DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 How I protected my Minecraft cheating client

🔐 How I protected my Minecraft cheating client

10
Comments
5 min read
Not a Regular Password Regex

Not a Regular Password Regex

6
Comments
2 min read
Angular Interceptors to Manage HTTP Requests ⚡

Angular Interceptors to Manage HTTP Requests ⚡

5
Comments
15 min read
Auth0 JWT Middleware in Go - Gin Web Framework

Auth0 JWT Middleware in Go - Gin Web Framework

10
Comments 1
5 min read
The impact of security in FOSS projects and the future

The impact of security in FOSS projects and the future

5
Comments
2 min read
Beginning Cyber-Security practice.

Beginning Cyber-Security practice.

3
Comments
1 min read
BotenaGo botnet leaked to github

BotenaGo botnet leaked to github

4
Comments
1 min read
PwnKit: PrivESC flaw in Linux

PwnKit: PrivESC flaw in Linux

2
Comments
3 min read
AWS Firewall Manager

AWS Firewall Manager

1
Comments
4 min read
AdSense Protector - invalid click, click bombing and invalid traffic

AdSense Protector - invalid click, click bombing and invalid traffic

6
Comments
1 min read
Security and Correctness: two different concepts.

Security and Correctness: two different concepts.

5
Comments 1
4 min read
5 Open Source Security Tools All Developers Should Know About

5 Open Source Security Tools All Developers Should Know About

33
Comments 1
6 min read
Set up Yubikey for Passwordless Sudo Authentication

Set up Yubikey for Passwordless Sudo Authentication

24
Comments 10
2 min read
Best practices: 5 Risks to Assess for a Secure CI Pipeline

Best practices: 5 Risks to Assess for a Secure CI Pipeline

3
Comments 1
6 min read
Cyber Threat Intelligence

Cyber Threat Intelligence

3
Comments
6 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

5
Comments
6 min read
Secure Online Voting is Possible. This is How

Secure Online Voting is Possible. This is How

3
Comments
14 min read
Enforcing compliance with AWS CDK Aspects

Enforcing compliance with AWS CDK Aspects

28
Comments 1
4 min read
The Difference Between NTFS, FAT, FAT32 and ExFAT File Systems

The Difference Between NTFS, FAT, FAT32 and ExFAT File Systems

5
Comments
6 min read
What Are Errors 400, 403, 404, 500, 502, 503 and How to Fix Them?

What Are Errors 400, 403, 404, 500, 502, 503 and How to Fix Them?

1
Comments
7 min read
I show you how to Crack a .NET Application (3 clicks)

I show you how to Crack a .NET Application (3 clicks)

63
Comments 4
8 min read
How to Disable Autofill in ÂŤGoogle ChromeÂť?

How to Disable Autofill in ÂŤGoogle ChromeÂť?

2
Comments
4 min read
Treat security as a risk

Treat security as a risk

4
Comments 1
4 min read
Top Tools to Recover Data From an HFS+ Drive

Top Tools to Recover Data From an HFS+ Drive

2
Comments
5 min read
Encoding, Hashing e Encryption: Qual a diferença?

Encoding, Hashing e Encryption: Qual a diferença?

