DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
QuillCTF: 6. Collatz Puzzle

QuillCTF: 6. Collatz Puzzle

4
Comments
4 min read
♾️ Efficient stack management with eol on GitHub 🧑‍🤝‍🧑

♾️ Efficient stack management with eol on GitHub 🧑‍🤝‍🧑

Comments 3
1 min read
Automating the deletion of specific inbound rules from any security groups in AWS via Config

Automating the deletion of specific inbound rules from any security groups in AWS via Config

9
Comments
5 min read
I've created a full-stack user permission model, should I go open-source?

I've created a full-stack user permission model, should I go open-source?

3
Comments
4 min read
Concurrency and Parallelism: An Overview

Concurrency and Parallelism: An Overview

7
Comments
4 min read
Authenticate using Auth0

Authenticate using Auth0

5
Comments
1 min read
Secure Your Webserver with Nginx

Secure Your Webserver with Nginx

3
Comments
4 min read
10 Best Practices to keep your API secure

10 Best Practices to keep your API secure

4
Comments 1
2 min read
Check Website Headers

Check Website Headers

1
Comments 1
1 min read
What's insecure, buggy, and poorly designed in the following wordpress code?

What's insecure, buggy, and poorly designed in the following wordpress code?

Comments
1 min read
CVE-2023-22501 - Broken Authentication vulnerability in Jira Service Management

CVE-2023-22501 - Broken Authentication vulnerability in Jira Service Management

1
Comments
2 min read
Terraform Credentials Setup in GCP

Terraform Credentials Setup in GCP

1
Comments
2 min read
The Anatomy of a PostgreSQL Hack: How It Happened and What We Did About It.

The Anatomy of a PostgreSQL Hack: How It Happened and What We Did About It.

4
Comments
3 min read
PHP security highlights

PHP security highlights

1
Comments
4 min read
Securing Admin access to Apache APISIX

Securing Admin access to Apache APISIX

9
Comments
4 min read
Set up a private ClamAV database mirror with a Tor-based local SOCKS5 proxy

Set up a private ClamAV database mirror with a Tor-based local SOCKS5 proxy

3
Comments
8 min read
Developing Form Validations

Developing Form Validations

1
Comments
2 min read
How to use MFA with AWS CLI using Yubikey

How to use MFA with AWS CLI using Yubikey

1
Comments
1 min read
Write AWS Config rules using cfn-guard

Write AWS Config rules using cfn-guard

3
Comments
3 min read
A Beginner’s Guide to HTTP & HTTPS

A Beginner’s Guide to HTTP & HTTPS

10
Comments
3 min read
Modernizing Authentication with JWT Cookies

Modernizing Authentication with JWT Cookies

1
Comments
3 min read
Cómo lograr un gobierno de múltiples cuentas a escala con AWS Control Tower - Parte 1

Cómo lograr un gobierno de múltiples cuentas a escala con AWS Control Tower - Parte 1

4
Comments 3
7 min read
Web Security

Web Security

1
Comments
7 min read
Melhorando a rastreabilidade do sistema com um histórico de ações do usuário/sistema.

Melhorando a rastreabilidade do sistema com um histórico de ações do usuário/sistema.

1
Comments 1
9 min read
Safely store secrets in Git using Blackbox

Safely store secrets in Git using Blackbox

2
Comments
4 min read
ESXiArgs encryption malware launches massive attacks against VMware ESXi servers

ESXiArgs encryption malware launches massive attacks against VMware ESXi servers

14
Comments
3 min read
Passing AWS Security Specialty Exam — My Tips and Notes

Passing AWS Security Specialty Exam — My Tips and Notes

13
Comments 3
5 min read
Passwordless login for React Native apps

Passwordless login for React Native apps

Comments
7 min read
PFSense

PFSense

Comments
1 min read
What are Route Tables on AWS VPC?

What are Route Tables on AWS VPC?

