DEV Community

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Comprehensive Guide to Cookies in JavaScript

Comprehensive Guide to Cookies in JavaScript

Comments
3 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
How to Select a WAF for New Webmasters(Part 1)

How to Select a WAF for New Webmasters(Part 1)

7
Comments
4 min read
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒

The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒

1
Comments
4 min read
Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy

Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy

6
Comments
5 min read
SSRF Attacks: The Silent Threat Hiding in Your Server

SSRF Attacks: The Silent Threat Hiding in Your Server

1
Comments
1 min read
OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Comments
5 min read
Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks

Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks

1
Comments
2 min read
Authentication and Authorization Techniques in Modern Web Applications

Authentication and Authorization Techniques in Modern Web Applications

6
Comments 1
4 min read
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks

Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks

1
Comments
4 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

12
Comments
3 min read
The Significance of Website Hacking

The Significance of Website Hacking

11
Comments
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests

Understanding How an Open Source WAF Monitor HTTP Requests

11
Comments
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine

Demystifying the Technology Architecture of Open Source WAF, SafeLine

10
Comments
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)

Deploying High Availability SafeLine WAF on K3s(Part 4)

17
Comments
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF

How to Prevent Brute Force Attacks with SafeLine WAF

15
Comments
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

25
Comments
3 min read
The Ultimate Guide to Understanding Web Application Authentication

The Ultimate Guide to Understanding Web Application Authentication

18
Comments
3 min read
The Beginner's Guide to Install and Deploy SafeLine WAF

The Beginner's Guide to Install and Deploy SafeLine WAF

13
Comments
3 min read
Open Source Tool List for Web App Security

Open Source Tool List for Web App Security

2
Comments
4 min read
How to Secure PHP Applications from SQL Injection Attacks

How to Secure PHP Applications from SQL Injection Attacks

3
Comments
3 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Comments
3 min read
Load Balancing with Reverse Proxy

Load Balancing with Reverse Proxy

2
Comments
3 min read
loading...