Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Comments
2 min read
NodeJS 101 —  Part 4 🔐 Authorization with JWT

NodeJS 101 —  Part 4 🔐 Authorization with JWT

1
Comments
4 min read
From PKIX errors to a clean mTLS + Feign + IAM demo
Cover image for From PKIX errors to a clean mTLS + Feign + IAM demo

From PKIX errors to a clean mTLS + Feign + IAM demo

Comments
4 min read
My First Ethical Open Redirect Scanner: From Zero to Shipped

My First Ethical Open Redirect Scanner: From Zero to Shipped

6
Comments
3 min read
Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work
Cover image for Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Azure OpenAI's Content Filter: When Safety Theater Blocks Real Work

Comments 1
3 min read
Technical Overview of Infrared Thermography for Electrical Systems

Technical Overview of Infrared Thermography for Electrical Systems

Comments 2
3 min read
how do you trust a third party API?
Cover image for how do you trust a third party API?

how do you trust a third party API?

Comments 1
2 min read
I was tired of copying .env files between machines, so we built a CLI

I was tired of copying .env files between machines, so we built a CLI

Comments
1 min read
Building SENTINEL: How I Turned Network Packets Into Ghosts

Building SENTINEL: How I Turned Network Packets Into Ghosts

Comments
8 min read
How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare
Cover image for How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

Comments
3 min read
Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Comments
5 min read
Why WebAuthn Feels Easy — Until You Try to Ship It

Why WebAuthn Feels Easy — Until You Try to Ship It

Comments
2 min read
Offline License Activation with QR Codes: Serving Air-Gapped Environments in C#

Offline License Activation with QR Codes: Serving Air-Gapped Environments in C#

Comments
11 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
How I Run LLM Agents in a Secure Nix Sandbox
Cover image for How I Run LLM Agents in a Secure Nix Sandbox

How I Run LLM Agents in a Secure Nix Sandbox

3
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.