loading...
👋 Sign in for the ability sort posts by top and latest.

How to set token authentication via AJAX in Django to secure the API URL

Reactions 6 Comments 5
2 min read

Predictive vs. Adaptive SDLC: What is the Difference?

Reactions 2
5 min read

A Developer’s guide to Code Signing Certificates

Reactions 4
4 min read

What's new in OAuth 2.1?

Reactions 3
14 min read

How to secure your Raspberry Pi - or - how my Raspberry Pi was hacked

Reactions 10 Comments 2
6 min read

Analizando un método de bypass de sistemas WAF

Reactions 3
2 min read

From Firewalls to Security Groups

Reactions 32
6 min read

How to Backup MySQL Databases on Ubuntu VPS Server Automatically

Reactions 3
2 min read

A Complete Guide to Man in The Middle Attacks

Reactions 20
10 min read

Managing different SSH keys for GitLab and GitHub.

Reactions 8
2 min read

ハードウェアのハッキング

Reactions 6
1 min read

The 10 most critical API security risks - Part 9: Improper Assets Management

Reactions 6
2 min read

Hacker101 CTF - Photo Gallery

Reactions 10 Comments 1
5 min read

One-step to prevent potential NoSQL Injection in your mongodb application

Reactions 7
3 min read

A Strategy for Passing AWS Certifications

Reactions 6 Comments 1
4 min read

Cloud Networking and Security

Reactions 6
3 min read

Best websites to make you more secure online. The Ultimate List 👀 (Updated 6.0). You have to see this.

Reactions 74 Comments 25
11 min read

How to set Proxy for Docker Containers in Linux Machines?

Reactions 3
3 min read

Simplifying "Login With Twitter" using Python and Flask.

Reactions 6
5 min read

How to enable DNS-over-TLS on Ubuntu using CoreDNS

Reactions 7
5 min read

E-commerce Security Basics: How to Start with E-commerce Security

Reactions 6
4 min read

Secure by Design

Reactions 9 Comments 1
6 min read

Java - secure an endpoint using Spring Security

Reactions 4
12 min read

How to Ensure Security in Your SaaS Application

Reactions 6
8 min read

The Math of Password Hashing Algorithms and Entropy

Reactions 3
9 min read

Clarifying Authentication and Authorization with Lupe Fiasco

Reactions 3 Comments 1
2 min read

Authenticating a React App with Laravel Sanctum - Part 4

Reactions 4
5 min read

Single Sign-On SSH: User Story

Reactions 3
2 min read

SQL Injection inside Stored Procedures

Reactions 6
3 min read

#helpExtending markdown with template engine, and security?

Reactions 4
1 min read

#challenge6 Cloud Security Challenges and How to Address Them

Reactions 3
8 min read

Handling JWT securely on your client

Reactions 3
2 min read

Self-hosted team password manager using KeeWeb

Reactions 10
5 min read

#todayilearnedHow to avoid Insecure Binder Configuration in JAVA

Reactions 4
2 min read

AngularJS Security Fundamentals

Reactions 7
7 min read

Data Storage Security: 5 Best Practices to Secure Your Data

Reactions 6 Comments 1
2 min read

HTB CTF - Decode Me!!

Reactions 6
2 min read

Don’t make your .git folder publicly accessible, hacker can steal your source code

Reactions 63 Comments 7
2 min read

How to securely store JWT tokens.

Reactions 679 Comments 45
6 min read

มาตรวจดูกันว่าโปรเจค Android, iOS project เราปลอดภัยแค่ไหนด้วย MobSF

Reactions 7
1 min read

มาตรวจดูกันว่า iOS Project เราใช้ dependencies อะไรที่เป็นอันรายหรือไม่ด้วย OWASP Dependency-Check

Reactions 5 Comments 1
1 min read

How to scan your AWS account for old access keys using python

Reactions 5
3 min read

HTB CTF - ezpz

Reactions 6
5 min read

DevSecOps with Azure Pipelines

Reactions 4
1 min read

Fixing weak crypto in OpenSSL based applications

Reactions 3
16 min read

Speeding up Linux disk encryption

Reactions 3
24 min read

Why Include Browser Updates As Part Of Your Dev Cycle?

Reactions 3
2 min read

GitOps - A Security Perspective (Part 1)

Reactions 59
3 min read

Authentication Best Practices in REST and GraphQL APIs

Reactions 7
8 min read

What is Xss attack? (Php)

Reactions 6
2 min read

#discussWhat are your organization's security requirements regarding Kubernetes workloads?

Reactions 7
1 min read

Authenticating a React App with Laravel Sanctum - Part 3

Reactions 3
4 min read

Why you should protect your .NET applications

Reactions 25 Comments 10
3 min read

How to learn web application security

Reactions 590 Comments 17
4 min read

10 security tips for frontend developers

Reactions 207 Comments 3
8 min read

Security in Node.JS and Express: The bare minimum - Part 3.

Reactions 10 Comments 1
4 min read

Real-World Bug Hunting by Peter Yarowski

Reactions 11
3 min read

Major Limitations of Penetration Testing You Need to Know

Reactions 8
2 min read

Fully Remove Zoom from your Mac

Reactions 3
3 min read

Jupyter notebook to check software for CVE vulnerabilities

Reactions 3
1 min read
loading...