DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS Security Groups - Once And For All

AWS Security Groups - Once And For All

11
Comments
5 min read
SQL inection on gdclive.nokia.com

SQL inection on gdclive.nokia.com

3
Comments 1
2 min read
Reflected XSS by jsonp on ibm.com subdomain

Reflected XSS by jsonp on ibm.com subdomain

4
Comments
1 min read
Securing Azure SignalR +Azure App Service - Part 3

Securing Azure SignalR +Azure App Service - Part 3

9
Comments
4 min read
A beginners guide to infosec

A beginners guide to infosec

31
Comments
6 min read
UX and User Authentication

UX and User Authentication

5
Comments
4 min read
Merge multiple CSV files and remove duplikats (e.g. Keepass)

Merge multiple CSV files and remove duplikats (e.g. Keepass)

7
Comments
2 min read
Adding Some Sweetness to your Infra-as-Code with Confectionery

Adding Some Sweetness to your Infra-as-Code with Confectionery

5
Comments
4 min read
How to rate limit a login route in Express using node-rate-limiter-flexible and Redis

How to rate limit a login route in Express using node-rate-limiter-flexible and Redis

34
Comments 1
15 min read
OWASP, Vulnerabilities, and Taint Analysis in PVS-Studio for C#. Stir, but Don't Shake

OWASP, Vulnerabilities, and Taint Analysis in PVS-Studio for C#. Stir, but Don't Shake

6
Comments
13 min read
Keycloak on Distroless into Kubernetes

Keycloak on Distroless into Kubernetes

11
Comments
8 min read
Why do I think Haskell is a good choice in regards to Software Security?

Why do I think Haskell is a good choice in regards to Software Security?

7
Comments
6 min read
Encrypt your S3 Object

Encrypt your S3 Object

11
Comments
5 min read
Endpoint Security: Importance & 5 ways to help safeguard IT in the workspace

Endpoint Security: Importance & 5 ways to help safeguard IT in the workspace

3
Comments
4 min read
Why your website needs validation

Why your website needs validation

17
Comments
4 min read
X-headers, what and why?

X-headers, what and why?

103
Comments 12
2 min read
Designing A Simple Key-logger In Python

Designing A Simple Key-logger In Python

5
Comments 1
7 min read
How to convert your website from HTTP to HTTPS

How to convert your website from HTTP to HTTPS

49
Comments 2
3 min read
Single Sign On (SSO) with subdomains using Caddy v2

Single Sign On (SSO) with subdomains using Caddy v2

8
Comments
6 min read
gpg command examples

gpg command examples

4
Comments
2 min read
TryHackMe Hydra

TryHackMe Hydra

9
Comments
1 min read
What are you Referrer-ing to?

What are you Referrer-ing to?

14
Comments
2 min read
Keycloak on Distroless

Keycloak on Distroless

23
Comments 4
16 min read
Is it possible to have ssl certificate for ip address not domain name? Answer is YES :)

Is it possible to have ssl certificate for ip address not domain name? Answer is YES :)

19
Comments
1 min read
DevOps Huddle: How to integrate Security & Quality into your CI/CD pipelines and what KPIs to measure

DevOps Huddle: How to integrate Security & Quality into your CI/CD pipelines and what KPIs to measure

2
Comments
1 min read
Using Environment Variables in Node.js for App Configuration and Secrets

Using Environment Variables in Node.js for App Configuration and Secrets

8
Comments
8 min read
How we updated our Content Security Policy using our own product

How we updated our Content Security Policy using our own product

1
Comments
3 min read
What permissions does your website need?

What permissions does your website need?

