DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Facebook Login on iOS without the Facebook SDK

Implementing Facebook Login on iOS without the Facebook SDK

12
Comments 6
14 min read
Learn what is CSRF attack by hacking an online Casino

Learn what is CSRF attack by hacking an online Casino

89
Comments 19
6 min read
Browser Fingerprinting

Browser Fingerprinting

39
Comments 8
3 min read
Best practices to use AWS access key and secret in your development environment

Best practices to use AWS access key and secret in your development environment

11
Comments 5
4 min read
Setting Up Single Sign-on For NodeBB

Setting Up Single Sign-on For NodeBB

2
Comments
9 min read
How to enable CSRF protection in the Python / Flask app?

How to enable CSRF protection in the Python / Flask app?

10
Comments
2 min read
Web Services in Java 3 - Authorization Annotation

Web Services in Java 3 - Authorization Annotation

8
Comments
5 min read
[GitHub] File signature and crypto operations with Java

[GitHub] File signature and crypto operations with Java

4
Comments
1 min read
Software Security Overview

Software Security Overview

24
Comments 8
10 min read
Django Rest Framework custom JWT authentication

Django Rest Framework custom JWT authentication

88
Comments 32
8 min read
Helm: helm-secrets — sensitive data encryption with AWS KMS and use it from Jenkins

Helm: helm-secrets — sensitive data encryption with AWS KMS and use it from Jenkins

8
Comments
12 min read
Software Security Building Blocks

Software Security Building Blocks

2
Comments
4 min read
Don't you think you should stop pushing unsecure code on Github ? (OWASP)

Don't you think you should stop pushing unsecure code on Github ? (OWASP)

14
Comments 2
12 min read
HTB CTF - I know Mag1k

HTB CTF - I know Mag1k

6
Comments
3 min read
8 free security tools every developer should know and use to Shift Left

8 free security tools every developer should know and use to Shift Left

12
Comments
7 min read
Security news weekly round-up - 15th May 2020

Security news weekly round-up - 15th May 2020

2
Comments
4 min read
What Exactly Do CyberSecurity Professionals Do 🤔?

What Exactly Do CyberSecurity Professionals Do 🤔?

11
Comments 2
1 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

12
Comments 1
2 min read
HTB CTF - FreeLancer

HTB CTF - FreeLancer

8
Comments
5 min read
Mounting a second encrypted hard drive automatically under Debian or Ubuntu

Mounting a second encrypted hard drive automatically under Debian or Ubuntu

2
Comments 1
2 min read
If you want to build a treehouse, start at the bottom

If you want to build a treehouse, start at the bottom

31
Comments 1
4 min read
How to Solve ERR_SSL_PROTOCOL_ERROR in Google Chrome

How to Solve ERR_SSL_PROTOCOL_ERROR in Google Chrome

3
Comments
4 min read
Riddikulus Passwords: Celebrate Passwords Every Day

Riddikulus Passwords: Celebrate Passwords Every Day

7
Comments 4
5 min read
Hacker101 CTF - Cody's First Blog

Hacker101 CTF - Cody's First Blog

9
Comments 4
7 min read
Hacker101 CTF - Ticketastic: Live Instance

Hacker101 CTF - Ticketastic: Live Instance

5
Comments 2
4 min read
Zoom has acquired Keybase

Zoom has acquired Keybase

57
Comments 29
1 min read
Why 'Escaping' JavaScript is Dangerous

Why 'Escaping' JavaScript is Dangerous

19
Comments 1
3 min read
Exploitation Exercise with unsafe.Pointer in Go: Information Leak (Part 1)

Exploitation Exercise with unsafe.Pointer in Go: Information Leak (Part 1)

13
Comments
9 min read
Preventing SQL injection: a Django author's perspective

Preventing SQL injection: a Django author's perspective

9
Comments
8 min read
CIA Triad in Information Security 🔐

CIA Triad in Information Security 🔐

4
Comments
1 min read
Protecting Azure Functions with API Management Service

Protecting Azure Functions with API Management Service

16
Comments 3
5 min read
Cyber Security

Cyber Security

4
Comments 1
1 min read
What is OAuth 2.0 / OpenID Connect?

What is OAuth 2.0 / OpenID Connect?

11
Comments
3 min read
Spyse - Cyberspace Search Engine

Spyse - Cyberspace Search Engine

4
Comments
4 min read
User authorization in micro-service architecture with JWT

User authorization in micro-service architecture with JWT

12
Comments
3 min read
Getting started with Spring Security - Authentication and Authorization

Getting started with Spring Security - Authentication and Authorization

33
Comments 2
4 min read
The Benefit of Same Origin Policy

The Benefit of Same Origin Policy

4
Comments
2 min read
Getting started with Spring Security - Adding JWT

Getting started with Spring Security - Adding JWT

18
Comments
4 min read
Recap of GitHub Satellite

Recap of GitHub Satellite

33
Comments 12
1 min read
Hacking 101 — Footprinting (Theory Part-1)

Hacking 101 — Footprinting (Theory Part-1)

7
Comments
3 min read
Advanced Docker Security with AppArmor

Advanced Docker Security with AppArmor

6
Comments
5 min read
Once upon a time, PASSWORDS 🔑🤯☠️

Once upon a time, PASSWORDS 🔑🤯☠️

9
Comments 1
4 min read
Writeup: HackTheBox Jerry - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Jerry - Without Metasploit (OSCP Prep)

5
Comments
3 min read
SQL injection for developers

SQL injection for developers

128
Comments 5
12 min read
How to handle Database in Spring Boot

How to handle Database in Spring Boot

21
Comments
2 min read
0x00SEC CTF - Exercise #7

0x00SEC CTF - Exercise #7

3
Comments
3 min read
AWS Cloud

AWS Cloud

5
Comments
1 min read
Artigo cientifico - Containers

Artigo cientifico - Containers

3
Comments 2
9 min read
Help: Security per record - is it possible to make optimal solution ?

Help: Security per record - is it possible to make optimal solution ?

2
Comments 7
2 min read
Beginner’s guide to SSL

Beginner’s guide to SSL

149
Comments 5
4 min read
Always ask better questions

Always ask better questions

4
Comments
5 min read
Web Security Testing with OWASP ZAP and Selenium

Web Security Testing with OWASP ZAP and Selenium

11
Comments
5 min read
How To Use Requests With Tor

How To Use Requests With Tor

2
Comments
1 min read
Escaping Improperly Sandboxed Iframes

Escaping Improperly Sandboxed Iframes

8
Comments
3 min read
Adding Sign in with Apple to your iOS App

Adding Sign in with Apple to your iOS App

67
Comments
7 min read
5 security blogs you should follow

5 security blogs you should follow

18
Comments
2 min read
Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

75
Comments 2
7 min read
Argo CD secrets management using Sops

Argo CD secrets management using Sops

17
Comments 1
3 min read
0x00SEC CTF - Exercise #6

0x00SEC CTF - Exercise #6

5
Comments
3 min read
Como seria a sua vida se a internet fosse feita de sites do http://governo?

Como seria a sua vida se a internet fosse feita de sites do http://governo?

12
Comments 1
6 min read
loading...