DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How End-to-End Encryption Really Works: Understanding the Diffie–Hellman Key Exchange

How End-to-End Encryption Really Works: Understanding the Diffie–Hellman Key Exchange

Comments
3 min read
Adding Security Headers on Cloudflare

Adding Security Headers on Cloudflare

6
Comments 2
3 min read
🔓 Understanding Uniface 10.4 $decode Function: A Complete Guide

🔓 Understanding Uniface 10.4 $decode Function: A Complete Guide

Comments
2 min read
server log analyzer tools

server log analyzer tools

Comments
3 min read
What is DNS and how does it work

What is DNS and how does it work

Comments
3 min read
Security news weekly round-up - 31st October 2025

Security news weekly round-up - 31st October 2025

Comments
2 min read
NGINX API Authentication/Authorization

NGINX API Authentication/Authorization

Comments
1 min read
MCP Security: Navigating the Exploit Playbook for Agent

MCP Security: Navigating the Exploit Playbook for Agent

26
Comments 11
7 min read
Secure Your Supabase Auth with email_guard

Secure Your Supabase Auth with email_guard

10
Comments
8 min read
Creating a Maintenance Page using a Cloudflare Worker

Creating a Maintenance Page using a Cloudflare Worker

3
Comments
4 min read
Isolando ambientes de dev com perfis de navegador virtuais

Isolando ambientes de dev com perfis de navegador virtuais

1
Comments
3 min read
How to Automatically Detect Unauthorized File Changes in WordPress

How to Automatically Detect Unauthorized File Changes in WordPress

Comments
3 min read
Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan

Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan

Comments
2 min read
Building an Auto-Logout System for Angular Applications: Securing User Sessions with Inactivity Detection

Building an Auto-Logout System for Angular Applications: Securing User Sessions with Inactivity Detection

1
Comments 1
4 min read
Quantum-Aware Symbolic Defense System

Quantum-Aware Symbolic Defense System

Comments
3 min read
The Hidden Risks of "Secure by Default": Why Security Contexts in Kubernetes Matter

The Hidden Risks of "Secure by Default": Why Security Contexts in Kubernetes Matter

3
Comments
6 min read
Generate Self-Signed SSL Cert

Generate Self-Signed SSL Cert

Comments
4 min read
From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

Comments
1 min read
Cyber Arena for Symbolic AI Defense

Cyber Arena for Symbolic AI Defense

1
Comments
3 min read
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Comments
4 min read
Understanding Authentication Types: The Complete Developer's Guide

Understanding Authentication Types: The Complete Developer's Guide

Comments 1
4 min read
Penetration Testing vs. Red Teaming

Penetration Testing vs. Red Teaming

1
Comments
4 min read
Cryptography for developers

Cryptography for developers

2
Comments
3 min read
7 Tips for Securing Nginx with TLS, HTTP/2, and Modern Ciphers

7 Tips for Securing Nginx with TLS, HTTP/2, and Modern Ciphers

Comments
3 min read
Introducing SysBrain: A Cognitive Automation Framework for Windows Power Users”

Introducing SysBrain: A Cognitive Automation Framework for Windows Power Users”

Comments
1 min read
loading...