DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
#DevOps para noobs - Proxy Reverso

#DevOps para noobs - Proxy Reverso

192
Comments 12
3 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

182
Comments 12
4 min read
Autenticação e Autorização de uma ASP .NET Web API com Keycloak

Autenticação e Autorização de uma ASP .NET Web API com Keycloak

168
Comments 4
9 min read
Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

135
Comments 5
6 min read
JWT vs Session Authentication

JWT vs Session Authentication

133
Comments 24
3 min read
7 Common Front End security attacks

7 Common Front End security attacks

100
Comments 17
2 min read
Understanding JWTs: A Simple Guide for Beginners

Understanding JWTs: A Simple Guide for Beginners

96
Comments 9
2 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

87
Comments 7
8 min read
Supercharge your Repository with Code Owners

Supercharge your Repository with Code Owners

84
Comments 27
3 min read
Mastering JWT Security

Mastering JWT Security

84
Comments 18
3 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

80
Comments 16
8 min read
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works

Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works

64
Comments 3
5 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

63
Comments 3
4 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
How to Do Authorization - A Decision Framework: Part 1

How to Do Authorization - A Decision Framework: Part 1

62
Comments
7 min read
5 best open source IDEs for programming

5 best open source IDEs for programming

61
Comments 34
2 min read
Mastering File Upload Security: Understanding File Types

Mastering File Upload Security: Understanding File Types

57
Comments 1
8 min read
SSH as VPN Alternative

SSH as VPN Alternative

48
Comments 10
2 min read
Netmaker - WireGuard Made Easy

Netmaker - WireGuard Made Easy

47
Comments 1
2 min read
RLS of Supabase(PostgreSQL) Is Good, But …🤔

RLS of Supabase(PostgreSQL) Is Good, But …🤔

47
Comments 4
6 min read
Build Custom Authentication Using Appsmith and APISIX

Build Custom Authentication Using Appsmith and APISIX

46
Comments
9 min read
Build your own Remote Access VPN to AWS with WireGuard and Netmaker

Build your own Remote Access VPN to AWS with WireGuard and Netmaker

42
Comments 2
4 min read
🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

40
Comments
4 min read
How to hide files or data in a JPEG Image

How to hide files or data in a JPEG Image

38
Comments 11
4 min read
What is HTTPS and how does it work?

What is HTTPS and how does it work?

36
Comments 8
5 min read
GitHub Security Best Practices Every Developer Should Know

GitHub Security Best Practices Every Developer Should Know

36
Comments 6
4 min read
Securing Your Code with GitHub

Securing Your Code with GitHub

36
Comments 1
7 min read
Evitando SQL Injection com Golang

Evitando SQL Injection com Golang

35
Comments 2
9 min read
Cloud Pentest 101

Cloud Pentest 101

35
Comments
2 min read
Vulnerabilidade de Software Para Devs

Vulnerabilidade de Software Para Devs

35
Comments 1
4 min read
Top 20 C# Security Interview Questions +(Answers)

Top 20 C# Security Interview Questions +(Answers)

35
Comments 1
22 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

34
Comments 1
6 min read
Clean authorization control in serverless functions

Clean authorization control in serverless functions

34
Comments 1
4 min read
Using Content Security Policy headers with React & emotion

Using Content Security Policy headers with React & emotion

34
Comments 3
3 min read
Understanding Authorization Before Authentication: Enhancing Web API Security

Understanding Authorization Before Authentication: Enhancing Web API Security

34
Comments
4 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
RBAC with API Gateway and Open Policy Agent(OPA)

RBAC with API Gateway and Open Policy Agent(OPA)

32
Comments
10 min read
Mastering File Upload Security: DoS and Antivirus

Mastering File Upload Security: DoS and Antivirus

31
Comments
9 min read
SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

30
Comments 3
3 min read
Web Environment Integrity: Google strikes again

Web Environment Integrity: Google strikes again

30
Comments 4
5 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

30
Comments 2
12 min read
ZenStack: The Complete Authorization Solution for Prisma Projects

ZenStack: The Complete Authorization Solution for Prisma Projects

29
Comments 2
8 min read
Cross-Origin Resource Sharing (CORS)

Cross-Origin Resource Sharing (CORS)

28
Comments 7
7 min read
DIY Home Security Camera System

DIY Home Security Camera System

28
Comments 1
8 min read
Whitehouse Declares Software Should Be Memory Safe

Whitehouse Declares Software Should Be Memory Safe

27
Comments 17
1 min read
Adding Clerk Authentication to a NextJS App

Adding Clerk Authentication to a NextJS App

27
Comments 1
4 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

26
Comments
14 min read
Using Metlo to Secure My Personal Finance App

Using Metlo to Secure My Personal Finance App

26
Comments
4 min read
6 Tools To Help Keep Your Dependencies And Code More Secure

6 Tools To Help Keep Your Dependencies And Code More Secure

25
Comments 4
8 min read
The Ethereum Virtual Machine: Fueling the Decentralized Revolution

The Ethereum Virtual Machine: Fueling the Decentralized Revolution

25
Comments 2
13 min read
Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

25
Comments
3 min read
How To Install TLS/SSL on Docker Nginx Container With Let’s Encrypt

How To Install TLS/SSL on Docker Nginx Container With Let’s Encrypt

25
Comments 2
5 min read
Web Security: Understanding Request Smuggling

Web Security: Understanding Request Smuggling

25
Comments 3
3 min read
Analyzing a Linux malware binary

Analyzing a Linux malware binary

24
Comments 5
4 min read
Finding the Right Balance in Gradle Dependency Strategy

Finding the Right Balance in Gradle Dependency Strategy

24
Comments 2
11 min read
Tailscale vs ZeroTier

Tailscale vs ZeroTier

24
Comments 2
5 min read
Security🔐 Concerns with Cookies🍪.

Security🔐 Concerns with Cookies🍪.

24
Comments 8
4 min read
How to Do Authorization - A Decision Framework: Part 2

How to Do Authorization - A Decision Framework: Part 2

24
Comments
5 min read
7 Must-Do Security Best Practices for your AWS Account

7 Must-Do Security Best Practices for your AWS Account

24
Comments 6
9 min read
loading...