21
Comments
2 min read
Yara for daily analysis

Yara for daily analysis

10
Comments 2
2 min read
Scaffold Identity Pages with ASP.NET Core | Dear Coder

Scaffold Identity Pages with ASP.NET Core | Dear Coder

7
Comments 1
2 min read
Exploring the Export Table [Windows PE Internals]

Exploring the Export Table [Windows PE Internals]

12
Comments
4 min read
Fix Drupal's "Failed to get available update data" error on Available updates

Fix Drupal's "Failed to get available update data" error on Available updates

6
Comments
2 min read
Cross-site Request Forgery: protection against CSRF attacks

Cross-site Request Forgery: protection against CSRF attacks

5
Comments
3 min read
Role-Based Security using Entity Framework (Part 1) | Dear Coder

Role-Based Security using Entity Framework (Part 1) | Dear Coder

7
Comments
3 min read
Hacking Academy - Help me out!

Hacking Academy - Help me out!

3
Comments 1
1 min read
Securing Azure SignalR +Azure App Service - Part 1

Securing Azure SignalR +Azure App Service - Part 1

12
Comments
4 min read
Sharing your loan details to anyone

Sharing your loan details to anyone

4
Comments 1
2 min read
Creating a Whitelist for a Secrets Manager Secret

Creating a Whitelist for a Secrets Manager Secret

3
Comments
4 min read
Ծրագրային անվտանգություն՝ SQL Injection (մաս 2)

Ծրագրային անվտանգություն՝ SQL Injection (մաս 2)

5
Comments
2 min read
Never trust an upload's filename

Never trust an upload's filename

33
Comments 1
3 min read
Return to the Land of Environment Variables

Return to the Land of Environment Variables

5
Comments 1
3 min read
Fuck up story; rotate committed secret(s) on multiple Heroku apps

Fuck up story; rotate committed secret(s) on multiple Heroku apps

4
Comments
6 min read
Configure HTTP Security headers with CloudFront Functions

Configure HTTP Security headers with CloudFront Functions

13
Comments 2
5 min read
Self-signed certificates: shell script to generate

Self-signed certificates: shell script to generate

4
Comments
4 min read
Como começar em segurança da informação?

Como começar em segurança da informação?

27
Comments
4 min read
Secure Web App access with GCP Identity-Aware Proxy

Secure Web App access with GCP Identity-Aware Proxy

9
Comments
5 min read
Shift Left on Security: EXPLAINED Easily

Shift Left on Security: EXPLAINED Easily

9
Comments 3
4 min read
Ծրագրային անվտանգություն՝ SQL Injection (մաս 1)

Ծրագրային անվտանգություն՝ SQL Injection (մաս 1)

3
Comments
1 min read
Deciding on Auth models

Deciding on Auth models

3
Comments
3 min read
The Case of the Missing Szechuan Sauce: investigation notes

The Case of the Missing Szechuan Sauce: investigation notes

4
Comments
10 min read
Smartphone, a Spy in your Pocket

Smartphone, a Spy in your Pocket

2
Comments 1
1 min read
AzureFunBytes Reminder - @Azure Data Factory Security with @narainabhishek - 5/20/2021

AzureFunBytes Reminder - @Azure Data Factory Security with @narainabhishek - 5/20/2021

4
Comments
3 min read
What are the Ways to Prevent an Organization from Phishing Attacks?

What are the Ways to Prevent an Organization from Phishing Attacks?

3
Comments
5 min read
Deadshot: Keep Sensitive Data Out of Code

Deadshot: Keep Sensitive Data Out of Code

8
Comments
2 min read
Automate ZAP With Docker

Automate ZAP With Docker

6
Comments
8 min read
Common DevSecOps Challenges and How to Overcome Them

Common DevSecOps Challenges and How to Overcome Them

10
Comments
6 min read
SECURE Your Code From the Start with Snyk.io and Snyk Code

SECURE Your Code From the Start with Snyk.io and Snyk Code

8
Comments
4 min read
How to Protect Cookies Against Common XSS Attacks on the Web?

How to Protect Cookies Against Common XSS Attacks on the Web?

12
Comments
1 min read
Getting started with Next.js + Strapi: Security first

Getting started with Next.js + Strapi: Security first

27
Comments 2
10 min read
5 developer tools for detecting and fixing security vulnerabilities

5 developer tools for detecting and fixing security vulnerabilities

182
Comments 12
6 min read
loading...