DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your Next.js Application: The Basic Defenders (Security Headers)

Securing Your Next.js Application: The Basic Defenders (Security Headers)

2
Comments
8 min read
Tech innovator

Tech innovator

Comments
1 min read
Granting User Access to Unraid Shares

Granting User Access to Unraid Shares

Comments
2 min read
Creating a User in Unraid for Secure Access

Creating a User in Unraid for Secure Access

Comments
1 min read
Implementing Multi-Factor Authentication (MFA) in .NET Applications

Implementing Multi-Factor Authentication (MFA) in .NET Applications

2
Comments
2 min read
Compliance Tools for Cloud Environments

Compliance Tools for Cloud Environments

1
Comments
4 min read
Let's get messy

Let's get messy

Comments
3 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
Protect contact email from bots

Protect contact email from bots

1
Comments
2 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

1
Comments
3 min read
Diving into Bug Bounty Hunting: My Journey Begins with Resources and Tips for Beginners

Diving into Bug Bounty Hunting: My Journey Begins with Resources and Tips for Beginners

Comments
4 min read
Stop Ignoring This Key Angular Tool-Your App’s Security Depends on It

Stop Ignoring This Key Angular Tool-Your App’s Security Depends on It

1
Comments
3 min read
NowiPass

NowiPass

Comments
1 min read
Designing and Implementing an API Rate Limiter

Designing and Implementing an API Rate Limiter

Comments
6 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Securing Your Kubernetes Website with Let's Encrypt and cert-manager

Securing Your Kubernetes Website with Let's Encrypt and cert-manager

Comments
3 min read
Vidéo: faire un projet python qui restera fonctionnel dans 2 mois

Vidéo: faire un projet python qui restera fonctionnel dans 2 mois

Comments
1 min read
Enhancing Mobile Security with Dockerized Environments

Enhancing Mobile Security with Dockerized Environments

2
Comments
3 min read
nsswitch.conf

nsswitch.conf

Comments
4 min read
Anyone Can Become Certified in Cybersecurity

Anyone Can Become Certified in Cybersecurity

Comments
3 min read
Master Linux File Ownership While Your Coffee Brews

Master Linux File Ownership While Your Coffee Brews

1
Comments
2 min read
The NIS Directive and Its Purpose

The NIS Directive and Its Purpose

1
Comments
3 min read
OWASP Top 10: What Every Developer Should Know About It

OWASP Top 10: What Every Developer Should Know About It

Comments
9 min read
loading...