DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Comments
4 min read
Signal Private Messenger Crypto Algorithm Double to Triple

Signal Private Messenger Crypto Algorithm Double to Triple

5
Comments
4 min read
Configuring Users and Permissions on Linux and Windows: A Complete Guide

Configuring Users and Permissions on Linux and Windows: A Complete Guide

Comments
6 min read
Protect Your Software Supply Chain with SBOMs – Security and Compliance

Protect Your Software Supply Chain with SBOMs – Security and Compliance

Comments
6 min read
🔒 Encapsulation in Java: Building Code That Protects Itself

🔒 Encapsulation in Java: Building Code That Protects Itself

Comments
3 min read
Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

6
Comments
11 min read
Caddy, self-signed certificates and Certificate Authorities for web development

Caddy, self-signed certificates and Certificate Authorities for web development

Comments
3 min read
From Setup to Role-Based Access — Building a Platform for Two Worlds

From Setup to Role-Based Access — Building a Platform for Two Worlds

Comments
1 min read
Check a list of IP addresses for proxies using IP2Proxy Dart

Check a list of IP addresses for proxies using IP2Proxy Dart

Comments
5 min read
Azure Landing Zone

Azure Landing Zone

2
Comments 2
14 min read
Making Authentication Seamless: How SSO Works in Modern Systems

Making Authentication Seamless: How SSO Works in Modern Systems

Comments
3 min read
Math.random, friend or foe?

Math.random, friend or foe?

8
Comments 4
5 min read
🧵 Understanding L1s, L2s, and Rollups

🧵 Understanding L1s, L2s, and Rollups

1
Comments
2 min read
Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Comments
3 min read
Templating with Go's html/template and text/template

Templating with Go's html/template and text/template

1
Comments 1
5 min read
Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Comments
3 min read
How to send OTP codes with SMS in Node.js

How to send OTP codes with SMS in Node.js

1
Comments
2 min read
How to use Okta to remotely authenticate to your BigQuery MCP Server

How to use Okta to remotely authenticate to your BigQuery MCP Server

4
Comments
6 min read
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

4
Comments
9 min read
Cloud Architects are Movie Directors: An OCI IAM Story

Cloud Architects are Movie Directors: An OCI IAM Story

Comments
6 min read
How to Create a One-Time Payment Link and Secure Webhook Integration with Stripe

How to Create a One-Time Payment Link and Secure Webhook Integration with Stripe

1
Comments
3 min read
Encrypting my HTTP server with OpenSSL in C 🔒

Encrypting my HTTP server with OpenSSL in C 🔒

2
Comments
5 min read
5 MCP Myths That Are Killing Your Implementation (Let's Debate)

5 MCP Myths That Are Killing Your Implementation (Let's Debate)

Comments
3 min read
Quantum-Powered Privacy: Securing the IoT with Decentralized Anomaly Detection

Quantum-Powered Privacy: Securing the IoT with Decentralized Anomaly Detection

Comments
2 min read
Securing Samba at the Global Level – Controlling the Server’s DNA

Securing Samba at the Global Level – Controlling the Server’s DNA

Comments 1
4 min read
loading...