DEV Community

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What Is a WAF and Why Do You Need One? (Beginner-Friendly Guide)

What Is a WAF and Why Do You Need One? (Beginner-Friendly Guide)

6
Comments
2 min read
First Experience with an Open-Source Web Application Firewall – SafeLine

First Experience with an Open-Source Web Application Firewall – SafeLine

5
Comments
2 min read
Tool Drop: SafeLine – The Most Loved Open-Source WAF of 2025

Tool Drop: SafeLine – The Most Loved Open-Source WAF of 2025

5
Comments
2 min read
Эффективная защита сайтов и приложений c SafeLine WAF

Эффективная защита сайтов и приложений c SafeLine WAF

8
Comments 2
2 min read
Building Your Own Custom CMS: The Key to Unlocking Web Development Efficiency

Building Your Own Custom CMS: The Key to Unlocking Web Development Efficiency

Comments
4 min read
How to Forward CloudFlare IP to SafeLine WAF

How to Forward CloudFlare IP to SafeLine WAF

10
Comments
1 min read
Is Web Scraping a Threat?

Is Web Scraping a Threat?

Comments
1 min read
Protect your Website with SafeLine WAF

Protect your Website with SafeLine WAF

1
Comments
6 min read
A Free WAF Trusted by 300,000 Users Worldwide– SafeLine

A Free WAF Trusted by 300,000 Users Worldwide– SafeLine

5
Comments
1 min read
Advanced Role Based Access Control (RBAC) in NestJS with a Custom Permission Guard

Advanced Role Based Access Control (RBAC) in NestJS with a Custom Permission Guard

3
Comments 1
1 min read
Introducing YogSec — A Security Partner for Startups 🚀

Introducing YogSec — A Security Partner for Startups 🚀

Comments
1 min read
Análise: Segurança e IA na Codificação Moderna

Análise: Segurança e IA na Codificação Moderna

1
Comments
2 min read
Hashing

Hashing

20
Comments
1 min read
🔒 Why HTTPS Matters: Securing Your Website in 2025 🚀

🔒 Why HTTPS Matters: Securing Your Website in 2025 🚀

5
Comments
2 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

1
Comments
4 min read
Understanding SQL Injection: A Major Security Threat

Understanding SQL Injection: A Major Security Threat

13
Comments
3 min read
5 Web Security Flaws That Keep Security Experts Awake at Night: A Journey Through the Dark Side of Web Development

5 Web Security Flaws That Keep Security Experts Awake at Night: A Journey Through the Dark Side of Web Development

Comments
6 min read
🔐 Angular Security Best Practices: Are You Protecting Your App the Right Way?

🔐 Angular Security Best Practices: Are You Protecting Your App the Right Way?

5
Comments
2 min read
Common PHP Security Issues and How to Prevent Them

Common PHP Security Issues and How to Prevent Them

Comments
5 min read
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒

The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒

Comments
4 min read
How PHP Session Management Works and How to Handle Session Security

How PHP Session Management Works and How to Handle Session Security

Comments
5 min read
Best Practices for Secure File Uploads in PHP: Preventing Common Vulnerabilities

Best Practices for Secure File Uploads in PHP: Preventing Common Vulnerabilities

Comments
4 min read
Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript

Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript

Comments
4 min read
Comprehensive Guide to Cookies in JavaScript

Comprehensive Guide to Cookies in JavaScript

Comments
3 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
loading...