DEV Community

loading...

# security

👋 Sign in for the ability sort posts by top and latest.
Git Scanner Framework

Git Scanner Framework

Reactions 3 Comments
1 min read
3 Easy Steps to Set Up Certificate Authentication in ASP.NET Core

3 Easy Steps to Set Up Certificate Authentication in ASP.NET Core

Reactions 2 Comments
4 min read
Keep malicious Node modules behind bars!

Keep malicious Node modules behind bars!

Reactions 2 Comments 1
2 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

Reactions 3 Comments
1 min read
PostgreSQL does have SSL (asymmetric key files), but I couldn't get it to work

PostgreSQL does have SSL (asymmetric key files), but I couldn't get it to work

Reactions 3 Comments
2 min read
Prevent others sending emails using your domain name

Prevent others sending emails using your domain name

Reactions 22 Comments 1
4 min read
Integrando o Azure Active Directory no AKS

Integrando o Azure Active Directory no AKS

Reactions 5 Comments
6 min read
Seguridad "EN" la nube

Seguridad "EN" la nube

Reactions 5 Comments
2 min read
Malicious Docker Cryptomining Images Rack Up 20M Downloads

Malicious Docker Cryptomining Images Rack Up 20M Downloads

Reactions 2 Comments
1 min read
How to get SOC 2 Certified

How to get SOC 2 Certified

Reactions 4 Comments
2 min read
First open source implementation of the Google Zanzibar

First open source implementation of the Google Zanzibar

Reactions 4 Comments
1 min read
Identity and Access Management (IAM) in the Cloud Basics: Why Devs Should Care

Identity and Access Management (IAM) in the Cloud Basics: Why Devs Should Care

Reactions 2 Comments
8 min read
dirsearch – Web path scanner

dirsearch – Web path scanner

Reactions 2 Comments
1 min read
Isolated javascript development environment / 2021

Isolated javascript development environment / 2021

Reactions 9 Comments
9 min read
JSON web tokens are NOT meant for authenticating the same user repeatedly: Use session tokens instead

JSON web tokens are NOT meant for authenticating the same user repeatedly: Use session tokens instead

Reactions 280 Comments 43
7 min read
Nuclei Is A Fast Tool For Configurable Targeted Scanning Based On Templates

Nuclei Is A Fast Tool For Configurable Targeted Scanning Based On Templates

Reactions 2 Comments
1 min read
Web Application Penetration Test Checklist | Part - 02

Web Application Penetration Test Checklist | Part - 02

Reactions 36 Comments
4 min read
IP spoofing: Theory and implementation

IP spoofing: Theory and implementation

Comments
7 min read
[PT-BR] Resolvendo o Bandit (níveis 5-10)

[PT-BR] Resolvendo o Bandit (níveis 5-10)

Reactions 12 Comments 1
10 min read
Inicializando AWS CloudShell 3/3

Inicializando AWS CloudShell 3/3

Reactions 5 Comments
3 min read
How to implement JWT Token Authentication in ASP.NET Core 5.0 Web API using JWT

How to implement JWT Token Authentication in ASP.NET Core 5.0 Web API using JWT

Reactions 4 Comments
4 min read
Angular 8: Authentication using JSON Web Token (JWT) with HttpClient and HttpInterceptors.

Angular 8: Authentication using JSON Web Token (JWT) with HttpClient and HttpInterceptors.

Reactions 6 Comments 1
2 min read
Protect your .NET and .NET Core applications without leaving visual studio.

Protect your .NET and .NET Core applications without leaving visual studio.

Reactions 21 Comments 2
2 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

Reactions 6 Comments
8 min read
Frontend Security

Frontend Security

Reactions 93 Comments 5
4 min read
Changing a field's type in recent JDKs

Changing a field's type in recent JDKs

Reactions 6 Comments
5 min read
$whoami

$whoami

Reactions 3 Comments 2
1 min read
Top 9 Joomla Security Vulnerabilities and What You Can Do About Them

Top 9 Joomla Security Vulnerabilities and What You Can Do About Them

Comments
6 min read
Why just blocking port 80 won't help you

Why just blocking port 80 won't help you

Reactions 2 Comments
2 min read
Azure access scenarios, from a DevOps point of view

