Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
PHP input validation yang benar
Cover image for PHP input validation yang benar

PHP input validation yang benar

Comments
1 min read
Segurança em Contêineres: Como Melange e apko Ajudam a Proteger Seus Projetos e Criar Imagens Minimalistas
Cover image for Segurança em Contêineres: Como Melange e apko Ajudam a Proteger Seus Projetos e Criar Imagens Minimalistas

Segurança em Contêineres: Como Melange e apko Ajudam a Proteger Seus Projetos e Criar Imagens Minimalistas

1
Comments
12 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
Cover image for 🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
Securing APIs: Techniques and Best Practices for Security
Cover image for Securing APIs: Techniques and Best Practices for Security

Securing APIs: Techniques and Best Practices for Security

4
Comments 1
5 min read
Tutorial: Credit card cracking explained — and how to prevent it
Cover image for Tutorial: Credit card cracking explained — and how to prevent it

Tutorial: Credit card cracking explained — and how to prevent it

Comments
12 min read
Understanding Ports and Their Services: A Comprehensive Guide
Cover image for Understanding Ports and Their Services: A Comprehensive Guide

Understanding Ports and Their Services: A Comprehensive Guide

1
Comments
2 min read
One of the biggest bank heists in history
Cover image for One of the biggest bank heists in history

One of the biggest bank heists in history

Comments
1 min read
Augment Cline and your LLM with up-to-date risk insight using CodeGate

Augment Cline and your LLM with up-to-date risk insight using CodeGate

4
Comments
1 min read
Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story
Cover image for Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Comments
39 min read
Authentication Vs Authorization In Backend Systems
Cover image for Authentication Vs Authorization In Backend Systems

Authentication Vs Authorization In Backend Systems

1
Comments 2
2 min read
Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

1
Comments
3 min read
Autorização em Golang
Cover image for Autorização em Golang

Autorização em Golang

1
Comments
1 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe
Cover image for Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
A Phish on a Fork, no Chips
Cover image for A Phish on a Fork, no Chips

A Phish on a Fork, no Chips

13
Comments 1
4 min read
Leading Docker Adoption: A Senior Manager’s Perspective
Cover image for Leading Docker Adoption: A Senior Manager’s Perspective

Leading Docker Adoption: A Senior Manager’s Perspective

3
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.