Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementasi Secure Programming pada Modul Reply: Analisis Komprehensif Keamanan Aplikasi

Implementasi Secure Programming pada Modul Reply: Analisis Komprehensif Keamanan Aplikasi

Comments
11 min read
TLS-Chameleon

TLS-Chameleon

Comments
3 min read
📅 Day 12 | AWS IAM — The Backbone of AWS Security 🔐☁️
Cover image for 📅 Day 12 | AWS IAM — The Backbone of AWS Security 🔐☁️

📅 Day 12 | AWS IAM — The Backbone of AWS Security 🔐☁️

Comments
2 min read
A self-hosted backend for software release access

A self-hosted backend for software release access

Comments
2 min read
IMMUNE: Building an EDR/XDR/MDR Security Platform in Pure C — Solo Dev Progress

IMMUNE: Building an EDR/XDR/MDR Security Platform in Pure C — Solo Dev Progress

Comments
3 min read
How I Built a Custom PHP MVC Framework Without Composer (And Sold It for $8k)

How I Built a Custom PHP MVC Framework Without Composer (And Sold It for $8k)

Comments
2 min read
Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025
Cover image for Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025

Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025

Comments
7 min read
5 Security Checks Every Developer Should Run Before Pushing Code

5 Security Checks Every Developer Should Run Before Pushing Code

Comments
3 min read
Offline RAG in Modern C++: Secure Semantic Pipelines Without the Cloud
Cover image for Offline RAG in Modern C++: Secure Semantic Pipelines Without the Cloud

Offline RAG in Modern C++: Secure Semantic Pipelines Without the Cloud

Comments
1 min read
I Built a Local-First Secret Manager Because I Don't Trust AI Agents With My .env Files
Cover image for I Built a Local-First Secret Manager Because I Don't Trust AI Agents With My .env Files

I Built a Local-First Secret Manager Because I Don't Trust AI Agents With My .env Files

Comments
4 min read
Building a Scalable E-Commerce Platform: From Storefront to Warehouse
Cover image for Building a Scalable E-Commerce Platform: From Storefront to Warehouse

Building a Scalable E-Commerce Platform: From Storefront to Warehouse

Comments
3 min read
The Email I Almost Ignored That Saved My GitHub Repo
Cover image for The Email I Almost Ignored That Saved My GitHub Repo

The Email I Almost Ignored That Saved My GitHub Repo

1
Comments 1
3 min read
Building a Zero-Knowledge File Sharing Platform with Client-Side Encryption

Building a Zero-Knowledge File Sharing Platform with Client-Side Encryption

Comments
7 min read
Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials
Cover image for Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials

Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials

1
Comments
5 min read
Identify Components and Resources for Security
Cover image for Identify Components and Resources for Security

Identify Components and Resources for Security

1
Comments
3 min read
DEV Track Spotlight: Anti-Money Laundering Multi-agent Orchestration with AWS Strands (DEV326)
Cover image for DEV Track Spotlight: Anti-Money Laundering Multi-agent Orchestration with AWS Strands (DEV326)

DEV Track Spotlight: Anti-Money Laundering Multi-agent Orchestration with AWS Strands (DEV326)

Comments
9 min read
Best Practices for Securing Cloud Infrastructure in Enterprise Environments

Best Practices for Securing Cloud Infrastructure in Enterprise Environments

Comments
9 min read
Building Proof Pocket: An Offline Encrypted Vault for Your Photos and Documents
Cover image for Building Proof Pocket: An Offline Encrypted Vault for Your Photos and Documents

Building Proof Pocket: An Offline Encrypted Vault for Your Photos and Documents

Comments
2 min read
Why Traditional Linters Miss Critical Bugs (And What AI Can Do About It)

Why Traditional Linters Miss Critical Bugs (And What AI Can Do About It)

Comments
8 min read
n8n 2.0: Enhanced Security, Reliability & Performance | Automation Upgrade

n8n 2.0: Enhanced Security, Reliability & Performance | Automation Upgrade

Comments
5 min read
10,000 Lines of C, Real x86-64 Assembly for Critical Paths: Building Kernel-Level AI Security

10,000 Lines of C, Real x86-64 Assembly for Critical Paths: Building Kernel-Level AI Security

Comments
7 min read
Data Integrity & Anti-Cheating

Data Integrity & Anti-Cheating

Comments
3 min read
LogWard 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap
Cover image for LogWard 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap

LogWard 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap

10
Comments
4 min read
Proton Pass CLI Enters the Secrets Space — Here’s Why Ghostable Still Leads
Cover image for Proton Pass CLI Enters the Secrets Space — Here’s Why Ghostable Still Leads

Proton Pass CLI Enters the Secrets Space — Here’s Why Ghostable Still Leads

Comments
3 min read
Immutable by Design: Building Tamper-Proof Audit Logs for Health SaaS

Immutable by Design: Building Tamper-Proof Audit Logs for Health SaaS

Comments 2
4 min read
loading...