DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

13
Comments
4 min read
Authority in Security

Authority in Security

4
Comments
4 min read
Bypassing ModSecurity WAF

Bypassing ModSecurity WAF

4
Comments
2 min read
Secure Your Data with AES 256 bit Encryption and Decryption method using PHP

Secure Your Data with AES 256 bit Encryption and Decryption method using PHP

12
Comments
1 min read
Rethinking analytics

Rethinking analytics

3
Comments
3 min read
What is Cybersecurity?

What is Cybersecurity?

2
Comments
1 min read
Secure Password Handling in Python

Secure Password Handling in Python

22
Comments
9 min read
The ins and outs of JWTs

The ins and outs of JWTs

25
Comments
7 min read
Securely erase your hard drive or SSD for free

Securely erase your hard drive or SSD for free

12
Comments 1
6 min read
Kubernetes Security Checklist 2021

Kubernetes Security Checklist 2021

7
Comments
7 min read
Integrating Vercel with Doppler: Sync Secrets in Production

Integrating Vercel with Doppler: Sync Secrets in Production

8
Comments
3 min read
Best ways to Connect APIs on the frontend

Best ways to Connect APIs on the frontend

143
Comments 1
4 min read
7 Easy-to-Follow Best Practices for Writing Dockerfile

7 Easy-to-Follow Best Practices for Writing Dockerfile

149
Comments
6 min read
How to Encrypt and Decrypt in Node JS using Crypto

How to Encrypt and Decrypt in Node JS using Crypto

6
Comments
1 min read
How to build a Password Manager with Node.js : Part - 1

How to build a Password Manager with Node.js : Part - 1

23
Comments
4 min read
Authentication bypass in cryptography library

Authentication bypass in cryptography library

5
Comments
3 min read
Security news weekly round-up - 15th October 2021

Security news weekly round-up - 15th October 2021

2
Comments 2
4 min read
Why detecting generic credentials is a game changer

Why detecting generic credentials is a game changer

6
Comments
6 min read
Securing access to Scaleway Elements API Keys from Gitlab CI

Securing access to Scaleway Elements API Keys from Gitlab CI

6
Comments
6 min read
SIM Card Based Mobile Authentication with Android

SIM Card Based Mobile Authentication with Android

27
Comments 4
14 min read
JWT how does it work and is it secure?

JWT how does it work and is it secure?

98
Comments 5
4 min read
Let's go CSRF-ing!

Let's go CSRF-ing!

9
Comments 2
13 min read
Penetration and Security in JavaScript

Penetration and Security in JavaScript

222
Comments 5
5 min read
AWS Access Keys - A Reference

AWS Access Keys - A Reference

6
Comments
12 min read
PSA:The Risks of Remote JDWP Debugging

PSA:The Risks of Remote JDWP Debugging

5
Comments
6 min read
How To Become A Software Architect 29:01

How To Become A Software Architect

16
Comments
1 min read
Things to know about Phishing attacks

Things to know about Phishing attacks

5
Comments
7 min read
AVOID Problems with Kubernetes: Best Practices Enforcement with Datree

AVOID Problems with Kubernetes: Best Practices Enforcement with Datree

19
Comments
10 min read
Azure SQL : Service Endpoint vs Private Endpoint Part 2

Azure SQL : Service Endpoint vs Private Endpoint Part 2

8
Comments 1
3 min read
Azure SQL : Service Endpoint vs Private Endpoint Part 1

Azure SQL : Service Endpoint vs Private Endpoint Part 1

8
Comments
2 min read
Music Downloader API Secured on the Frontend

Music Downloader API Secured on the Frontend

28
Comments 1
7 min read
Security leaks on our website. How we got hacked?

Security leaks on our website. How we got hacked?

5
Comments
7 min read
Cross-Site Scripting or XSS

Cross-Site Scripting or XSS

4
Comments
5 min read
A Detailed Report on SQL INJECTION

A Detailed Report on SQL INJECTION

3
Comments
6 min read
Application Security Engineer journey

Application Security Engineer journey

56
Comments 3
3 min read
Instalando somente atualizações de segurança no Amazon Linux 2

Instalando somente atualizações de segurança no Amazon Linux 2

3
Comments
2 min read
AzureFunBytes Reminder - Improve your Open Source Security with @WhiteSourceSoft - 09/30/2021

AzureFunBytes Reminder - Improve your Open Source Security with @WhiteSourceSoft - 09/30/2021

7
Comments
3 min read
Facebook is down, discuss...

Facebook is down, discuss...

48
Comments 43
1 min read
00 - Smart Contract Security | Blockchain basics

00 - Smart Contract Security | Blockchain basics

6
Comments
2 min read
Debut to Bug-Hunting Cybersecurity and writing Quality Code

Debut to Bug-Hunting Cybersecurity and writing Quality Code

11
Comments
7 min read
Secure a Rails API with Auth0

Secure a Rails API with Auth0

2
Comments
9 min read
What Does a SOC Team Members Do?

What Does a SOC Team Members Do?

2
Comments
2 min read
How to Prepare for Ransomware Attacks

How to Prepare for Ransomware Attacks

7
Comments
5 min read
How To Manage Open edX Environment Variables Using Doppler and Automating The Deployment

How To Manage Open edX Environment Variables Using Doppler and Automating The Deployment

6
Comments
5 min read
Awesome Penetration Testing

Awesome Penetration Testing

76
Comments
41 min read
Javascript Security Checklist

Javascript Security Checklist

342
Comments 9
4 min read
Build and deploy a web app with Python, Flask, and Doppler

Build and deploy a web app with Python, Flask, and Doppler

119
Comments
7 min read
🔐 Private Route in React Router v6

🔐 Private Route in React Router v6

251
Comments 61
3 min read
EduRecordApp Lesson 3 (Extending ASPNET Users Table)

EduRecordApp Lesson 3 (Extending ASPNET Users Table)

2
Comments
1 min read
Secure by default, unsafe by you

Secure by default, unsafe by you

14
Comments
2 min read
เก็บตก AWS Gameday Security

เก็บตก AWS Gameday Security

7
Comments 2
1 min read
Security by incident and surprise

Security by incident and surprise

5
Comments
4 min read
Managing Firebase App Credentials with Doppler

Managing Firebase App Credentials with Doppler

6
Comments
5 min read
Corona Virus Threat Modelling

Corona Virus Threat Modelling

2
Comments
4 min read
AWS identity and access management

AWS identity and access management

7
Comments
6 min read
How Android Wallpaper Images Can Threaten Your Privacy

How Android Wallpaper Images Can Threaten Your Privacy

23
Comments
6 min read
Mitigating the 0-day Apache path traversal vulnerability

Mitigating the 0-day Apache path traversal vulnerability

6
Comments
4 min read
Find Phone Number Location Using Python | Project

Find Phone Number Location Using Python | Project

12
Comments 2
2 min read
Caesar Cipher In Ruby

Caesar Cipher In Ruby

6
Comments 3
3 min read
Pentest network python tool

Pentest network python tool

5
Comments
1 min read
loading...