DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Cryptographic Guardrails for AI-Assisted Coding

Building Cryptographic Guardrails for AI-Assisted Coding

1
Comments
3 min read
How to Sanitize PDF Files: Removing Hidden Risks

How to Sanitize PDF Files: Removing Hidden Risks

Comments
2 min read
Which KeePass version is best for me?

Which KeePass version is best for me?

Comments
5 min read
From Getting Rekt to Building a Shield: Why I'm Battling Smart Contract Scams

From Getting Rekt to Building a Shield: Why I'm Battling Smart Contract Scams

4
Comments
3 min read
Why Your Company Should Use a Self-Signed Internal CA for TLS Certificates

Why Your Company Should Use a Self-Signed Internal CA for TLS Certificates

Comments
3 min read
Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats

Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats

Comments
3 min read
Go Security Guide: Tokens, SHA1, RSA & AES Encryption

Go Security Guide: Tokens, SHA1, RSA & AES Encryption

2
Comments
4 min read
🚀 Container Hardening: 12 Essential Rules for Secure and Optimized Docker Builds

🚀 Container Hardening: 12 Essential Rules for Secure and Optimized Docker Builds

Comments
4 min read
How to create QR based 2fa system in Node.js (step-by-step)

How to create QR based 2fa system in Node.js (step-by-step)

1
Comments
4 min read
At-Rest vs In-Transit Encryption

At-Rest vs In-Transit Encryption

1
Comments
1 min read
kcpwd: A Minimal Python CLI to Keep Your Secrets Safe in Local Development

kcpwd: A Minimal Python CLI to Keep Your Secrets Safe in Local Development

5
Comments
6 min read
Symmetric vs Asymmetric Encryption

Symmetric vs Asymmetric Encryption

1
Comments
1 min read
How I Used WireGuard to Secure API Communication Between Cloud Servers — Plus a PyAirbyte Custom Connector Tutorial

How I Used WireGuard to Secure API Communication Between Cloud Servers — Plus a PyAirbyte Custom Connector Tutorial

1
Comments
2 min read
Subscribers in PKI: Who Actually Uses the Certificates

Subscribers in PKI: Who Actually Uses the Certificates

Comments
8 min read
Evading AV and EDR solutions

Evading AV and EDR solutions

3
Comments
5 min read
A Practical Guide to Extracting and Analyzing IoT Firmware

A Practical Guide to Extracting and Analyzing IoT Firmware

Comments
7 min read
30+ WordPress Security Best Practices in 2025

30+ WordPress Security Best Practices in 2025

2
Comments
17 min read
Setup Production Sederhana yang Aman dan Efisien

Setup Production Sederhana yang Aman dan Efisien

Comments
2 min read
Encryption: The Ways We Protect Our Data

Encryption: The Ways We Protect Our Data

Comments
5 min read
Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)

Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)

Comments
1 min read
Memahami Jenis-Jenis Metode Autentikasi dan Alur (Flow)-nya

Memahami Jenis-Jenis Metode Autentikasi dan Alur (Flow)-nya

Comments
3 min read
Policy as Code, Everywhere: How Casbin Makes Authorization Simple, Powerful, and Portable

Policy as Code, Everywhere: How Casbin Makes Authorization Simple, Powerful, and Portable

Comments
5 min read
🐧 Hardening Linux: практическое руководство для безопасной работы

🐧 Hardening Linux: практическое руководство для безопасной работы

2
Comments
2 min read
ShieldX - A Vietnamese developer's dream to make enterprise security accessible

ShieldX - A Vietnamese developer's dream to make enterprise security accessible

1
Comments
2 min read
My Journey into Programming: From Curiosity to Code

My Journey into Programming: From Curiosity to Code

Comments
1 min read
loading...