DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Increase Debian based Linux VPS server’s security

Increase Debian based Linux VPS server’s security

Comments
2 min read
NET 9 BinaryFormatter migration paths

NET 9 BinaryFormatter migration paths

3
Comments
6 min read
Issue 71 of AWS Cloud Security Weekly

Issue 71 of AWS Cloud Security Weekly

1
Comments
2 min read
How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

5
Comments
4 min read
Session Management, Tokens & Refresh Tokens

Session Management, Tokens & Refresh Tokens

2
Comments
4 min read
How to Protect ECS Containers with a Read-Only Root Filesystem

How to Protect ECS Containers with a Read-Only Root Filesystem

4
Comments
2 min read
Security news weekly round-up - 29th November 2024

Security news weekly round-up - 29th November 2024

1
Comments
3 min read
Choosing an SSL certificate: paid or free — or whether you can do without one

Choosing an SSL certificate: paid or free — or whether you can do without one

7
Comments
8 min read
Terraforming Resource Control Policies

Terraforming Resource Control Policies

5
Comments
2 min read
Free Security Learning Resources: Unlock the World of Cybersecurity

Free Security Learning Resources: Unlock the World of Cybersecurity

Comments
3 min read
Serverless self-service IoT certificate management - Part 1

Serverless self-service IoT certificate management - Part 1

1
Comments
8 min read
OS Security 🔒: Master Your Permissions in 3 Key Steps!

OS Security 🔒: Master Your Permissions in 3 Key Steps!

Comments
2 min read
Exploring Podman and Beyond: Open Source Alternatives to Docker for Secure Containerization

Exploring Podman and Beyond: Open Source Alternatives to Docker for Secure Containerization

3
Comments
5 min read
Advanced OAuth2: Refresh Tokens and Token Expiration Strategies

Advanced OAuth2: Refresh Tokens and Token Expiration Strategies

5
Comments
3 min read
Secrets 101: A fun and practical basic guide to avoiding leaks and not becoming a meme

Secrets 101: A fun and practical basic guide to avoiding leaks and not becoming a meme

Comments
3 min read
A Very Deep Dive Into Docker Builds

A Very Deep Dive Into Docker Builds

41
Comments 1
22 min read
🚀 Unlocking Fine-Grained Access Control with Cerbos

🚀 Unlocking Fine-Grained Access Control with Cerbos

34
Comments 4
6 min read
Terraform Ephemeral Resources

Terraform Ephemeral Resources

8
Comments 1
2 min read
How To Integrate Direct Card Payment on Your Website Using Flutterwave

How To Integrate Direct Card Payment on Your Website Using Flutterwave

17
Comments
11 min read
Web Services Security

Web Services Security

Comments
2 min read
Stay Safe Online: Why You Need Two-Step Verification Now!

Stay Safe Online: Why You Need Two-Step Verification Now!

1
Comments
2 min read
Debugging SSH connections: A Comprehensive Guide

Debugging SSH connections: A Comprehensive Guide

6
Comments
13 min read
Securing PHP Web Applications: Hands-On Practices

Securing PHP Web Applications: Hands-On Practices

3
Comments
2 min read
How to create an image authentication system with python streamlit and canva!

How to create an image authentication system with python streamlit and canva!

1
Comments 2
2 min read
Debug and run on Win32

Debug and run on Win32

Comments
2 min read
Introducing the DNA-KEY System: Taking the Password Generator to the Next Level! 🔐

Introducing the DNA-KEY System: Taking the Password Generator to the Next Level! 🔐

Comments
1 min read
Understanding SSH Key Pairs: A Developer's Guide

Understanding SSH Key Pairs: A Developer's Guide

6
Comments
5 min read
Protect Your Phone from Hackers

Protect Your Phone from Hackers

7
Comments
3 min read
Security strategy: zero trust model with mTLS

Security strategy: zero trust model with mTLS

Comments
2 min read
Amazon Inspector Explained: Boosting Cloud Security for Your AWS Workloads

Amazon Inspector Explained: Boosting Cloud Security for Your AWS Workloads

9
Comments 1
6 min read
What is Aws Macie ? How to discover data with Macie ?

What is Aws Macie ? How to discover data with Macie ?

