DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Explain CSRF like I'm five.

Explain CSRF like I'm five.

17
Comments 1
1 min read
Why Password Length is so Important

Why Password Length is so Important

36
Comments 11
4 min read
Securing Your ASP.NET Application

Securing Your ASP.NET Application

28
Comments 5
4 min read
Cheap sudo tricks

Cheap sudo tricks

4
Comments
1 min read
A full time developer and a full time hacker

A full time developer and a full time hacker

26
Comments
5 min read
Growing Importance of SSL Certificates and their Advantages

Growing Importance of SSL Certificates and their Advantages

4
Comments 1
2 min read
New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary

New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary

4
Comments
5 min read
Mobile app security: How to avoid reverse engineering of an Android application

Mobile app security: How to avoid reverse engineering of an Android application

63
Comments
2 min read
Hack more, learn more, earn more and get invited more.

Hack more, learn more, earn more and get invited more.

31
Comments 1
7 min read
Random vs. Pseudorandom

Random vs. Pseudorandom

41
Comments 2
9 min read
Apple Silicon Is Also A Chance To Improve Security

Apple Silicon Is Also A Chance To Improve Security

2
Comments
2 min read
What are the best SEO Strategies?

What are the best SEO Strategies?

3
Comments
2 min read
Monitoring The Cloud

Monitoring The Cloud

7
Comments 3
3 min read
Network Security Monitoring with bro

Network Security Monitoring with bro

16
Comments 3
3 min read
IoT security risks: What are they and how to manage

IoT security risks: What are they and how to manage

4
Comments 2
3 min read
Securely transfer data to client from server application

Securely transfer data to client from server application

6
Comments
1 min read
How to easily add HTTPS to your Server for free!

How to easily add HTTPS to your Server for free!

6
Comments
3 min read
Kerberos explained in pictures

Kerberos explained in pictures

21
Comments 3
4 min read
How to protect Big Data? Top 6 Big Data security challenges

How to protect Big Data? Top 6 Big Data security challenges

17
Comments 2
2 min read
Why We Started Using AWS Secrets Manager

Why We Started Using AWS Secrets Manager

6
Comments 2
3 min read
Invisible reCAPTCHA on mobile?

Invisible reCAPTCHA on mobile?

14
Comments 2
2 min read
Explain OAuth2 like I'm five

Explain OAuth2 like I'm five

23
Comments 2
1 min read
GitHub for Bug Bounty Hunters

GitHub for Bug Bounty Hunters

15
Comments
4 min read
Rethinking email confirmation

Rethinking email confirmation

18
Comments 4
4 min read
How I pwned hundreds of users for less than $25?

How I pwned hundreds of users for less than $25?

4
Comments
1 min read
loading...