DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How I Reverse-Engineered Perplexity’s Referral Signup

How I Reverse-Engineered Perplexity’s Referral Signup

Comments
6 min read
ICYMI - pre:Invent announcements 2025

ICYMI - pre:Invent announcements 2025

Comments
10 min read
Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Comments
1 min read
Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

1
Comments
2 min read
Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Comments
1 min read
Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

1
Comments
2 min read
A importância de gerenciar corretamente variáveis de ambiente (.env)

A importância de gerenciar corretamente variáveis de ambiente (.env)

Comments
3 min read
RDAP: The Modern Successor to WHOIS

RDAP: The Modern Successor to WHOIS

Comments
7 min read
Designing RBAC for AI agents

Designing RBAC for AI agents

Comments
13 min read
🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

Comments
3 min read
Aisuru Botnet: Deep Dive into Its Evolving Threat Landscape

Aisuru Botnet: Deep Dive into Its Evolving Threat Landscape

Comments
7 min read
Tor: Anonymity Shield or Privacy Illusion?

Tor: Anonymity Shield or Privacy Illusion?

Comments
6 min read
NTP: The Unsung Hero of Internet Time Synchronization

NTP: The Unsung Hero of Internet Time Synchronization

Comments
9 min read
Security by Design: A Guide to Building Secure Software

Security by Design: A Guide to Building Secure Software

Comments
8 min read
Spring Security Flow

Spring Security Flow

Comments
1 min read
Serverless Student Management System (AWS)

Serverless Student Management System (AWS)

1
Comments
2 min read
OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
A Guide to Production-Ready Security, Logging and Architecture in the express app

A Guide to Production-Ready Security, Logging and Architecture in the express app

Comments
4 min read
RaaS: The Evolution of Cybercrime-as-a-Service

RaaS: The Evolution of Cybercrime-as-a-Service

Comments
5 min read
Windows vs. Linux: Ultimate Secure Desktop Battle

Windows vs. Linux: Ultimate Secure Desktop Battle

Comments
8 min read
IoT Security: Addressing the Gaping Vulnerability

IoT Security: Addressing the Gaping Vulnerability

Comments
8 min read
The Hard Truth About Random Number Generation

The Hard Truth About Random Number Generation

Comments
7 min read
Golden Images: A Security Powerhouse

Golden Images: A Security Powerhouse

Comments
6 min read
Legacy Insecure Protocols: A Guide to Modern Risks

Legacy Insecure Protocols: A Guide to Modern Risks

Comments
8 min read
Mullvad's DAITA: Shielding Against AI Traffic Analysis

Mullvad's DAITA: Shielding Against AI Traffic Analysis

Comments
6 min read
loading...