DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How I volunteered to re-architect Internet email

How I volunteered to re-architect Internet email

2
Comments
1 min read
How to deploy a free Auth0 alternative to DigitalOcean in 5 minutes

How to deploy a free Auth0 alternative to DigitalOcean in 5 minutes

11
Comments 5
4 min read
Detect noncompliant Lambda runtimes in your environment

Detect noncompliant Lambda runtimes in your environment

5
Comments
2 min read
How to create a secure password that you can remember

How to create a secure password that you can remember

23
Comments 9
2 min read
Tech Exceptions new Episode - Data Management and External Organization Collaboration

Tech Exceptions new Episode - Data Management and External Organization Collaboration

10
Comments
3 min read
VPC Ingress Routing - Reducing the Friction in Integrating Security Appliances

VPC Ingress Routing - Reducing the Friction in Integrating Security Appliances

6
Comments
3 min read
🇺🇸 🇪🇺 Multi-cloud Network and Security Patterns

🇺🇸 🇪🇺 Multi-cloud Network and Security Patterns

8
Comments
6 min read
Generating Authentication Token for Agora Applications

Generating Authentication Token for Agora Applications

3
Comments
10 min read
Was I a target of social hacking?

Was I a target of social hacking?

9
Comments 4
3 min read
Protecting Your Privacy Online

Protecting Your Privacy Online

27
Comments 2
9 min read
GitHub Action for creating a custom OWASP dependency check report

GitHub Action for creating a custom OWASP dependency check report

11
Comments
7 min read
Wreaking Havoc via an API (with Python code)

Wreaking Havoc via an API (with Python code)

6
Comments
5 min read
Writing a better Line Iterator in Rust

Writing a better Line Iterator in Rust

8
Comments 1
4 min read
Frontend Security: npm-audit and Script integrity

Frontend Security: npm-audit and Script integrity

93
Comments 1
2 min read
Evil Twin Attack Example on Kali Linux

Evil Twin Attack Example on Kali Linux

5
Comments 2
5 min read
Hardening Docker and Kubernetes with seccomp

Hardening Docker and Kubernetes with seccomp

18
Comments 1
11 min read
CORS Hides Real Bugs

CORS Hides Real Bugs

17
Comments 5
2 min read
Cryptography for programmers 4: Public key crypto and Protocols

Cryptography for programmers 4: Public key crypto and Protocols

24
Comments 1
8 min read
Reclaim Your Data Privacy From Big Tech With the Best Privacy-Focused Alternatives

Reclaim Your Data Privacy From Big Tech With the Best Privacy-Focused Alternatives

26
Comments 1
8 min read
Create Azure AD apps with one line of code

Create Azure AD apps with one line of code

19
Comments
4 min read
Serverless Security Part 1: Dependencies

Serverless Security Part 1: Dependencies

3
Comments
5 min read
Restrict Azure Functions to API Management with Terraform

Restrict Azure Functions to API Management with Terraform

7
Comments
8 min read
Como roubar no random?

Como roubar no random?

15
Comments 2
6 min read
Update dependencies with Renovate

Update dependencies with Renovate

13
Comments 2
4 min read
Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Parler wasn’t hacked: It just lacked the most basic security & privacy measures

17
Comments
3 min read
ETLT Data Integration: The Best of Both Worlds

ETLT Data Integration: The Best of Both Worlds

6
Comments
8 min read
Mayday, mayday! I need a scalable infrastructure to hybrid on Google Cloud! Part 1 - Networking & Security

Mayday, mayday! I need a scalable infrastructure to hybrid on Google Cloud! Part 1 - Networking & Security

5
Comments
10 min read
Session Security

Session Security

8
Comments
2 min read
Five facts about security to know in 2021

Five facts about security to know in 2021

3
Comments
3 min read
Should routing go before security?

Should routing go before security?

4
Comments 11
1 min read
Make one resolution this year. Never write your own Authentication

Make one resolution this year. Never write your own Authentication

126
Comments 26
3 min read
Java XML External Entity Injection - Explained and Solved

Java XML External Entity Injection - Explained and Solved

4
Comments
1 min read
Esteganografia com Steghide

Esteganografia com Steghide

5
Comments
2 min read
Rust: Initial thoughts

Rust: Initial thoughts

41
Comments 24
4 min read
Deploying Statefulset on Private EKS on Fargate Cluster with EFS

Deploying Statefulset on Private EKS on Fargate Cluster with EFS

7
Comments
7 min read
Security by Design - Everything you need to know, in a simple manner.

Security by Design - Everything you need to know, in a simple manner.

5
Comments
1 min read
CrowdSec v.1.0 is out: introduction of the local API

CrowdSec v.1.0 is out: introduction of the local API

2
Comments
2 min read
JSON WEB TOKENS [ JWT ]

JSON WEB TOKENS [ JWT ]

20
Comments
2 min read
Avoiding session replay attacks in Rails

Avoiding session replay attacks in Rails

11
Comments
6 min read
Jump into shellcode (protostar - stack5)

Jump into shellcode (protostar - stack5)

2
Comments
2 min read
Laravel Credit Card Validation

Laravel Credit Card Validation

24
Comments 5
2 min read
Extensions: Google Chrome's Soft Underbelly (Part 1) 🔓

Extensions: Google Chrome's Soft Underbelly (Part 1) 🔓

10
Comments
14 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

29
Comments 12
3 min read
Updates to TLS in the foreseeable future

Updates to TLS in the foreseeable future

5
Comments 2
1 min read
Form validation in python made #EZ (By Yours Truly)

Form validation in python made #EZ (By Yours Truly)

5
Comments
2 min read
Cyber Security Introduction (part 5: Bruteforce)

Cyber Security Introduction (part 5: Bruteforce)

20
Comments
4 min read
What Is a Code Signing and How Does It Work?

What Is a Code Signing and How Does It Work?

3
Comments
3 min read
Check for Vulnarability in React / Node app using OWASP dependency check

Check for Vulnarability in React / Node app using OWASP dependency check

23
Comments 3
2 min read
Why should I care about Azure App Service Environment version 3?

Why should I care about Azure App Service Environment version 3?

14
Comments
1 min read
What is DevSecOps (using Heroku Flow as an example)

What is DevSecOps (using Heroku Flow as an example)

13
Comments
6 min read
20% of Django websites are vulnerable to these 3 hacks

20% of Django websites are vulnerable to these 3 hacks

34
Comments 1
3 min read
Learn Cyber Security

Learn Cyber Security

73
Comments 5
1 min read
Application Server & CORS Config

Application Server & CORS Config

4
Comments
8 min read
Integration of AWS Security Hub and kube-bench

Integration of AWS Security Hub and kube-bench

8
Comments 2
8 min read
Node.js Express Login example with MongoDB

Node.js Express Login example with MongoDB

372
Comments 5
4 min read
Share your ACM Private CA cross-account

Share your ACM Private CA cross-account

1
Comments
3 min read
Using Bcrypt with Ruby

Using Bcrypt with Ruby

9
Comments
2 min read
Hands-on AWS CloudFormation - Part 5. IAM users, groups and roles

Hands-on AWS CloudFormation - Part 5. IAM users, groups and roles

24
Comments 8
11 min read
Migrating from old authentication code in ASP.NET with Microsoft.Identity.Web and Azure AD

Migrating from old authentication code in ASP.NET with Microsoft.Identity.Web and Azure AD

6
Comments 2
5 min read
Adding SSL to a Server

Adding SSL to a Server

8
Comments
5 min read
loading...