DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

1
Comments
4 min read
Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

1
Comments
9 min read
Understanding JWTs: A Simple Guide for Beginners

Understanding JWTs: A Simple Guide for Beginners

106
Comments 9
2 min read
Id or UUID: Which one should you use as the primary key in your DB?

Id or UUID: Which one should you use as the primary key in your DB?

1
Comments
3 min read
RBAC for Exchange Online Mailboxes

RBAC for Exchange Online Mailboxes

7
Comments
4 min read
Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

21
Comments 2
9 min read
How to use hCAPTCHA with Iris

How to use hCAPTCHA with Iris

Comments
3 min read
Demystifying AWS Partitions

Demystifying AWS Partitions

4
Comments
4 min read
NPM Security Attacks

NPM Security Attacks

Comments
2 min read
7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

2
Comments
3 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

21
Comments 2
17 min read
Exploring Cross-Site Scripting with React and Tauri

Exploring Cross-Site Scripting with React and Tauri

5
Comments
5 min read
Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

5
Comments
4 min read
An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

3
Comments 1
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.