DEV Community

loading...

# security

👋 Sign in for the ability sort posts by top and latest.
🔐 Private Route in react-router v6

🔐 Private Route in react-router v6

Reactions 6 Comments
3 min read
How Catawiki Migrated SSO’s with Zero Trust and Zero Downtime

How Catawiki Migrated SSO’s with Zero Trust and Zero Downtime

Reactions 4 Comments
4 min read
Session management: What it is and why your security depends on it

Session management: What it is and why your security depends on it

Reactions 1 Comments
4 min read
WAF Managed Rules updates Slack Notification

WAF Managed Rules updates Slack Notification

Reactions 4 Comments
2 min read
Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

Reactions 2 Comments
4 min read
What is Cybersecurity?

What is Cybersecurity?

Reactions 2 Comments
1 min read
OWASP Top 10 for Developers: Using Components with Known Vulnerabilities

OWASP Top 10 for Developers: Using Components with Known Vulnerabilities

Reactions 2 Comments
2 min read
How to Install Kali Linux on VirtualBox: A Step-by-Step Guide

How to Install Kali Linux on VirtualBox: A Step-by-Step Guide

Reactions 7 Comments
4 min read
Network Security & Database Vulnerabilities

Network Security & Database Vulnerabilities

Reactions 2 Comments
8 min read
Data privacy: "We value your privacy" - No you don't

Data privacy: "We value your privacy" - No you don't

Reactions 7 Comments 3
7 min read
Zero Trust: Is it anything new?

Zero Trust: Is it anything new?

Reactions 3 Comments
9 min read
Protect your Repository from Azure Pipelines!

Protect your Repository from Azure Pipelines!

Reactions 4 Comments
3 min read
Computer Vision Startups Enhancing Security & Surveillance

Computer Vision Startups Enhancing Security & Surveillance

Reactions 5 Comments
5 min read
SMALI, What's That?

SMALI, What's That?

Reactions 2 Comments
3 min read
2FA with FIDO U2F / OTP / HOTP / TOTP

2FA with FIDO U2F / OTP / HOTP / TOTP

Reactions 2 Comments
5 min read
🛡🔑 Secretlint 4.0.0: Support ESM rule and secretlint-disable directive

🛡🔑 Secretlint 4.0.0: Support ESM rule and secretlint-disable directive

Reactions 2 Comments
2 min read
มาสร้างความแข็งแกร่งและปลอดภัยให้กับข้อมูลที่เก็บไว้ใน Amazon S3 กัน

มาสร้างความแข็งแกร่งและปลอดภัยให้กับข้อมูลที่เก็บไว้ใน Amazon S3 กัน

Reactions 5 Comments 3
2 min read
World Different Software Development Trends

World Different Software Development Trends

Reactions 2 Comments
2 min read
SQL Injection Attacks and How Developers Can Prevent Them

SQL Injection Attacks and How Developers Can Prevent Them

Reactions 22 Comments
7 min read
Utilizando o Session Manager - AWS System Manager

Utilizando o Session Manager - AWS System Manager

Reactions 4 Comments
3 min read
How to deploy a strict Content Security Policy (CSP) with Next.js

How to deploy a strict Content Security Policy (CSP) with Next.js

Reactions 6 Comments 3
3 min read
A Need For Blockchain Testing

A Need For Blockchain Testing

Reactions 5 Comments
4 min read
Cryptographic frequency Analysis explained

Cryptographic frequency Analysis explained

Reactions 2 Comments
2 min read
Tor - the dark web driver

Tor - the dark web driver

Reactions 2 Comments
2 min read
Learn how to create a secure mobile application.

Learn how to create a secure mobile application.

Reactions 2 Comments
3 min read
DevSecOps built-up series (Part I)

DevSecOps built-up series (Part I)

Reactions 2 Comments
1 min read
Integrate APIs with your HTML Site without a Backend.

Integrate APIs with your HTML Site without a Backend.

