DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Securely Access The Dark Web in 15 Steps. First Part

How to Securely Access The Dark Web in 15 Steps. First Part

7
Comments
8 min read
Everybody hates CSRF

Everybody hates CSRF

37
Comments 3
4 min read
You've been on a Public Network ? That's bad Security Practice

You've been on a Public Network ? That's bad Security Practice

2
Comments
4 min read
Top 15 Tools for Automating Security in DevOps

Top 15 Tools for Automating Security in DevOps

35
Comments
4 min read
Guide to Cyber Security: learn how to defend your systems

Guide to Cyber Security: learn how to defend your systems

17
Comments
10 min read
Hacking is not black and white!

Hacking is not black and white!

8
Comments
5 min read
The Simplest Way to Authorize Github OAuth Apps with Next.js and Cotter

The Simplest Way to Authorize Github OAuth Apps with Next.js and Cotter

9
Comments
15 min read
Common Biometric Authentication Security Mistakes

Common Biometric Authentication Security Mistakes

5
Comments 1
3 min read
In Which Sarah Learns Web Security: Part One, Introduction and General Principles

In Which Sarah Learns Web Security: Part One, Introduction and General Principles

7
Comments
7 min read
Crack with VSCode Hex Editor

Crack with VSCode Hex Editor

8
Comments
3 min read
What is TLS? Transport Layer Security encryption explained in plain english

What is TLS? Transport Layer Security encryption explained in plain english

82
Comments 3
5 min read
Using your Yubikey to get started with GPG

Using your Yubikey to get started with GPG

31
Comments
6 min read
Making Sense of the Zero Trust Cybersecurity Product Space

Making Sense of the Zero Trust Cybersecurity Product Space

5
Comments
4 min read
What does it take to create a strong password?

What does it take to create a strong password?

43
Comments 26
1 min read
How to install OpenVPN on CentOS 7

How to install OpenVPN on CentOS 7

2
Comments
4 min read
Using Kitchen-Terraform with the GCP CIS Benchmark Profile

Using Kitchen-Terraform with the GCP CIS Benchmark Profile

3
Comments 2
4 min read
What is the web scraping and how it works?

What is the web scraping and how it works?

54
Comments 7
2 min read
Storing tokens in single-page applications

Storing tokens in single-page applications

275
Comments 11
2 min read
How to add free SSL to any Website

How to add free SSL to any Website

32
Comments 1
1 min read
Terraform Development & Testing Introduction

Terraform Development & Testing Introduction

10
Comments
4 min read
LGPD - Parte II - Termos e Definições

LGPD - Parte II - Termos e Definições

3
Comments
3 min read
Security Best Practices for Node.js

Security Best Practices for Node.js

17
Comments
10 min read
Top 6 Web Security Take-Aways From Google CTF 2020

Top 6 Web Security Take-Aways From Google CTF 2020

12
Comments 2
8 min read
Spot False Positives in Static Scans: Password Management

Spot False Positives in Static Scans: Password Management

3
Comments
4 min read
Separating Sensitive Data from Code (using python-decouple)

Separating Sensitive Data from Code (using python-decouple)

9
Comments
2 min read
CVE Scanner GitHub Action

CVE Scanner GitHub Action

7
Comments
3 min read
How To Secure Your Software Development Life Cycle (SDLC)

How To Secure Your Software Development Life Cycle (SDLC)

8
Comments
5 min read
Should I share more posts on TLS 1.2???

Should I share more posts on TLS 1.2???

2
Comments 2
1 min read
Why Password Length Matters

Why Password Length Matters

11
Comments 2
5 min read
Named Data Networking (NDN) — The new internet.

Named Data Networking (NDN) — The new internet.

14
Comments
4 min read
package.json vs package-lock.json: do you need both?

package.json vs package-lock.json: do you need both?

40
Comments 4
3 min read
API Implementation Recommendations

API Implementation Recommendations

5
Comments
3 min read
5 tips to improve your Docker security

5 tips to improve your Docker security

7
Comments
5 min read
What is DevSecOps, and How Does it Help Build Secure Web Applications?

What is DevSecOps, and How Does it Help Build Secure Web Applications?

6
Comments
6 min read
Work From Home: Home Office Security Tips

Work From Home: Home Office Security Tips

4
Comments 2
1 min read
Increasing the Security of the InterSystems IRIS DBMS

Increasing the Security of the InterSystems IRIS DBMS

6
Comments
6 min read
Cross Domain Security

Cross Domain Security

2
Comments
1 min read
Prevent AWS from Reading Your Step Functions Data

Prevent AWS from Reading Your Step Functions Data

22
Comments 2
5 min read
Advantages of a Secure Software Development Life Cycle (SDLC)

Advantages of a Secure Software Development Life Cycle (SDLC)

8
Comments
5 min read
LGPD - Parte I - Introdução

LGPD - Parte I - Introdução

5
Comments
3 min read
How to Build a Token Server for Agora Applications using GoLang

How to Build a Token Server for Agora Applications using GoLang

7
Comments
10 min read
Webview I wanted to see, and some requested features

Webview I wanted to see, and some requested features

4
Comments
2 min read
Why Do We Need Cyber ​​Security?

Why Do We Need Cyber ​​Security?

3
Comments 1
1 min read
What is an Agile SDLC Model and What Are its Advantages?

What is an Agile SDLC Model and What Are its Advantages?

6
Comments
5 min read
How to Make an Interactive Todo List CLI using Python with an Easy Login Mechanism

How to Make an Interactive Todo List CLI using Python with an Easy Login Mechanism

44
Comments 3
10 min read
Web server PenetrationTesting checklist

Web server PenetrationTesting checklist

26
Comments
4 min read
Microsoft Azure's Privileged Identity Management

Microsoft Azure's Privileged Identity Management

4
Comments
3 min read
How to turn a credentials breach in a development opportunity

How to turn a credentials breach in a development opportunity

5
Comments
3 min read
How to spot and exploit postMessage vulnerablities?

How to spot and exploit postMessage vulnerablities?

6
Comments
3 min read
Stop Guessing: What is a JWT?

Stop Guessing: What is a JWT?

154
Comments 13
5 min read
How 4 lines of Java code end up in 518772 lines in production.

How 4 lines of Java code end up in 518772 lines in production.

60
Comments 13
3 min read
CVE Binary Tool: GSoC Final Report

CVE Binary Tool: GSoC Final Report

6
Comments 1
6 min read
Spring security with JWT based login [Without OAuth]

Spring security with JWT based login [Without OAuth]

3
Comments
1 min read
CORS in short

CORS in short

8
Comments
1 min read
3 Static Application Security Testing advantages (SAST) You Should Know

3 Static Application Security Testing advantages (SAST) You Should Know

8
Comments 1
4 min read
HarperDB's New Approach to Role Permissions

HarperDB's New Approach to Role Permissions

37
Comments
3 min read
Fundamentals of Vulnerability Management with Open Source Tools

Fundamentals of Vulnerability Management with Open Source Tools

3
Comments 2
8 min read
Using HTTP headers to debug live sites

Using HTTP headers to debug live sites

6
Comments
4 min read
Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more

Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more

27
Comments 9
11 min read
Hide your api keys from your android manifest file with Flutter using local.properties

Hide your api keys from your android manifest file with Flutter using local.properties

23
Comments 7
2 min read
loading...