1
Comments
2 min read
Introducing Amazon GuardDuty Detector Checker: Verify Enablement and Finding Publishing Configurations

Introducing Amazon GuardDuty Detector Checker: Verify Enablement and Finding Publishing Configurations

1
Comments
2 min read
🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

Comments
2 min read
Next.js server action security

Next.js server action security

3
Comments
9 min read
Unlock Ultimate Security: How to Use YubiKey (or Any Security Key) for Passwordless Access in Azure Virtual Machines!

Unlock Ultimate Security: How to Use YubiKey (or Any Security Key) for Passwordless Access in Azure Virtual Machines!

1
Comments
3 min read
STRIDE Threat Model 101

STRIDE Threat Model 101

1
Comments
7 min read
How Magento’s Security Scan Tool Protects Your Storefront from Threats

How Magento’s Security Scan Tool Protects Your Storefront from Threats

Comments
4 min read
Dockerize Secure Nestjs app with Postgres & Redis

Dockerize Secure Nestjs app with Postgres & Redis

3
Comments
3 min read
JWT in Microservices

JWT in Microservices

4
Comments
3 min read
The Zero Trust Approach in AWS: Strengthening Your Cloud Security Posture

The Zero Trust Approach in AWS: Strengthening Your Cloud Security Posture

15
Comments
2 min read
Simulando AWS KMS con LocalStack y Node.js: Una GuĂ­a para Desarrolladores

Simulando AWS KMS con LocalStack y Node.js: Una GuĂ­a para Desarrolladores

Comments
5 min read
Securing Plain Text using SHA hashing: SHA-256 Sorcery

Securing Plain Text using SHA hashing: SHA-256 Sorcery

6
Comments
2 min read
Reset unknown Windows' administrator password

Reset unknown Windows' administrator password

Comments
2 min read
Visual Studio package security

Visual Studio package security

2
Comments
4 min read
Essential Linux Security Practices for DevSecOps Success

Essential Linux Security Practices for DevSecOps Success

2
Comments
2 min read
Linux on Termux

Linux on Termux

Comments
1 min read
Fix Broken Authentication in Laravel: Step-by-Step Guide

Fix Broken Authentication in Laravel: Step-by-Step Guide

Comments
2 min read
Securing .NET Core API from DDoS Attack.

Securing .NET Core API from DDoS Attack.

5
Comments
5 min read
Discovering the Latest Features of AWS CloudFront: Enhancing Performance and Security

Discovering the Latest Features of AWS CloudFront: Enhancing Performance and Security

1
Comments
4 min read
Cybersecurity Basics: A Beginner's Guide

Cybersecurity Basics: A Beginner's Guide

4
Comments 1
4 min read
How to Effectively Assess the Security of Your Apps

How to Effectively Assess the Security of Your Apps

6
Comments
5 min read
🖥️ Tails OS: A Security-Focused, Privacy-Enhanced Operating System

🖥️ Tails OS: A Security-Focused, Privacy-Enhanced Operating System

Comments
2 min read
The Intersection of Data Science and Cybersecurity

The Intersection of Data Science and Cybersecurity

4
Comments
3 min read
Understanding Upwork's Security Systems: A Deep Technical Dive

Understanding Upwork's Security Systems: A Deep Technical Dive

32
Comments 4
2 min read
HackTheBox - Writeup Editorial [Retired]

HackTheBox - Writeup Editorial [Retired]

Comments
12 min read
Security news weekly round-up - 22nd November 2024

Security news weekly round-up - 22nd November 2024

1
Comments
2 min read
[pt-BR] Configurando um scanner antimalware para WordPress em Docker

[pt-BR] Configurando um scanner antimalware para WordPress em Docker

1
Comments
3 min read
Is Fail2ban Enough to Secure Your Linux Server?

Is Fail2ban Enough to Secure Your Linux Server?

Comments
3 min read
🐾 Kali Linux: The Penetration Testing and Security Auditing OS

🐾 Kali Linux: The Penetration Testing and Security Auditing OS

1
Comments
2 min read
Open-Source != Transparency

Open-Source != Transparency

3
Comments 5
3 min read
loading...