Reactions 3 Comments
2 min read
Database testing: why and how to perform unit testing

Database testing: why and how to perform unit testing

Reactions 2 Comments
7 min read
1.13 Ensure there is only one activeaccess key available for any single IAM user

1.13 Ensure there is only one activeaccess key available for any single IAM user

Reactions 2 Comments
1 min read
Control inbound/outbound traffic using AWS Security Groups

Control inbound/outbound traffic using AWS Security Groups

Reactions 2 Comments
1 min read
Security news weekly round-up - 10th September 2021

Security news weekly round-up - 10th September 2021

Reactions 2 Comments
3 min read
How to Secure Containers with Cosign and Distroless Images

How to Secure Containers with Cosign and Distroless Images

Reactions 3 Comments
6 min read
Security: How to use Azure AD App Role for C# WebApi

Security: How to use Azure AD App Role for C# WebApi

Reactions 7 Comments
5 min read
Introduction to Cybersecurity Tools & Cyber Attacks

Introduction to Cybersecurity Tools & Cyber Attacks

Reactions 5 Comments
6 min read
100 days of hacking

100 days of hacking

Reactions 5 Comments
2 min read
Firestore Counters - Everything There is to Know!

Firestore Counters - Everything There is to Know!

Reactions 4 Comments
6 min read
Open source is a valuable development resource. Give it your attention

Open source is a valuable development resource. Give it your attention

Reactions 11 Comments
3 min read
Cryptanalysis- the study of breaking cryptosystems explained

Cryptanalysis- the study of breaking cryptosystems explained

Reactions 2 Comments
4 min read
Security of AWS CloudHSM Backups | AWS White Paper Summary

Security of AWS CloudHSM Backups | AWS White Paper Summary

Reactions 6 Comments 1
6 min read
Intro to Doppler: Real-life Use Case

Intro to Doppler: Real-life Use Case

Reactions 35 Comments 4
5 min read
Security news weekly round-up - 3rd September 2021

Security news weekly round-up - 3rd September 2021

Reactions 4 Comments
3 min read
Cross Site Request Forgery Explained

Cross Site Request Forgery Explained

Reactions 2 Comments
5 min read
What is OAuth?

What is OAuth?

Reactions 3 Comments
2 min read
Announcing new Node-Secure back-end

Announcing new Node-Secure back-end

Reactions 30 Comments 1
4 min read
Build Your Own Lint Rules for Terraform with Shisho

Build Your Own Lint Rules for Terraform with Shisho

Reactions 18 Comments
5 min read
Cyber Security Tools

Cyber Security Tools

Reactions 12 Comments 1
4 min read
Django (DRF) 12 Factor App with examples

Django (DRF) 12 Factor App with examples

Reactions 3 Comments
1 min read
Reverse Engineering Keyboard Driver: Part 1 (Introduction)

Reverse Engineering Keyboard Driver: Part 1 (Introduction)

Reactions 5 Comments 2
2 min read
Using VPN Protection Online: A Beginner's Guide

Using VPN Protection Online: A Beginner's Guide

Reactions 9 Comments
3 min read
Secure API Keys on the Frontend - Vue JS

Secure API Keys on the Frontend - Vue JS

Reactions 22 Comments
4 min read
Angular Security - Disable Inline Critical CSS

Angular Security - Disable Inline Critical CSS

Reactions 5 Comments
2 min read
How to list Azure VM potentially affected by the OMI RCE

How to list Azure VM potentially affected by the OMI RCE

Reactions 2 Comments 1
1 min read
Using password_hash to Hash and Store Passwords in PHP

Using password_hash to Hash and Store Passwords in PHP

Reactions 6 Comments
2 min read
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

Reactions 9 Comments
4 min read
CTFs are Fun

CTFs are Fun

Reactions 2 Comments 1
1 min read
Resumo sobre a versão 2 do serviço de metadados de instância AWS EC2 (IMDSv2)

Resumo sobre a versão 2 do serviço de metadados de instância AWS EC2 (IMDSv2)

Reactions 4 Comments
3 min read
Learning about SQL Injection

Learning about SQL Injection

Reactions 5 Comments
5 min read
Setting up SSH keys for a new device - GitHub

Setting up SSH keys for a new device - GitHub

Reactions 23 Comments 4
3 min read
To GraphQL or not to GraphQL? Pros and Cons

To GraphQL or not to GraphQL? Pros and Cons

Reactions 88 Comments 5
14 min read
Encrypt your crucial data into Image file

Encrypt your crucial data into Image file

Reactions 5 Comments 1
1 min read
loading...