Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Refresh Tokens: equilibrando segurança e usabilidade em aplicações!
Cover image for Refresh Tokens: equilibrando segurança e usabilidade em aplicações!

Refresh Tokens: equilibrando segurança e usabilidade em aplicações!

27
Comments 6
4 min read
Signing requests with AWS SDK in Lambda functions

Signing requests with AWS SDK in Lambda functions

27
Comments 9
5 min read
Using CloudFormation StackSets to Onboard Hundreds of Member AWS Accounts

Using CloudFormation StackSets to Onboard Hundreds of Member AWS Accounts

7
Comments
4 min read
Public and Private key cryptography

Public and Private key cryptography

5
Comments
3 min read
SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications
Cover image for SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications

SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications

8
Comments
12 min read
Part IV: Configuring OpenID Security Settings in Node.js

Part IV: Configuring OpenID Security Settings in Node.js

10
Comments
2 min read
Open Source is great and all, but to whom?
Cover image for Open Source is great and all, but to whom?

Open Source is great and all, but to whom?

23
Comments 1
7 min read
All You should know about HTTP Host Header Injection
Cover image for All You should know about HTTP Host Header Injection

All You should know about HTTP Host Header Injection

37
Comments 1
5 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

31
Comments 1
2 min read
Easily Produce a Software Bill of Materials with Cloud Native Buildpacks
Cover image for Easily Produce a Software Bill of Materials with Cloud Native Buildpacks

Easily Produce a Software Bill of Materials with Cloud Native Buildpacks

8
Comments
6 min read
Interesting project

Interesting project

7
Comments 2
1 min read
Building your next application using blockchain: Why and how
Cover image for Building your next application using blockchain: Why and how

Building your next application using blockchain: Why and how

19
Comments
9 min read
Helpful commands for networks

Helpful commands for networks

31
Comments
2 min read
Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport
Cover image for Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport

Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport

4
Comments
3 min read
Follow Friday: Security Edition (10 June 2022)

Follow Friday: Security Edition (10 June 2022)

23
Comments 4
1 min read
Python .env

Python .env

8
Comments
1 min read
Linux’s Cloud Init — Benefits, Quirks, and Drawbacks
Cover image for Linux’s Cloud Init — Benefits, Quirks, and Drawbacks

Linux’s Cloud Init — Benefits, Quirks, and Drawbacks

12
Comments
6 min read
LGPD e falsear dados sensíveis no banco de dados - parte 2

LGPD e falsear dados sensíveis no banco de dados - parte 2

7
Comments
6 min read
Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️
Cover image for Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️

Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️

8
Comments
6 min read
Let's Explore Wonderland: The Try Hack Me CTF. 🐰
Cover image for Let's Explore Wonderland: The Try Hack Me CTF. 🐰

Let's Explore Wonderland: The Try Hack Me CTF. 🐰

10
Comments
6 min read
Argo CD and Sealed Secrets is a perfect match

Argo CD and Sealed Secrets is a perfect match

27
Comments
4 min read
10 Secure Coding Best Practices to Follow in Every Project
Cover image for 10 Secure Coding Best Practices to Follow in Every Project

10 Secure Coding Best Practices to Follow in Every Project

15
Comments
3 min read
Why is Data Security a Developer Service Problem?
Cover image for Why is Data Security a Developer Service Problem?

Why is Data Security a Developer Service Problem?

6
Comments
5 min read
Browser Fingerprinting: What Is It and How Does It Work?

Browser Fingerprinting: What Is It and How Does It Work?

7
Comments
10 min read
AWS IAM Security Best Practices
Cover image for AWS IAM Security Best Practices

AWS IAM Security Best Practices

8
Comments
18 min read
loading...