DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
4 Essential Security Tools To Level Up Your Rails Security

4 Essential Security Tools To Level Up Your Rails Security

3
Comments
8 min read
Best ways to fix Nodemon error- nodemon.ps1 cannot be loaded because running scripts is disabled on this system.

Best ways to fix Nodemon error- nodemon.ps1 cannot be loaded because running scripts is disabled on this system.

8
Comments
3 min read
SwiftUI: a property wrapper to secure settings

SwiftUI: a property wrapper to secure settings

Comments
3 min read
Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

6
Comments
3 min read
How to set up an SSH Bastion server in one minute

How to set up an SSH Bastion server in one minute

4
Comments
7 min read
Ethernaut - Lvl 3: Coin Flip

Ethernaut - Lvl 3: Coin Flip

Comments
4 min read
SQL injection and AWS

SQL injection and AWS

2
Comments
2 min read
Injections in Stripe Search Queries and How to Prevent Them

Injections in Stripe Search Queries and How to Prevent Them

Comments
2 min read
Building Secure Software: Ten Tips for Software Developers

Building Secure Software: Ten Tips for Software Developers

1
Comments
7 min read
Supercharged Dependency Management With A Dependency Firewall

Supercharged Dependency Management With A Dependency Firewall

Comments
2 min read
Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

1
Comments
2 min read
Let's discuss a Password Manager for the Apocalypse Era.

Let's discuss a Password Manager for the Apocalypse Era.

2
Comments 1
1 min read
Never Use Credentials In A CI/CD Pipeline Again

Never Use Credentials In A CI/CD Pipeline Again

1
Comments
8 min read
Enterprise-scaled Self-Healing StackSets

Enterprise-scaled Self-Healing StackSets

6
Comments 3
7 min read
Secure Your Applications with Firejail: A Linux Sandbox Tutorial

Secure Your Applications with Firejail: A Linux Sandbox Tutorial

2
Comments
3 min read
Find out how to use Google to locate your home using just your Wi-Fi router!

Find out how to use Google to locate your home using just your Wi-Fi router!

1
Comments
4 min read
Descubra como usar o Google para localizar sua casa utilizando apenas o seu roteador Wi-Fi!

Descubra como usar o Google para localizar sua casa utilizando apenas o seu roteador Wi-Fi!

1
Comments
4 min read
Kubernetes: Storage & Security

Kubernetes: Storage & Security

Comments
11 min read
Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP)

Comments
6 min read
EC2 Metadata Server and IAM Role Credentials

EC2 Metadata Server and IAM Role Credentials

Comments
4 min read
How to Use Cross Account IAM Role

How to Use Cross Account IAM Role

Comments
2 min read
Tornado Cash Hack: 1M $ vanished ⁉️

Tornado Cash Hack: 1M $ vanished ⁉️

1
Comments
3 min read
🕵️ Active Directory Groups audit w. Neo4J

🕵️ Active Directory Groups audit w. Neo4J

1
Comments 1
2 min read
Unveiling the Enigmatic Full Stack Developer: Meet , Cyprian T. Aarons

Unveiling the Enigmatic Full Stack Developer: Meet , Cyprian T. Aarons

5
Comments
2 min read
Web Scraping vs Web Crawling: Exploring the Legality and Ethics of Data Extraction

Web Scraping vs Web Crawling: Exploring the Legality and Ethics of Data Extraction

7
Comments
6 min read
Understanding AWS IAM: Policies

Understanding AWS IAM: Policies

Comments
5 min read
Why should you use IMDSv2 and not IMDS on AWS EC2

Why should you use IMDSv2 and not IMDS on AWS EC2

Comments
2 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

20
Comments 3
6 min read
An Overview of Kubernetes Security Projects at KubeCon Europe 2023

An Overview of Kubernetes Security Projects at KubeCon Europe 2023

5
Comments
7 min read
How to Protect Software Intellectual Property Rights When Outsourcing Product Development

How to Protect Software Intellectual Property Rights When Outsourcing Product Development

