testing

13
Comments
2 min read
Identity Wallet Concept

Identity Wallet Concept

Comments
4 min read
Introducing APIrank.dev algorithm update - a better benchmark of 7000+ Public APIs on the internet

Introducing APIrank.dev algorithm update - a better benchmark of 7000+ Public APIs on the internet

10
Comments
1 min read
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

3
Comments
7 min read
Okta's auth0

Okta's auth0

6
Comments
1 min read
Mitigating Server-Side Request Forgery

Mitigating Server-Side Request Forgery

2
Comments
6 min read
Recovering from Accidentally Pushing Sensitive Information to a Remote Git Repository

Recovering from Accidentally Pushing Sensitive Information to a Remote Git Repository

12
Comments 5
2 min read
Top Cybersecurity Tools

Top Cybersecurity Tools

1
Comments
2 min read
Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
Password hashing using Bcrypt in Python

Password hashing using Bcrypt in Python

6
Comments 1
6 min read
Streamlining Your Data Transfer

Streamlining Your Data Transfer

1
Comments
6 min read
Automate Weekly Newsletter

Automate Weekly Newsletter

4
Comments
2 min read
What is pkill?

What is pkill?

1
Comments 1
2 min read
Best Practices When Designing AWS Architecture: Security and Operational Excellence

Best Practices When Designing AWS Architecture: Security and Operational Excellence

1
Comments
2 min read
Seguridad en Golang

Seguridad en Golang

14
Comments 2
5 min read
Prisma + ZenStack: An Alternative to PostgREST

Prisma + ZenStack: An Alternative to PostgREST

17
Comments
4 min read
Laravel Security: Advanced Techniques to Keep Your Web App Safe

Laravel Security: Advanced Techniques to Keep Your Web App Safe

Comments
2 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
What Does Identity Provider Actually Mean?

What Does Identity Provider Actually Mean?

3
Comments
2 min read
Protect your Web Apps Against DDoS Attacks by Using AWS Shield

Protect your Web Apps Against DDoS Attacks by Using AWS Shield

2
Comments
3 min read
loading...