loading...
👋 Sign in for the ability sort posts by top and latest.

Plugging Git Leaks: Preventing and Fixing Information Exposure in Repositories

Reactions 5
6 min read

Predictive vs. Adaptive SDLC: What is the Difference?

Reactions 5
5 min read

Update your Azure profile information

Reactions 3
3 min read

How to protect Serverless (Open)API's?

Reactions 84 Comments 2
19 min read

Uploading a large file from web

Reactions 4
6 min read

User Authentication, In 2020

Reactions 100 Comments 12
4 min read

Introduction to industrial security

Reactions 38
3 min read

Generating Random Password in Python - Practical Guide

Reactions 5
7 min read

Node-Secure js-x-ray

Reactions 6
3 min read

#discussWhat's the best way to connect to an machine behind CGNAT.

Reactions 7
1 min read

Week 2: Knowing the penetration testing steps

Reactions 12
4 min read

Kubernetes: part 5 — RBAC authorization with a Role and RoleBinding example

Reactions 10 Comments 1
8 min read

Security tips for Djangonauts

Reactions 36 Comments 1
3 min read

#discussLooking for course recommendations! Java + Spring, Front-end animations, Web/network security, Mysql.

Reactions 3
1 min read

#showdevFirst Streaming Ever - Git Security

Reactions 7
1 min read

Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer

Reactions 7
2 min read

The most basic security for Spring Boot with Thymeleaf

Reactions 17
2 min read

Fixing security vulnerabilities in npm dependencies in less than 3 mins

Reactions 15 Comments 3
3 min read

What To Do With VPN? 20 Ways To Use Your VPN

Reactions 8
7 min read

IncrementURL

Reactions 3
4 min read

7 Web Application Security Best Practices You Need to Know

Reactions 7
1 min read

Keybase - Crypto made simple

Reactions 6
6 min read

Investigation into Postgres malware (hack?)

Reactions 47 Comments 8
6 min read

Github bot @dependabot fixes security vulnerabilities

Reactions 18 Comments 7
2 min read

Blocking Disposable Emails

Reactions 6 Comments 2
5 min read

Inspecting Web Traffic with Burp Suite Proxy

Reactions 6
7 min read

SSO: OAuth 2.0 vs. OpenID Connect vs. SAML

Reactions 10
2 min read

Outsourcing security with 1Password, Authy, and Privacy.com

Reactions 47 Comments 5
5 min read

Deploying Fast and Secure Web App on AWS — Part 1a

Reactions 8
6 min read

Discovering vulnerable endpoints on API / Websites

Reactions 17
2 min read

Testing Laravel API endpoints with jwt-auth

Reactions 12
3 min read

Week 1: Being conscious about your attack surface

Reactions 7
5 min read

Kali Linux Inside Docker

Reactions 22 Comments 2
1 min read

How to get the verified flag on your commits in GitHub

Reactions 7
5 min read

Testing for expiring SSL Certificates

Reactions 7 Comments 3
2 min read

Hacker101 CTF - H1 Thermostat

Reactions 11 Comments 4
4 min read

Use nsh to Run Secure Remote Commands

Reactions 15
7 min read

The right way of accessing Azure services from inside your Azure Kubernetes Cluster

Reactions 7
6 min read

#todayilearnedBuilding simple systems for better security & reliability

Reactions 10
2 min read

Distributing software with the JFrog Platform

Reactions 6
2 min read

Are security fixes safe to automate?

Reactions 4 Comments 1
1 min read

Simplify AWS IAM Role Trust Policies in Organizations

Reactions 7
2 min read

Notes on auth token persistence

Reactions 18 Comments 9
3 min read

Attacks in times of fear

Reactions 38
2 min read

#discussDon't Let the Hackers Get onto your Files, either Personal or Professional.

Reactions 13
5 min read

Perimeter Security notes

Reactions 4
3 min read

Security study notes

Reactions 8
1 min read

How to make server access sharing easy and secure ?

Reactions 7
2 min read

Handling JWT securely on your client

Reactions 7
1 min read

Spring Boot: Auto Configuration and Projects

Reactions 7
4 min read

I know what you did.

Reactions 29 Comments 1
2 min read

Keybase overview 🔐

Reactions 5
3 min read

Unified Permissions Model

Reactions 9
2 min read

Game Analytics for Mobile: Casino Game Case Study

Reactions 6
4 min read

The 10 most critical API security risks - Part 8: Injection

Reactions 9
2 min read

Back to Basics – Updating WordPress Strategies

Reactions 5
16 min read

Facelock Authentication for Linux

Reactions 7 Comments 2
1 min read

Multiple Cloud Account Architecture (Series)

Reactions 3
4 min read

Help! Hackers are mining my cloud for Bitcoin 😱

Reactions 63 Comments 7
3 min read

Hacker101 CTF - BugDB v3

Reactions 11
3 min read
loading...