Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
websecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Deploying High Availability SafeLine WAF on K3s(Part 4)
Carrie
Carrie
Carrie
Follow
Oct 11 '24
Deploying High Availability SafeLine WAF on K3s(Part 4)
#
kubernetes
#
opensource
#
websecurity
#
cybersecurity
17
reactions
Comments
Add Comment
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 10 '24
How to Prevent Brute Force Attacks with SafeLine WAF
#
bruteforce
#
cybersecurity
#
beginners
#
websecurity
14
reactions
Comments
Add Comment
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
Carrie
Carrie
Carrie
Follow
Oct 9 '24
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
#
cybersecurity
#
docker
#
linux
#
websecurity
17
reactions
Comments
Add Comment
3 min read
The Ultimate Guide to Understanding Web Application Authentication
Carrie
Carrie
Carrie
Follow
Oct 9 '24
The Ultimate Guide to Understanding Web Application Authentication
#
authentication
#
webapplication
#
cybersecurity
#
websecurity
18
reactions
Comments
Add Comment
3 min read
The Beginner's Guide to Install and Deploy SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 8 '24
The Beginner's Guide to Install and Deploy SafeLine WAF
#
cybersecurity
#
websecurity
#
beginners
#
opensource
9
reactions
Comments
Add Comment
3 min read
Open Source Tool List for Web App Security
Carrie
Carrie
Carrie
Follow
Oct 6 '24
Open Source Tool List for Web App Security
#
webdev
#
cybersecurity
#
beginners
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure PHP Applications from SQL Injection Attacks
Dhaval Upadhyay
Dhaval Upadhyay
Dhaval Upadhyay
Follow
Oct 6 '24
How to Secure PHP Applications from SQL Injection Attacks
#
sqlinjection
#
websecurity
#
webdev
#
sql
2
reactions
Comments
Add Comment
3 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
Haque.
Haque.
Haque.
Follow
Aug 27 '24
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
#
websecurity
#
webdev
#
cybersecurity
#
devtips
Comments
Add Comment
3 min read
Load Balancing with Reverse Proxy
Carrie
Carrie
Carrie
Follow
Sep 28 '24
Load Balancing with Reverse Proxy
#
cybersecurity
#
webdev
#
websecurity
#
beginners
2
reactions
Comments
Add Comment
3 min read
Addressing Arbitrary Input with SafeLine
Carrie
Carrie
Carrie
Follow
Oct 8 '24
Addressing Arbitrary Input with SafeLine
#
cybersecurity
#
webdev
#
beginners
#
websecurity
1
reaction
Comments
1
comment
3 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
Carrie
Carrie
Carrie
Follow
Sep 19 '24
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
#
webdev
#
cybersecurity
#
websecurity
6
reactions
Comments
Add Comment
2 min read
Five Free WAF Performance Comparison
Carrie
Carrie
Carrie
Follow
Sep 19 '24
Five Free WAF Performance Comparison
#
cybersecurity
#
webdev
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure OpenResty with a Free WAF
Carrie
Carrie
Carrie
Follow
Sep 19 '24
How to Secure OpenResty with a Free WAF
#
websecurity
#
webapplicationfirewall
#
opensource
#
nginx
12
reactions
Comments
Add Comment
3 min read
5 Best Free and Open Source WAF for 2025
Carrie
Carrie
Carrie
Follow
Sep 18 '24
5 Best Free and Open Source WAF for 2025
#
websecurity
#
webapplicationfirewall
#
beginners
#
opensource
14
reactions
Comments
Add Comment
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
Sachin Gadekar
Sachin Gadekar
Sachin Gadekar
Follow
Sep 17 '24
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
#
ssl
#
security
#
websecurity
#
webdev
2
reactions
Comments
1
comment
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31 '24
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 27 '24
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
#
node
#
webdev
#
backend
#
websecurity
1
reaction
Comments
Add Comment
5 min read
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 25 '24
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
#
node
#
websecurity
#
webdev
#
javascript
3
reactions
Comments
Add Comment
7 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
Lulu
Lulu
Lulu
Follow
Aug 2 '24
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
#
opensource
#
github
#
cybersecurity
#
websecurity
14
reactions
Comments
Add Comment
2 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 20 '24
Protect JWT Token from Token Forgery and Data Manipulation Attack
#
javascript
#
websecurity
#
jwt
#
apisecurity
1
reaction
Comments
Add Comment
3 min read
Preventing Weak Cryptography in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 26 '24
Preventing Weak Cryptography in JavaScript
#
javascript
#
websecurity
#
cryptography
#
encryption
Comments
Add Comment
3 min read
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 25 '24
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
#
javascript
#
webdev
#
remotecodeexecution
#
websecurity
Comments
Add Comment
2 min read
Protecting Your JavaScript Applications from DOM-based XSS Attacks
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 24 '24
Protecting Your JavaScript Applications from DOM-based XSS Attacks
#
javascript
#
websecurity
#
xss
#
dom
Comments
Add Comment
3 min read
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 23 '24
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
#
javascript
#
cybersecurity
#
mitmattacks
#
websecurity
2
reactions
Comments
Add Comment
4 min read
Steps to Preventing Prototype Pollution Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 19 '24
Steps to Preventing Prototype Pollution Attacks in JavaScript
#
javascript
#
websecurity
#
prototypepollution
#
securecoding
1
reaction
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account