DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to make a password generator with python.

How to make a password generator with python.

8
Comments 1
3 min read
Simple Remove or Change HTTP Server header in NGINX Plus.

Simple Remove or Change HTTP Server header in NGINX Plus.

7
Comments
1 min read
How to Make Your SSD Last Longer

How to Make Your SSD Last Longer

2
Comments
8 min read
White Label Crypto Exchange Software Development - In a Nutshell

White Label Crypto Exchange Software Development - In a Nutshell

4
Comments 1
8 min read
Decentralized cloud storage (cheap and secure)

Decentralized cloud storage (cheap and secure)

2
Comments
1 min read
HELLO WORLD in Morse Code 00:18

HELLO WORLD in Morse Code

6
Comments 3
1 min read
How to Remove a Virus Creating Shortcuts For Files and Folders in Pen Drives, Memory Cards and USB Drives (a Shortcut Virus)

How to Remove a Virus Creating Shortcuts For Files and Folders in Pen Drives, Memory Cards and USB Drives (a Shortcut Virus)

4
Comments
4 min read
How to avoid Software Supply Chain Attacks

How to avoid Software Supply Chain Attacks

10
Comments
4 min read
SvelteKit FIDO U2F Login: Multifactor Authentication

SvelteKit FIDO U2F Login: Multifactor Authentication

4
Comments
7 min read
Enforce MFA Access to the AWS Console

Enforce MFA Access to the AWS Console

24
Comments
3 min read
RIP Copy and Paste from Stackoverflow! 🚨 (+Trojan Source Solution)

RIP Copy and Paste from Stackoverflow! 🚨 (+Trojan Source Solution)

253
Comments 23
5 min read
Container security best practices: Comprehensive guide

Container security best practices: Comprehensive guide

10
Comments
27 min read
How to Delete a File or Folder that Can’t Be Deleted, Is Write-Protected or Can’t Be Accessed?

How to Delete a File or Folder that Can’t Be Deleted, Is Write-Protected or Can’t Be Accessed?

3
Comments
3 min read
Limitar o acesso ao serviço de metadados de instâncias AWS EC2

Limitar o acesso ao serviço de metadados de instâncias AWS EC2

3
Comments
2 min read
Azure Key Vault Secrets in GitHub Actions

Azure Key Vault Secrets in GitHub Actions

10
Comments
2 min read
How to create protected route using keycloak and React JS

How to create protected route using keycloak and React JS

5
Comments
2 min read
InterSystems Security Contest

InterSystems Security Contest

4
Comments
4 min read
8 Most Common Type Of Cyber Attacks

8 Most Common Type Of Cyber Attacks

26
Comments 2
3 min read
conexiĂłn segura ssh para la RaspberryPi(FreeBSD,Linux)

conexiĂłn segura ssh para la RaspberryPi(FreeBSD,Linux)

4
Comments
3 min read
Uptime of macOS system via terminal

Uptime of macOS system via terminal

13
Comments
2 min read
Secrets With SOPS

Secrets With SOPS

6
Comments
3 min read
Secure your app in a few easy steps đź”’

Secure your app in a few easy steps đź”’

4
Comments
3 min read
zlog: Secure logger in Go to prevent output of sensitive/secret values

zlog: Secure logger in Go to prevent output of sensitive/secret values

6
Comments
7 min read
How To Protect Next.js Apps with Jscrambler

How To Protect Next.js Apps with Jscrambler

6
Comments
6 min read
How will Lacework’s acquisition of Soluble benefit devs?

How will Lacework’s acquisition of Soluble benefit devs?

4
Comments
2 min read
Mayday, mayday! I need a scalable infrastructure to migrate on Scaleway Elements! Part 1 - Networking & Security

Mayday, mayday! I need a scalable infrastructure to migrate on Scaleway Elements! Part 1 - Networking & Security

5
Comments
7 min read
Password Security: A bit deeper dive into Hashes, Salts, Bcrypt and Node's Crypto module.

Password Security: A bit deeper dive into Hashes, Salts, Bcrypt and Node's Crypto module.