Azure access scenarios, from a DevOps point of view

Reactions 8 Comments
10 min read
Web Application Penetration Test Checklist | Part - 01

Web Application Penetration Test Checklist | Part - 01

Reactions 68 Comments 4
2 min read
How to secure your website against Cookies theft and Cross Site Scripting

How to secure your website against Cookies theft and Cross Site Scripting

Reactions 65 Comments 5
7 min read
How I solved github’s actions capture the flag challenge

How I solved github’s actions capture the flag challenge

Reactions 5 Comments
4 min read
LetsEncrypt SSL DNS automation with lego

LetsEncrypt SSL DNS automation with lego

Reactions 5 Comments
5 min read
Web Security: Hashing, Salting, and Encryption

Web Security: Hashing, Salting, and Encryption

Reactions 40 Comments
3 min read
Introducing the GitHub Security Overview | GitHub Security Center

Introducing the GitHub Security Overview | GitHub Security Center

Reactions 8 Comments 2
1 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

Reactions 9 Comments
7 min read
SQL injection cheat sheet

SQL injection cheat sheet

Reactions 3 Comments
1 min read
Using JSON Web Tokens for Authorization

Using JSON Web Tokens for Authorization

Reactions 4 Comments
4 min read
KeepassXC is my go-to Password Manager and here's why

KeepassXC is my go-to Password Manager and here's why

Reactions 2 Comments
4 min read
8 Top Git Security Issues & What To Do About Them

8 Top Git Security Issues & What To Do About Them

Reactions 8 Comments
9 min read
Automating Management of Google Compute Engine VM fleets at scale

Automating Management of Google Compute Engine VM fleets at scale

Reactions 5 Comments
15 min read
Introducción a la Ciberseguridad 🐱‍💻

Introducción a la Ciberseguridad 🐱‍💻

Reactions 3 Comments
2 min read
Enforce MFA on the Azure Portal using Conditional Access

Enforce MFA on the Azure Portal using Conditional Access

Reactions 9 Comments
3 min read
Kali on a container

Kali on a container

Reactions 6 Comments 1
2 min read
Secure Session Storage for Web Apps

Secure Session Storage for Web Apps

Reactions 4 Comments
1 min read
Graph Change Notification Web Hook with Azure Functions

Graph Change Notification Web Hook with Azure Functions

Reactions 5 Comments
5 min read
Securing access to AWS IAM Roles from Gitlab CI

Securing access to AWS IAM Roles from Gitlab CI

Reactions 7 Comments
4 min read
Comment envoyer des emails en utilisant Python

Comment envoyer des emails en utilisant Python

Reactions 4 Comments
2 min read
A simple mistake that leaks 20M users' data

A simple mistake that leaks 20M users' data

Reactions 2 Comments
2 min read
Inicializando AWS CloudShell 2/3

Inicializando AWS CloudShell 2/3

Reactions 8 Comments
4 min read
Do you use Magic links?

Do you use Magic links?

Reactions 29 Comments 25
1 min read
File Encrypter and Decrypter

File Encrypter and Decrypter

Reactions 5 Comments
3 min read
Solving Chatbot-Based User Authentication 🔑: Introducing NoPass.me

Solving Chatbot-Based User Authentication 🔑: Introducing NoPass.me

Reactions 5 Comments
4 min read
Hardening and Simplifying Python's urlopen

Hardening and Simplifying Python's urlopen

Reactions 6 Comments
4 min read
How to Speed Up Your Website with Azure CDN

How to Speed Up Your Website with Azure CDN

Reactions 5 Comments
5 min read
Self-Signed SSL: NGINX on MAC

Self-Signed SSL: NGINX on MAC

Reactions 7 Comments
2 min read
What password manager should developers use ?

What password manager should developers use ?

Reactions 22 Comments 45
1 min read
Subdomain Takeover: Ignore This Vulnerability at Your Peril

Subdomain Takeover: Ignore This Vulnerability at Your Peril

Reactions 9 Comments
11 min read
Enabling Automatic Unattended Security Updates on Ubuntu and Debian

Enabling Automatic Unattended Security Updates on Ubuntu and Debian

Reactions 5 Comments
2 min read
loading...