Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Encrypt and Decrypt in Node JS using Crypto

How to Encrypt and Decrypt in Node JS using Crypto

6
Comments
1 min read
Security Alarm System using a Bipolar Junction Transistor Switch

Security Alarm System using a Bipolar Junction Transistor Switch

2
Comments 1
2 min read
How to build a Password Manager with Node.js : Part - 1

How to build a Password Manager with Node.js : Part - 1

23
Comments
4 min read
Authentication bypass in cryptography library

Authentication bypass in cryptography library

5
Comments
3 min read
Security news weekly round-up - 15th October 2021

Security news weekly round-up - 15th October 2021

2
Comments 2
4 min read
Why detecting generic credentials is a game changer

Why detecting generic credentials is a game changer

6
Comments
6 min read
Securing access to Scaleway Elements API Keys from Gitlab CI

Securing access to Scaleway Elements API Keys from Gitlab CI

6
Comments
6 min read
SIM Card Based Mobile Authentication with Android

SIM Card Based Mobile Authentication with Android

27
Comments 4
14 min read
JWT how does it work and is it secure?

JWT how does it work and is it secure?

98
Comments 5
4 min read
Let's go CSRF-ing!

Let's go CSRF-ing!

9
Comments 2
13 min read
Penetration and Security in JavaScript

Penetration and Security in JavaScript

222
Comments 5
5 min read
AWS Access Keys - A Reference

AWS Access Keys - A Reference

6
Comments
12 min read
PSA:The Risks of Remote JDWP Debugging

PSA:The Risks of Remote JDWP Debugging

5
Comments
6 min read
How To Become A Software Architect 29:01

How To Become A Software Architect

16
Comments
1 min read
Things to know about Phishing attacks

Things to know about Phishing attacks

5
Comments
7 min read
AVOID Problems with Kubernetes: Best Practices Enforcement with Datree

AVOID Problems with Kubernetes: Best Practices Enforcement with Datree

19
Comments
10 min read
Azure SQL : Service Endpoint vs Private Endpoint Part 2

Azure SQL : Service Endpoint vs Private Endpoint Part 2

8
Comments 1
3 min read
Azure SQL : Service Endpoint vs Private Endpoint Part 1

Azure SQL : Service Endpoint vs Private Endpoint Part 1

8
Comments
2 min read
Music Downloader API Secured on the Frontend

Music Downloader API Secured on the Frontend

28
Comments 1
7 min read
Security leaks on our website. How we got hacked?

Security leaks on our website. How we got hacked?

5
Comments
7 min read
Cross-Site Scripting or XSS

Cross-Site Scripting or XSS

4
Comments
5 min read
Application Security Engineer journey

Application Security Engineer journey

56
Comments 3
3 min read
A Detailed Report on SQL INJECTION

A Detailed Report on SQL INJECTION

3
Comments
6 min read
Instalando somente atualizações de segurança no Amazon Linux 2

Instalando somente atualizações de segurança no Amazon Linux 2

3
Comments
2 min read
AzureFunBytes Reminder - Improve your Open Source Security with @WhiteSourceSoft - 09/30/2021

AzureFunBytes Reminder - Improve your Open Source Security with @WhiteSourceSoft - 09/30/2021

7
Comments
3 min read
Facebook is down, discuss...

Facebook is down, discuss...

48
Comments 43
1 min read
00 - Smart Contract Security | Blockchain basics

00 - Smart Contract Security | Blockchain basics

6
Comments
2 min read
Debut to Bug-Hunting Cybersecurity and writing Quality Code

Debut to Bug-Hunting Cybersecurity and writing Quality Code

11
Comments
7 min read
Secure a Rails API with Auth0

Secure a Rails API with Auth0

2
Comments
9 min read
What Does a SOC Team Members Do?

What Does a SOC Team Members Do?

2
Comments
2 min read
How to Prepare for Ransomware Attacks

How to Prepare for Ransomware Attacks

7
Comments
5 min read
How To Manage Open edX Environment Variables Using Doppler and Automating The Deployment

How To Manage Open edX Environment Variables Using Doppler and Automating The Deployment

6
Comments
5 min read
Awesome Penetration Testing

Awesome Penetration Testing

76
Comments
41 min read
Javascript Security Checklist

Javascript Security Checklist

342
Comments 9
4 min read
Build and deploy a web app with Python, Flask, and Doppler

Build and deploy a web app with Python, Flask, and Doppler

119
Comments
7 min read
Integrating Vercel with Doppler: Sync Secrets in Production

Integrating Vercel with Doppler: Sync Secrets in Production

8
Comments
3 min read
🔐 Private Route in React Router v6

🔐 Private Route in React Router v6

255
Comments 61
3 min read
EduRecordApp Lesson 3 (Extending ASPNET Users Table)

EduRecordApp Lesson 3 (Extending ASPNET Users Table)

2
Comments
1 min read
Secure by default, unsafe by you

Secure by default, unsafe by you

14
Comments
2 min read
เก็บตก AWS Gameday Security

เก็บตก AWS Gameday Security

7
Comments 2
1 min read
Security by incident and surprise

Security by incident and surprise

5
Comments
4 min read
Managing Firebase App Credentials with Doppler

Managing Firebase App Credentials with Doppler

6
Comments
5 min read
Corona Virus Threat Modelling

Corona Virus Threat Modelling

2
Comments
4 min read
AWS identity and access management

AWS identity and access management

7
Comments
6 min read
How Android Wallpaper Images Can Threaten Your Privacy

How Android Wallpaper Images Can Threaten Your Privacy

23
Comments
6 min read
Mitigating the 0-day Apache path traversal vulnerability

Mitigating the 0-day Apache path traversal vulnerability

6
Comments
4 min read
Find Phone Number Location Using Python | Project

Find Phone Number Location Using Python | Project

14
Comments 2
2 min read
Caesar Cipher In Ruby

Caesar Cipher In Ruby

6
Comments 3
3 min read
Pentest network python tool

Pentest network python tool

5
Comments
1 min read
Full-stack infrastructure monitoring solution and my experience with InsightCat. From DevOps newcomer.

Full-stack infrastructure monitoring solution and my experience with InsightCat. From DevOps newcomer.

2
Comments
2 min read
Enforcing Image Trust on Docker Containers using Notary

Enforcing Image Trust on Docker Containers using Notary

4
Comments
6 min read
Starting your Cloud Security Journey

Starting your Cloud Security Journey

4
Comments
6 min read
Setting-up a Django project for production

Setting-up a Django project for production

5
Comments
4 min read
Top 20 Cybersecurity Buzzwords

Top 20 Cybersecurity Buzzwords

3
Comments
4 min read
Entendendo Encapsulamento

Entendendo Encapsulamento

2
Comments
3 min read
Do you wanna keep your embedded database encrypted?

Do you wanna keep your embedded database encrypted?

26
Comments 1
9 min read
Web 3.0: Fusion of semantic web and Web 2.0

Web 3.0: Fusion of semantic web and Web 2.0

12
Comments
4 min read
Quick way to Secure API Keys for the Frontend

Quick way to Secure API Keys for the Frontend

172
Comments 2
6 min read
Cara Mengaktifkan GZIP di Nginx untuk Ubuntu Server

Cara Mengaktifkan GZIP di Nginx untuk Ubuntu Server

5
Comments
2 min read
My code review journey as a Web Security Engineer

My code review journey as a Web Security Engineer

70
Comments 3
6 min read
loading...