DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

1
Comments
4 min read
Understanding SSH: A Beginner's Guide

Understanding SSH: A Beginner's Guide

3
Comments
8 min read
Trust-First Growth for Crypto Tech: A Developer’s Playbook

Trust-First Growth for Crypto Tech: A Developer’s Playbook

Comments
5 min read
Let's Stop Overprotecting Confidential Information

Let's Stop Overprotecting Confidential Information

Comments
3 min read
Data Protection in Blockchain | CCPA Compliance

Data Protection in Blockchain | CCPA Compliance

3
Comments
3 min read
The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

Comments
9 min read
Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quê na AWS?

Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quê na AWS?

Comments
3 min read
Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

6
Comments
2 min read
GreHack 2025

GreHack 2025

Comments
3 min read
Your audit logs are about to break your database

Your audit logs are about to break your database

Comments
2 min read
Proper Key Derivation and Cryptographic Session Setup: Best Practices for Secure Communication

Proper Key Derivation and Cryptographic Session Setup: Best Practices for Secure Communication

Comments
2 min read
Modelo de Responsabilidade Compartilhada da AWS

Modelo de Responsabilidade Compartilhada da AWS

Comments
3 min read
The Workflow of the Future Is Already Here (And It's Nothing Like You Think)

The Workflow of the Future Is Already Here (And It's Nothing Like You Think)

2
Comments
8 min read
I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

1
Comments 2
5 min read
Secure SSH Shell Applications - Planning Guide

Secure SSH Shell Applications - Planning Guide

Comments
3 min read
Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro

Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro

Comments
3 min read
My Fedora Beta Disaster: Lessons from Two Years of Linux Journey

My Fedora Beta Disaster: Lessons from Two Years of Linux Journey

Comments
3 min read
gopin - Automate Version Pinning for Go Install Commands

gopin - Automate Version Pinning for Go Install Commands

4
Comments
4 min read
Who Needs CSP?

Who Needs CSP?

2
Comments 1
8 min read
L'atelier secret de GCP, ou comment déjouer les bandits de Noël

L'atelier secret de GCP, ou comment déjouer les bandits de Noël

3
Comments
5 min read
Securing Your FastAPI APIs with JWT

Securing Your FastAPI APIs with JWT

1
Comments
6 min read
Safe and Smart Project Discovery. How NVIDIA Nemotron Beats Cloud AI for Integration Projects

Safe and Smart Project Discovery. How NVIDIA Nemotron Beats Cloud AI for Integration Projects

Comments
1 min read
Anyone Can Impersonate You on GitHub - Here's How to Protect Yourself

Anyone Can Impersonate You on GitHub - Here's How to Protect Yourself

11
Comments
7 min read
Stop using pip install... at least not directly. Secure your Python supply chain with pipq.

Stop using pip install... at least not directly. Secure your Python supply chain with pipq.

Comments
4 min read
Deja de usar pip install... al menos no directamente. Asegura tu cadena de suministro de Python con pipq.

Deja de usar pip install... al menos no directamente. Asegura tu cadena de suministro de Python con pipq.

Comments
4 min read
loading...