DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Role-based auth in Angular 9 🔑

Role-based auth in Angular 9 🔑

49
Comments
1 min read
Security of Wireless Devices

Security of Wireless Devices

4
Comments 1
6 min read
5 things to consider before developing a web application

5 things to consider before developing a web application

7
Comments 1
4 min read
Secure Instant Messaging Platform - The Importance of Security Algorithm in Chat Apps

Secure Instant Messaging Platform - The Importance of Security Algorithm in Chat Apps

7
Comments 1
4 min read
Enforce security best practices in your AWS environment with AWS Config

Enforce security best practices in your AWS environment with AWS Config

4
Comments 5
8 min read
SSH and SCP with AWS SSM

SSH and SCP with AWS SSM

13
Comments 2
3 min read
Is there anything I should know about cookies as both webdev and end-user?

Is there anything I should know about cookies as both webdev and end-user?

6
Comments 2
1 min read
How to Automate Cyber Defense Without Paying a Dime

How to Automate Cyber Defense Without Paying a Dime

16
Comments
5 min read
Best Practices for Secure Session Management in Node

Best Practices for Secure Session Management in Node

99
Comments 2
8 min read
Analyzing Magecart Malware – From Zero to Hero

Analyzing Magecart Malware – From Zero to Hero

32
Comments 2
10 min read
Cyber wars: Defending your server

Cyber wars: Defending your server

38
Comments 4
4 min read
Hardening Craft CMS Permissions

Hardening Craft CMS Permissions

5
Comments
11 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
My Research paper on the 2017 Equifax Breach and potential AWS solutions

My Research paper on the 2017 Equifax Breach and potential AWS solutions

3
Comments
1 min read
Android Hack

Android Hack

2
Comments 1
2 min read
THIS IS UNSAFE (and a Bad Idea)

THIS IS UNSAFE (and a Bad Idea)

19
Comments 3
1 min read
How do you maintain your security and privacy?

How do you maintain your security and privacy?

8
Comments
2 min read
SkyHole: Privacy In A Digital Age

SkyHole: Privacy In A Digital Age

9
Comments
5 min read
IAM Policy to list an S3 bucket, except for the top-level (root) of the bucket

IAM Policy to list an S3 bucket, except for the top-level (root) of the bucket

10
Comments
3 min read
Hacking Random Generator (linear congruential generator)

Hacking Random Generator (linear congruential generator)

12
Comments
1 min read
0x00SEC CTF - Exercise #1

0x00SEC CTF - Exercise #1

48
Comments 2
5 min read
Protect your network resources with Azure Firewall

Protect your network resources with Azure Firewall

16
Comments
5 min read
How Do Brute-Force Attackers Know They Found The Key?

How Do Brute-Force Attackers Know They Found The Key?

18
Comments 2
4 min read
To avoid being tracked, browse in multiverses

To avoid being tracked, browse in multiverses

73
Comments 6
4 min read
Lessons learned from surviving an application attack

Lessons learned from surviving an application attack

5
Comments 2
7 min read
loading...