DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

1
Comments
2 min read
Korunuyor musunuz?

Korunuyor musunuz?

Comments 2
4 min read
Must-know Javascript object property security

Must-know Javascript object property security

2
Comments
1 min read
Building a Secure and User-Friendly Fraud Prevention Fortress with AI and Machine Learning – It's a LEGO Adventure!

Building a Secure and User-Friendly Fraud Prevention Fortress with AI and Machine Learning – It's a LEGO Adventure!

Comments
3 min read
Choosing dependencies using deps.dev

Choosing dependencies using deps.dev

9
Comments
2 min read
Bypass IP Restrictions with Burp Suite.

Bypass IP Restrictions with Burp Suite.

1
Comments
5 min read
🚀 Secure Your Android App: Best Practices for App Security and Privacy 🔒

🚀 Secure Your Android App: Best Practices for App Security and Privacy 🔒

Comments
2 min read
Quebrando pipelines Jenkins no Windows

Quebrando pipelines Jenkins no Windows

2
Comments
2 min read
🛜 What is ARP Spoofing?

🛜 What is ARP Spoofing?

3
Comments
8 min read
What is Chmod?

What is Chmod?

1
Comments 2
1 min read
Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

7
Comments
6 min read
Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

2
Comments
4 min read
Are your PDFs Actually Redacted? Double Check!

Are your PDFs Actually Redacted? Double Check!

1
Comments
3 min read
API SECURITY, how to protect your API against vulnerability risks

API SECURITY, how to protect your API against vulnerability risks

2
Comments
4 min read
Best Security Practices for Docker in 2023

Best Security Practices for Docker in 2023

22
Comments 4
8 min read
Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Comments
7 min read
Depend(abot) on Umbraco patching

Depend(abot) on Umbraco patching

1
Comments
3 min read
DelegateCall in Solidity — With Some Code Examples

DelegateCall in Solidity — With Some Code Examples

Comments
5 min read
Use Amazon CodeWhisperer for Your AWS Security

Use Amazon CodeWhisperer for Your AWS Security

6
Comments 6
4 min read
Multi-tenancy authentication done right

Multi-tenancy authentication done right

3
Comments
8 min read
What Does 2FA Actually Mean?

What Does 2FA Actually Mean?

3
Comments
3 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

11
Comments
4 min read
COMMON API VULNERABILITIES

COMMON API VULNERABILITIES

Comments
6 min read
When checking your Python package sources matters

When checking your Python package sources matters

2
Comments
4 min read
API Rate Limiting Cheat Sheet

API Rate Limiting Cheat Sheet

11
Comments 3
5 min read
Step-up authentication in Keycloak + Spring Boot

Step-up authentication in Keycloak + Spring Boot

17
Comments 1
8 min read
Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Comments
10 min read
Rethinking Security: The Need for Cookie Support in Native Mobile Applications

Rethinking Security: The Need for Cookie Support in Native Mobile Applications

2
Comments 2
3 min read
🔒Security Tips for Frontend

🔒Security Tips for Frontend

8
Comments
4 min read
Basic Kotlin/Java + Spring app with GitHub OAuth 2.0

Basic Kotlin/Java + Spring app with GitHub OAuth 2.0

4
Comments
5 min read
How to Secure the Web: A Comprehensive Guide to Authentication Strategies for Developers

How to Secure the Web: A Comprehensive Guide to Authentication Strategies for Developers

32
Comments 13
8 min read
How to get information about the provenance of Python packages installed

How to get information about the provenance of Python packages installed

3
Comments
6 min read
ReVen: a Reverse Engineering Toolkit AIO

ReVen: a Reverse Engineering Toolkit AIO

1
Comments
5 min read
Domain-Driven Architecture Used in Software Development

Domain-Driven Architecture Used in Software Development

1
Comments
5 min read
AWS CDK template validation during synthesis with Cloudformation Guard

AWS CDK template validation during synthesis with Cloudformation Guard

Comments
2 min read
Why Docker Scout

Why Docker Scout

1
Comments
4 min read
How Authentication and Authorization Work for SPAs

How Authentication and Authorization Work for SPAs

7
Comments
13 min read
NGINX vs Apache : A Comparison of Web Servers

NGINX vs Apache : A Comparison of Web Servers

7
Comments 2
3 min read
A Dualidade do Bitcoin: Privacidade versus Transparência

A Dualidade do Bitcoin: Privacidade versus Transparência

9
Comments
4 min read
Building a SvelteKit Demo Page with Web Component and Passkey Login for passkeys.eu

Building a SvelteKit Demo Page with Web Component and Passkey Login for passkeys.eu

3
Comments
9 min read
Passkeys: What the Heck and Why?

Passkeys: What the Heck and Why?

1
Comments
12 min read
Improve AWS security and compliance with cdk-nag

Improve AWS security and compliance with cdk-nag

3
Comments
6 min read
Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

2
Comments
4 min read
How to implement a Mesh Network on AWS

How to implement a Mesh Network on AWS

13
Comments 1
9 min read
A beginner's guide to Termius: the ultimate terminal

A beginner's guide to Termius: the ultimate terminal

65
Comments 10
3 min read
Six security risks of user input in ruby code

Six security risks of user input in ruby code

Comments
4 min read
Managing network security aspects in the public cloud

Managing network security aspects in the public cloud

2
Comments
4 min read
System Design : Vertical And Horizontal Scaling

System Design : Vertical And Horizontal Scaling

Comments 1
2 min read
Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 2.

Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 2.

1
Comments
3 min read
Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 1.

Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 1.

Comments
4 min read
Unlocking the Power of Linux Capabilities: Exposing Port 80 without Root Access

Unlocking the Power of Linux Capabilities: Exposing Port 80 without Root Access

2
Comments
3 min read
Spring Security Lambda DSL

Spring Security Lambda DSL

4
Comments 1
4 min read
Announcing Lucia 1.0 - A simple and flexible auth library with support for multiple databases and frameworks

Announcing Lucia 1.0 - A simple and flexible auth library with support for multiple databases and frameworks

1
Comments
2 min read
Unlocking Zero Knowledge Proofs: From Beginner to Advanced

Unlocking Zero Knowledge Proofs: From Beginner to Advanced

2
Comments
5 min read
Setting up SSL Certificates for HAProxy with Let’s Encrypt

Setting up SSL Certificates for HAProxy with Let’s Encrypt

2
Comments
5 min read
Effective Security & Authentication for a modern full stack Web Application

Effective Security & Authentication for a modern full stack Web Application

2
Comments 2
5 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
Exploring Google Zanzibar: A Demonstration of Its Basics

Exploring Google Zanzibar: A Demonstration of Its Basics

39
Comments 2
12 min read
Como usar autenticação 2 fatores no GitHub

Como usar autenticação 2 fatores no GitHub

27
Comments 1
3 min read
AWS SSO & GitHub OpenID Connect Setup

AWS SSO & GitHub OpenID Connect Setup

5
Comments
4 min read
loading...