Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A deep dive into LacertaDB
Cover image for A deep dive into LacertaDB

A deep dive into LacertaDB

1
Comments 1
6 min read
Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment
Cover image for Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment

Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment

1
Comments
4 min read
Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Comments
6 min read
AWS Envelop Encryption

AWS Envelop Encryption

Comments
2 min read
Implementing Passkeys Beyond the Demo
Cover image for Implementing Passkeys Beyond the Demo

Implementing Passkeys Beyond the Demo

Comments
4 min read
DVP: Why Your Self-Driving Car Needs an AI Flight Recorder

DVP: Why Your Self-Driving Car Needs an AI Flight Recorder

Comments
9 min read
Simple BOT blocker with Caddy and Django

Simple BOT blocker with Caddy and Django

Comments
3 min read
Using GPT as a Code Auditor (Not a Code Generator)

Using GPT as a Code Auditor (Not a Code Generator)

Comments
2 min read
Day 17 — Silent Failure & Loss of Visibility (The White Tree)
Cover image for Day 17 — Silent Failure & Loss of Visibility (The White Tree)

Day 17 — Silent Failure & Loss of Visibility (The White Tree)

3
Comments
2 min read
Is Shopify Legitimate or a Scam? A Practical Guide for Developers and Indie Founders

Is Shopify Legitimate or a Scam? A Practical Guide for Developers and Indie Founders

Comments
3 min read
Thoughts on zero-knowledge password managers

Thoughts on zero-knowledge password managers

Comments
1 min read
What Your Flutter App Leaks After Release (And How to Catch It Before Launch)
Cover image for What Your Flutter App Leaks After Release (And How to Catch It Before Launch)

What Your Flutter App Leaks After Release (And How to Catch It Before Launch)

Comments
2 min read
PyTorch Models Are Executables: Why I Built a Scanner to Stop "Pickle Bombs"

PyTorch Models Are Executables: Why I Built a Scanner to Stop "Pickle Bombs"

Comments
3 min read
Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment
Cover image for Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment

Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment

1
Comments
4 min read
Bypass WiFi Time Limits on Your Mac: One Command to Reset Your MAC Address

Bypass WiFi Time Limits on Your Mac: One Command to Reset Your MAC Address

Comments
4 min read
This message will self-destruct in 5 seconds...
Cover image for This message will self-destruct in 5 seconds...

This message will self-destruct in 5 seconds...

Comments
6 min read
How to Create a Chatbot That Processes Credit Card Applications

How to Create a Chatbot That Processes Credit Card Applications

Comments
12 min read
Part 02: Building a Sovereign Software Factory: The Local Root CA & Trust Chains

Part 02: Building a Sovereign Software Factory: The Local Root CA & Trust Chains

Comments
31 min read
Spring Boot Security tokens Validation locally using Keycloak’s public keys (JWKS)

Spring Boot Security tokens Validation locally using Keycloak’s public keys (JWKS)

Comments
6 min read
Day 16 — Authentication Between Services (The Dragon-Archer's Question)
Cover image for Day 16 — Authentication Between Services (The Dragon-Archer's Question)

Day 16 — Authentication Between Services (The Dragon-Archer's Question)

3
Comments
2 min read
Splunk Basics

Splunk Basics

1
Comments
4 min read
The Gap Between Compliance-Driven Pentesting and Real Security
Cover image for The Gap Between Compliance-Driven Pentesting and Real Security

The Gap Between Compliance-Driven Pentesting and Real Security

2
Comments
5 min read
🔐 Week 4 Scripting Challenge: Build an Auth Log Failed Login Scraper in Python

🔐 Week 4 Scripting Challenge: Build an Auth Log Failed Login Scraper in Python

3
Comments 2
12 min read
Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Comments
2 min read
Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command
Cover image for Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Comments
3 min read
loading...