Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
❄️A Five-Minute UI Feature That Became an XSS Time Bomb
Cover image for ❄️A Five-Minute UI Feature That Became an XSS Time Bomb

❄️A Five-Minute UI Feature That Became an XSS Time Bomb

59
Comments 20
4 min read
I don't trust password managers. So I built one.
Cover image for I don't trust password managers. So I built one.

I don't trust password managers. So I built one.

2
Comments
3 min read
Rule of Two Piece

Rule of Two Piece

Comments 1
7 min read
Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)
Cover image for Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Comments
5 min read
🚀 Modern Security Guide for Java Developers

🚀 Modern Security Guide for Java Developers

4
Comments
3 min read
ATM Hacking: From Terminator 2 Fantasy to Red Team Reality
Cover image for ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

Comments
12 min read
Moving My Technical Essays to Medium

Moving My Technical Essays to Medium

Comments 2
1 min read
Stop Using AWS Access Keys in GitHub Actions: The OIDC Guide You Need
Cover image for Stop Using AWS Access Keys in GitHub Actions: The OIDC Guide You Need

Stop Using AWS Access Keys in GitHub Actions: The OIDC Guide You Need

23
Comments
5 min read
How Do Surveillance Systems Affect Identity in South Asia?

How Do Surveillance Systems Affect Identity in South Asia?

Comments
3 min read
Azure Static Web Apps: login_hint with Azure Functions v1

Azure Static Web Apps: login_hint with Azure Functions v1

Comments
5 min read
Improving Container Security with Docker Hardened Images
Cover image for Improving Container Security with Docker Hardened Images

Improving Container Security with Docker Hardened Images

17
Comments
6 min read
Code Smell 317 - Email Handling Vulnerabilities
Cover image for Code Smell 317 - Email Handling Vulnerabilities

Code Smell 317 - Email Handling Vulnerabilities

2
Comments
14 min read
Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

1
Comments
6 min read
Why Your UEBA Isn’t Working (and how to fix it)
Cover image for Why Your UEBA Isn’t Working (and how to fix it)

Why Your UEBA Isn’t Working (and how to fix it)

1
Comments
7 min read
I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How
Cover image for I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.