DEV Community

Carrie profile picture

Carrie

Cybersecurity Engineer | Follow Me and Learn Web Application Security Step by Step

How to Set Up a High Availability Environment with Two

How to Set Up a High Availability Environment with Two

5
Comments
2 min read

Want to connect with Carrie?

Create an account to connect with Carrie. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Website Owner Must Know: X-Forwarded-For

Website Owner Must Know: X-Forwarded-For

5
Comments
2 min read
SafeLine WAF Waiting Room: The Terminator of HTTP Flood DDoS Attack

SafeLine WAF Waiting Room: The Terminator of HTTP Flood DDoS Attack

10
Comments
4 min read
What's New in Open Source WAF, SafeLine V7.2.3?

What's New in Open Source WAF, SafeLine V7.2.3?

8
Comments
1 min read
Annoyed by AI Bots? A WAF Solution You've Never Seen

Annoyed by AI Bots? A WAF Solution You've Never Seen

6
Comments
4 min read
What Your Website Will Face Without an Anti-Bot Solution

What Your Website Will Face Without an Anti-Bot Solution

5
Comments
3 min read
Specific Security Cases About Websites Without Anti-Bot Solutions

Specific Security Cases About Websites Without Anti-Bot Solutions

9
Comments
3 min read
What is WAAP?

What is WAAP?

10
Comments
3 min read
Free Resources for Learning Kali Linux

Free Resources for Learning Kali Linux

9
Comments
2 min read
What is a Website Waiting Room?

What is a Website Waiting Room?

8
Comments 4
3 min read
SafeLine: The Most Cost-Effective WAAP

SafeLine: The Most Cost-Effective WAAP

6
Comments
3 min read
What is LTS in Software Versions?

What is LTS in Software Versions?

11
Comments
3 min read
Understanding ARM Server Deployment for Beginners

Understanding ARM Server Deployment for Beginners

10
Comments
3 min read
Is a WAF Worth Investing In Despite Its Notorious High False Positive Rate?

Is a WAF Worth Investing In Despite Its Notorious High False Positive Rate?

5
Comments
3 min read
What Are the Advantages of Using a WAF/Reverse Proxy?

What Are the Advantages of Using a WAF/Reverse Proxy?

6
Comments
3 min read
Why Homelab Users Need a WAF

Why Homelab Users Need a WAF

6
Comments
3 min read
Comprehensive Understanding of IPv6 Addresses

Comprehensive Understanding of IPv6 Addresses

6
Comments
3 min read
SafeLine WAF: Comprehensive Protection for Your Web Applications

SafeLine WAF: Comprehensive Protection for Your Web Applications

6
Comments 1
3 min read
Beginner's Understanding to WAF

Beginner's Understanding to WAF

5
Comments
3 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
The Beginner's Guide to Understanding WebSocket

The Beginner's Guide to Understanding WebSocket

99
Comments 10
3 min read
Understanding of Pulling WAF Definitions Updates

Understanding of Pulling WAF Definitions Updates

7
Comments
3 min read
Anti Bot Protection with SafeLine 7.0

Anti Bot Protection with SafeLine 7.0

6
Comments
3 min read
What is a Reverse Proxy

What is a Reverse Proxy

13
Comments 1
3 min read
What is an Upstream Server

What is an Upstream Server

9
Comments 1
3 min read
What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

5
Comments
3 min read
What Are Web Application Security Detection Rules?

What Are Web Application Security Detection Rules?

7
Comments
3 min read
How to Achieve Load Balancing with SafeLine WAF

How to Achieve Load Balancing with SafeLine WAF

7
Comments
2 min read
QPS for Beginners

QPS for Beginners

10
Comments
3 min read
HTTP/3 for Beginners and How to Protect Your HTTP/3 Website

HTTP/3 for Beginners and How to Protect Your HTTP/3 Website

11
Comments
3 min read
How to Purchase a SafeLine Pro License

How to Purchase a SafeLine Pro License

15
Comments
2 min read
What each container does in SafeLine WAF

What each container does in SafeLine WAF

10
Comments
3 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
Beginner's Guide to Understanding CDN

Beginner's Guide to Understanding CDN

7
Comments
2 min read
Analysis of the Compose Configuration File for SafeLine WAF - MGT

Analysis of the Compose Configuration File for SafeLine WAF - MGT

6
Comments
2 min read
How to Simply Implement Human Machine Verification for Web Applications

How to Simply Implement Human Machine Verification for Web Applications

7
Comments
3 min read
Open Source IDS/IPS Suricata for Beginners

Open Source IDS/IPS Suricata for Beginners

6
Comments
3 min read
What is Tengine

What is Tengine

6
Comments
3 min read
How to Test Effectiveness of a WAF (Web Application Firewall)

How to Test Effectiveness of a WAF (Web Application Firewall)

6
Comments
3 min read
OpenAPI Tutorial for SafeLine WAF

OpenAPI Tutorial for SafeLine WAF

7
Comments
1 min read
SafeLine WAF: Free/Community vs Pro

SafeLine WAF: Free/Community vs Pro

9
Comments
1 min read
Why Do Website Owners Use SafeLine Community Edition?

Why Do Website Owners Use SafeLine Community Edition?

7
Comments
3 min read
Understanding Domains and Wildcard Domains: A Guide for Beginners

Understanding Domains and Wildcard Domains: A Guide for Beginners

6
Comments
3 min read
How to Encrypt HTML Code for Web Security

How to Encrypt HTML Code for Web Security

9
Comments
3 min read
How to Encrypt JavaScript Code for Web Security

How to Encrypt JavaScript Code for Web Security

7
Comments 2
3 min read
The Ultimate Guide to Understanding Blind SQL injection

The Ultimate Guide to Understanding Blind SQL injection

10
Comments
3 min read
Understanding Semantic Analysis Algorithms: A Beginner’s Guide

Understanding Semantic Analysis Algorithms: A Beginner’s Guide

11
Comments
3 min read
Turning Your Server into a High-Security Server with a Free WAF

Turning Your Server into a High-Security Server with a Free WAF

12
Comments
4 min read
Guide to Addressing “Network File Descriptor is Not Connected”

Guide to Addressing “Network File Descriptor is Not Connected”

10
Comments
3 min read
Addressing Container Errors in Containerized Apps

Addressing Container Errors in Containerized Apps

6
Comments
3 min read
The Opposite of Self-hosting: Third-Party Hosting

The Opposite of Self-hosting: Third-Party Hosting

6
Comments 1
3 min read
Self-Hosting: What, Why and How

Self-Hosting: What, Why and How

8
Comments 1
3 min read
Top 10 Web Application Security Threats

Top 10 Web Application Security Threats

12
Comments
6 min read
Recent 0day Threat Intelligence Alert from Darknet

Recent 0day Threat Intelligence Alert from Darknet

10
Comments
2 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

10
Comments
5 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

10
Comments
6 min read
Hotel Booking Data Breach of Taiwan Tourists

Hotel Booking Data Breach of Taiwan Tourists

10
Comments
3 min read
POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

14
Comments
3 min read
The Book Nook: A Website Security Crisis

The Book Nook: A Website Security Crisis

13
Comments
3 min read
The Hidden Key: A Tale of Access Control

The Hidden Key: A Tale of Access Control

12
Comments
3 min read
loading...