DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Maximizing Magento 2 Security: Advanced Techniques for Experienced Developers

Maximizing Magento 2 Security: Advanced Techniques for Experienced Developers

2
Comments 1
7 min read
You need to learn docker... security!

You need to learn docker... security!

5
Comments
2 min read
A Guide to ACID In MySQL

A Guide to ACID In MySQL

1
Comments
6 min read
Vulnerabilidade de Software Para Devs

Vulnerabilidade de Software Para Devs

35
Comments 1
4 min read
Blazing a Trail: Web App Development with Microsoft Blazor in 2023

Blazing a Trail: Web App Development with Microsoft Blazor in 2023

9
Comments 2
11 min read
How to Protect Software Intellectual Property Rights When Outsourcing Product Development

How to Protect Software Intellectual Property Rights When Outsourcing Product Development

4
Comments 1
12 min read
Locking Down Your RESTful API: Essential Practices for Bulletproof Security

Locking Down Your RESTful API: Essential Practices for Bulletproof Security

1
Comments
3 min read
govulncheck

govulncheck

Comments
1 min read
PostgreSQL 14: TLS 接続

PostgreSQL 14: TLS 接続

3
Comments
2 min read
PostgreSQL 12: TLS 接続

PostgreSQL 12: TLS 接続

1
Comments
2 min read
5 Way to Prevent Out of Bounds Write

5 Way to Prevent Out of Bounds Write

1
Comments
6 min read
Securing GraphQL APIs with Shield: Best Practices and Common Pitfalls

Securing GraphQL APIs with Shield: Best Practices and Common Pitfalls

11
Comments
8 min read
LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

2
Comments
1 min read
Detect and Prevent Cross-Site Scripting (XSS) in Your Web Application

Detect and Prevent Cross-Site Scripting (XSS) in Your Web Application

5
Comments
9 min read
How to Generate an SSRS Report as a Password-Protected PDF Using the Bold Reports Report Writer

How to Generate an SSRS Report as a Password-Protected PDF Using the Bold Reports Report Writer

3
Comments
5 min read
Hosting Checker - How to find out where the website is hosted via Terminal?

Hosting Checker - How to find out where the website is hosted via Terminal?

8
Comments
3 min read
Generate cryptographically-protected passwords with PHP

Generate cryptographically-protected passwords with PHP

1
Comments 1
1 min read
Selecting the Best Authorization for Your API Integrations

Selecting the Best Authorization for Your API Integrations

Comments
6 min read
Web Security: Understanding Request Smuggling

Web Security: Understanding Request Smuggling

25
Comments 3
3 min read
Secure your Dockerfile for SSG with NextJS and Prisma

Secure your Dockerfile for SSG with NextJS and Prisma

5
Comments
4 min read
High level guide for developing IBM QRadar Apps

High level guide for developing IBM QRadar Apps

6
Comments
4 min read
API Limiting: Best Practices and Implementation

API Limiting: Best Practices and Implementation

6
Comments
8 min read
Stack Cloud/Network/Security Certifications

Stack Cloud/Network/Security Certifications

Comments
4 min read
Hostname Verification: Preventing Man-in-the-Middle Attacks

Hostname Verification: Preventing Man-in-the-Middle Attacks

Comments
3 min read
Infrastructure Security using Azure Devops

Infrastructure Security using Azure Devops

Comments
2 min read
“Continue with Google” – How OAuth system work?

“Continue with Google” – How OAuth system work?

1
Comments
7 min read
The Ultimate Guide to Web Application Security (As a developer)

The Ultimate Guide to Web Application Security (As a developer)

Comments
4 min read
How to Prevent Out of Bounds Read

How to Prevent Out of Bounds Read

Comments
4 min read
Create JSON Web Tokens for development and testing

Create JSON Web Tokens for development and testing

14
Comments
2 min read
Identity Wallet Concept

Identity Wallet Concept

Comments
4 min read
Introducing APIrank.dev algorithm update - a better benchmark of 7000+ Public APIs on the internet

Introducing APIrank.dev algorithm update - a better benchmark of 7000+ Public APIs on the internet

10
Comments
1 min read
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

3
Comments
7 min read
Okta's auth0

Okta's auth0

6
Comments
1 min read
Mitigating Server-Side Request Forgery

Mitigating Server-Side Request Forgery

2
Comments
6 min read
Recovering from Accidentally Pushing Sensitive Information to a Remote Git Repository

Recovering from Accidentally Pushing Sensitive Information to a Remote Git Repository

12
Comments 5
2 min read
Top Cybersecurity Tools

Top Cybersecurity Tools

1
Comments
2 min read
Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
Password hashing using Bcrypt in Python

Password hashing using Bcrypt in Python

6
Comments 1
6 min read
Streamlining Your Data Transfer

Streamlining Your Data Transfer

1
Comments
6 min read
Automate Weekly Newsletter

Automate Weekly Newsletter

4
Comments
2 min read
What is pkill?

What is pkill?

1
Comments 1
2 min read
Best Practices When Designing AWS Architecture: Security and Operational Excellence

Best Practices When Designing AWS Architecture: Security and Operational Excellence

1
Comments
2 min read
Seguridad en Golang

Seguridad en Golang

14
Comments 2
5 min read
Prisma + ZenStack: An Alternative to PostgREST

Prisma + ZenStack: An Alternative to PostgREST

17
Comments
4 min read
Laravel Security: Advanced Techniques to Keep Your Web App Safe

Laravel Security: Advanced Techniques to Keep Your Web App Safe

1
Comments
2 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
What Does Identity Provider Actually Mean?

What Does Identity Provider Actually Mean?

3
Comments
2 min read
Protect your Web Apps Against DDoS Attacks by Using AWS Shield

Protect your Web Apps Against DDoS Attacks by Using AWS Shield

2
Comments
3 min read
Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

1
Comments
2 min read
Korunuyor musunuz?

Korunuyor musunuz?

Comments 2
4 min read
Must-know Javascript object property security

Must-know Javascript object property security

2
Comments
1 min read
Building a Secure and User-Friendly Fraud Prevention Fortress with AI and Machine Learning – It's a LEGO Adventure!

Building a Secure and User-Friendly Fraud Prevention Fortress with AI and Machine Learning – It's a LEGO Adventure!

Comments
3 min read
Choosing dependencies using deps.dev

Choosing dependencies using deps.dev

9
Comments
2 min read
Bypass IP Restrictions with Burp Suite.

Bypass IP Restrictions with Burp Suite.

1
Comments
5 min read
🚀 Secure Your Android App: Best Practices for App Security and Privacy 🔒

🚀 Secure Your Android App: Best Practices for App Security and Privacy 🔒

Comments
2 min read
Quebrando pipelines Jenkins no Windows

Quebrando pipelines Jenkins no Windows

2
Comments
2 min read
🛜 What is ARP Spoofing?

🛜 What is ARP Spoofing?

3
Comments
8 min read
What is Chmod?

What is Chmod?

1
Comments 2
1 min read
Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

7
Comments
6 min read
Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

2
Comments
4 min read
loading...