4
Comments
12 min read
An Introduction to OAuth 2.0 with Node.js and Passport.js

An Introduction to OAuth 2.0 with Node.js and Passport.js

Comments
3 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

10
Comments
9 min read
LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

2
Comments
1 min read
Best Practices for Staying Safe on Public Wi-Fi Networks

Best Practices for Staying Safe on Public Wi-Fi Networks

3
Comments
4 min read
PostgreSQL 14: TLS 接続

PostgreSQL 14: TLS 接続

2
Comments
2 min read
PostgreSQL 12: TLS 接続

PostgreSQL 12: TLS 接続

1
Comments
2 min read
What is Provisioning and how does it work?

What is Provisioning and how does it work?

3
Comments
2 min read
Understanding res.redirect and res.render in Express.js: Usage and Security Measures

Understanding res.redirect and res.render in Express.js: Usage and Security Measures

1
Comments
4 min read
A Guide to ACID In MySQL

A Guide to ACID In MySQL

Comments
6 min read
The Ultimate Guide to Web Application Security (As a developer)

The Ultimate Guide to Web Application Security (As a developer)

Comments
4 min read
Protect your Web Apps Against DDoS Attacks by Using AWS Shield

Protect your Web Apps Against DDoS Attacks by Using AWS Shield

Comments
3 min read
Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

Kali Linux 2023.1: A Purple Makeover and Python Power-Ups

1
Comments
2 min read
How to prevent a dependency to access sensitive files in Inoxlang ?

How to prevent a dependency to access sensitive files in Inoxlang ?

Comments
1 min read
Okta's auth0

Okta's auth0

6
Comments
1 min read
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

Comments
7 min read
Delete file from Git Repository

Delete file from Git Repository

2
Comments
4 min read
How to setup Two Factor Authentication(2FA) in Node.js without third-party applications

How to setup Two Factor Authentication(2FA) in Node.js without third-party applications

11
Comments 1
7 min read
Secure Your Data APIs with Dozer: Adding Authorization to APIs

Secure Your Data APIs with Dozer: Adding Authorization to APIs

2
Comments
11 min read
KALI LINUX CHEAT SHEET 🔺🔌💻🛡

KALI LINUX CHEAT SHEET 🔺🔌💻🛡

3
Comments
1 min read
Where does Security sit in Early-Stage Software Development: the Shift Left Approach

Where does Security sit in Early-Stage Software Development: the Shift Left Approach

3
Comments
3 min read
safe-signer: creating an ethers.Signer from the third party secret storages

safe-signer: creating an ethers.Signer from the third party secret storages

Comments
2 min read
Getting masked secrets out of CircleCI

Getting masked secrets out of CircleCI

2
Comments
2 min read
Sessions & Cookies. Yum.

Sessions & Cookies. Yum.

3
Comments
3 min read
Preventing Illicit Uploads in MySQL – secure_file_priv

Preventing Illicit Uploads in MySQL – secure_file_priv

1
Comments
6 min read
Snowflake Roles and Access Control: What You Need to Know 101

Snowflake Roles and Access Control: What You Need to Know 101

5
Comments
18 min read
AWS Config Service

AWS Config Service

2
Comments
2 min read
Understanding and Preventing NULL Pointer Dereference

Understanding and Preventing NULL Pointer Dereference

2
Comments
6 min read
How to Comply with GDPR in AWS

How to Comply with GDPR in AWS

Comments
2 min read
5 Effective Ways to Prevent Directory Traversal

5 Effective Ways to Prevent Directory Traversal

1
Comments
5 min read
Laravel SMTP Crack: Unveiling the Vulnerability with Laravel SMTP Checker by XCATZE

Laravel SMTP Crack: Unveiling the Vulnerability with Laravel SMTP Checker by XCATZE

1
Comments
4 min read
loading...