6
Comments
8 min read
An Authentication & Authorization Microservice with Clean Architecture

An Authentication & Authorization Microservice with Clean Architecture

35
Comments 1
11 min read
Daily Ethernaut Challenge - #5 Token

Daily Ethernaut Challenge - #5 Token

4
Comments
3 min read
Leveraging Logic Apps to prevent over-provisioning owner access to subscriptions

Leveraging Logic Apps to prevent over-provisioning owner access to subscriptions

7
Comments
5 min read
Storing passwords - the right and wrong ways

Storing passwords - the right and wrong ways

9
Comments 1
5 min read
Structure Testing for Docker Containers

Structure Testing for Docker Containers

6
Comments
8 min read
Rate Limit specific URLs using Nginx

Rate Limit specific URLs using Nginx

37
Comments 1
1 min read
Lacework VS Code Extension

Lacework VS Code Extension

7
Comments
2 min read
Understanding timing attacks with code examples

Understanding timing attacks with code examples

25
Comments
3 min read
Hawk project

Hawk project

8
Comments
1 min read
The ultimate guide to GitHub Actions authentication

The ultimate guide to GitHub Actions authentication

2
Comments
16 min read
Fixing Just One False Positive in Brakeman

Fixing Just One False Positive in Brakeman

5
Comments
5 min read
Overview of the OWASP Serverless Top 10 [videos]

Overview of the OWASP Serverless Top 10 [videos]

6
Comments
1 min read
Securing Kubernetes Deployments

Securing Kubernetes Deployments

16
Comments
12 min read
Things to know before developing your cyber security solution

Things to know before developing your cyber security solution

5
Comments 1
13 min read
JWT Authentication with FastAPI

JWT Authentication with FastAPI

65
Comments 1
1 min read
SIM Card Based Mobile Authentication with iOS

SIM Card Based Mobile Authentication with iOS

6
Comments
17 min read
Conduct A Web Application Penetration Testing

Conduct A Web Application Penetration Testing

10
Comments 1
4 min read
5 Security Vulnerabilities to Fix Without any Programming Skill

5 Security Vulnerabilities to Fix Without any Programming Skill

9
Comments
3 min read
Overview of AWS: Quantum, Robotics, Satellite, Security, Identity, Compliance, and Storage Services |AWS WhitePaper Summary

Overview of AWS: Quantum, Robotics, Satellite, Security, Identity, Compliance, and Storage Services |AWS WhitePaper Summary

3
Comments
6 min read
Docker Tips - UFW

Docker Tips - UFW

34
Comments
1 min read
How to get an A+ Security Grade For Your Website on Mozilla Observatory (Part 2 - Nginx)

How to get an A+ Security Grade For Your Website on Mozilla Observatory (Part 2 - Nginx)

5
Comments
12 min read
Security Threats and Vulnerabilities

Security Threats and Vulnerabilities

2
Comments
8 min read
How to get an A+ Security Grade For Your Website on Mozilla Observatory (Part 1 - Netlify)

How to get an A+ Security Grade For Your Website on Mozilla Observatory (Part 1 - Netlify)

10
Comments
10 min read
How to learn and practice more in Kubernetes Network Policy for CKx exams and EKS ?

How to learn and practice more in Kubernetes Network Policy for CKx exams and EKS ?

34
Comments
1 min read
Why I'm studying this? - Web Applications Security, Part 1

Why I'm studying this? - Web Applications Security, Part 1

15
Comments 3
2 min read
Ransomware Mitigation: The New Vault Lock for AWS Backup

Ransomware Mitigation: The New Vault Lock for AWS Backup

5
Comments
2 min read
Secure software supply chain: why every link matters

Secure software supply chain: why every link matters

29
Comments 4
14 min read
Security news weekly round-up - 5th November 2021

Security news weekly round-up - 5th November 2021

2
Comments
5 min read
Ory Developer Conference

Ory Developer Conference

2
Comments
1 min read
5 reasons why you should use PropelAuth

5 reasons why you should use PropelAuth

5
Comments
3 min read
Level up compliance confidence with AWS Config

Level up compliance confidence with AWS Config

5
Comments
3 min read
Why you should never use random module for generating passwords.

Why you should never use random module for generating passwords.

15
Comments 4
2 min read
Segurança no React Native

Segurança no React Native

13
Comments
1 min read
loading...