1
Comments 1
2 min read
The Confidential Data You Recently Deleted Is Still There and It Is at Risk of Being Leaked

The Confidential Data You Recently Deleted Is Still There and It Is at Risk of Being Leaked

2
Comments
2 min read
Know About HTTPs Security

Know About HTTPs Security

1
Comments
4 min read
Deep dive into Amazon Inspector for AWS Lambda

Deep dive into Amazon Inspector for AWS Lambda

5
Comments
4 min read
2fa on the Command Line

2fa on the Command Line

1
Comments
2 min read
How To Avoid LDAP Injection Vulnerabilities

How To Avoid LDAP Injection Vulnerabilities

1
Comments
6 min read
Big picture of what Auth is

Big picture of what Auth is

4
Comments
3 min read
How to Generate Strong and Secure Passwords with Go: A Step-by-Step Guide 🔐👨‍💻

How to Generate Strong and Secure Passwords with Go: A Step-by-Step Guide 🔐👨‍💻

9
Comments 1
4 min read
Encrypt and Decrypt Data in Node.js using aes-256-cbc

Encrypt and Decrypt Data in Node.js using aes-256-cbc

118
Comments 8
6 min read
Create Self-signed certificates with OpenSSL

Create Self-signed certificates with OpenSSL

Comments
3 min read
6 Tips to Use SSH Client Effectively For Connecting To Linux Servers

6 Tips to Use SSH Client Effectively For Connecting To Linux Servers

8
Comments 4
6 min read
Implementing Authorization in FastAPI: A Step-by-Step Guide to Securing Your Web Applications

Implementing Authorization in FastAPI: A Step-by-Step Guide to Securing Your Web Applications

54
Comments 3
7 min read
Architecting for Security: MySQL Edition

Architecting for Security: MySQL Edition

3
Comments
10 min read
Accessing Symfony security user on the background

Accessing Symfony security user on the background

2
Comments
2 min read
Como deixar seu projeto mais seguro com Dependabot

Como deixar seu projeto mais seguro com Dependabot

22
Comments 3
4 min read
1Password CLI, AWS and Terraform

1Password CLI, AWS and Terraform

3
Comments 2
2 min read
Secure your stack with Vulnerability Management

Secure your stack with Vulnerability Management

Comments
3 min read
Allow access to REST API Gateway from specific IP addresses | Whitelist IPs

Allow access to REST API Gateway from specific IP addresses | Whitelist IPs

3
Comments 2
3 min read
Integrity Check using PGP for JMeter

Integrity Check using PGP for JMeter

1
Comments
8 min read
Active Record Encryption and Rollover with ENV's instead of credentials

Active Record Encryption and Rollover with ENV's instead of credentials

1
Comments
2 min read
#DevDiscuss: Passwordless Authentication

#DevDiscuss: Passwordless Authentication

29
Comments 33
1 min read
Password Hashing in Node.js Using bcryptjs Library.

Password Hashing in Node.js Using bcryptjs Library.

30
Comments 2
6 min read
API Authentication In Depth

API Authentication In Depth

5
Comments
7 min read
Docker Best Practices: Security

Docker Best Practices: Security

5
Comments 2
4 min read
Build Networks with VLANs

Build Networks with VLANs

5
Comments
13 min read
A story about one DDOS attack and methods of protecting Juniper routing engine

A story about one DDOS attack and methods of protecting Juniper routing engine

4
Comments 1
22 min read
Avoiding Security Vulnerabilities: The tx.origin vs msg.sender Debate

Avoiding Security Vulnerabilities: The tx.origin vs msg.sender Debate

2
Comments 2
4 min read
Deploying a Service Securely on AWS - Part 1

Deploying a Service Securely on AWS - Part 1

1
Comments
7 min read
How to Set Up a Proxy Server in React | Dealing with CORS

How to Set Up a Proxy Server in React | Dealing with CORS

42
Comments 4
4 min read
SAST: how code analysis tools look for security flaws

SAST: how code analysis tools look for security flaws

2
Comments
14 min read
Your extraordinary one time secret

Your extraordinary one time secret

Comments
3 min read
loading...