26
Comments
5 min read
The Error «A Disk Read Error Occurred» or «BOOTMGR is Missing» – How to Fix

The Error «A Disk Read Error Occurred» or «BOOTMGR is Missing» – How to Fix

4
Comments
2 min read
Session Management - Fundamentals

Session Management - Fundamentals

42
Comments 2
7 min read
How To Deceive a CAPTCHA

How To Deceive a CAPTCHA

9
Comments 2
2 min read
Diskpart: Recovering a Memory Card, a USB Flash Drive or a Hard Disk

Diskpart: Recovering a Memory Card, a USB Flash Drive or a Hard Disk

6
Comments
3 min read
Ethernaut Level 2: Fallout Tutorial

Ethernaut Level 2: Fallout Tutorial

6
Comments
1 min read
kube-hunter : Kubernetes Security

kube-hunter : Kubernetes Security

6
Comments
3 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

8
Comments
1 min read
The ONLY correct way to handle users changing their email address

The ONLY correct way to handle users changing their email address

8
Comments
5 min read
Add New User to EC2 Linux Instance with Google MFA: Ubuntu

Add New User to EC2 Linux Instance with Google MFA: Ubuntu

6
Comments
5 min read
Kubernetes Hardening Tutorial Part 2: Network

Kubernetes Hardening Tutorial Part 2: Network

8
Comments
8 min read
CSP - Content Security Policy basics

CSP - Content Security Policy basics

2
Comments
3 min read
Ethernaut Level 1: Fallback Tutorial

Ethernaut Level 1: Fallback Tutorial

6
Comments 1
3 min read
Why syncing .env files doesn’t scale for secrets management

Why syncing .env files doesn’t scale for secrets management

16
Comments 1
9 min read
Deploying OutlineVPN to Ubuntu 20.04

Deploying OutlineVPN to Ubuntu 20.04

3
Comments
2 min read
OCSP and CRL: what could go wrong?

OCSP and CRL: what could go wrong?

13
Comments
3 min read
Create and Restore Archived Files in Windows 10

Create and Restore Archived Files in Windows 10

2
Comments
2 min read
Modern Techniques to Prevent Malware instead of Detecting It

Modern Techniques to Prevent Malware instead of Detecting It

5
Comments
26 min read
Secure your API Gateway APIs mutual TLS

Secure your API Gateway APIs mutual TLS

19
Comments 1
6 min read
Vulnerability scanning for Docker images

Vulnerability scanning for Docker images

8
Comments
9 min read
How to Partition a Hard Disk in Windows 10

How to Partition a Hard Disk in Windows 10

2
Comments
4 min read
Running Docker Bench for Security to hardened your docker host and improve security

Running Docker Bench for Security to hardened your docker host and improve security

10
Comments
10 min read
OSI Referans Modeli

OSI Referans Modeli

9
Comments
5 min read
Hack Solidity: Unchecked Call Return Value

Hack Solidity: Unchecked Call Return Value

6
Comments
2 min read
Can you mitigate Log4Shell attacks in Azure using only Network Security Group?

Can you mitigate Log4Shell attacks in Azure using only Network Security Group?

6
Comments 2
3 min read
Block Countries and Continent : Apache2

Block Countries and Continent : Apache2

11
Comments 1
1 min read
An Introduction To PGP

An Introduction To PGP

14
Comments
18 min read
You're running untrusted code!

You're running untrusted code!

11
Comments
7 min read
Why is security important in infrastructure as code ?

Why is security important in infrastructure as code ?

22
Comments
3 min read
18 ways to ATTACK a Vault server | Production hardening | Tharun

18 ways to ATTACK a Vault server | Production hardening | Tharun

7
Comments
1 min read
Setup Vault in HA with MySQL backend in 10 minutes | Hashicorp | Tutorial | Tharun

Setup Vault in HA with MySQL backend in 10 minutes | Hashicorp | Tutorial | Tharun

12
Comments 1
3 min read
Hack Solidity: Visibilities

Hack Solidity: Visibilities

5
Comments
2 min read
What are Vault User Policies & how to create them? Hashicorp Vault

What are Vault User Policies & how to create them? Hashicorp Vault

12
Comments
3 min read
How the Signed URL works?

How the Signed URL works?

7
Comments
3 min read
Hack Solidity: Tx Origin Attacks

Hack Solidity: Tx Origin Attacks

8
Comments
2 min read
Read-Only Access to specific resources in AWS EKS Cluster via EKS Authentication & Authorization

Read-Only Access to specific resources in AWS EKS Cluster via EKS Authentication & Authorization

2
Comments
2 min read
loading...