Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The One Hash Function You Need, BCrypt
Cover image for The One Hash Function You Need, BCrypt

The One Hash Function You Need, BCrypt

6
Comments
5 min read
Custom SSL Certificates for Your Dev Environment

Custom SSL Certificates for Your Dev Environment

9
Comments 1
3 min read
Why does my app send network requests when I open an SVG file?

Why does my app send network requests when I open an SVG file?

5
Comments
9 min read
Stop AWS Account Hacks

Stop AWS Account Hacks

22
Comments 3
4 min read
Injecting backdoors to NPM packages
Cover image for Injecting backdoors to NPM packages

Injecting backdoors to NPM packages

42
Comments 1
6 min read
7 Must-Haves For Ultimate AWS Security
Cover image for 7 Must-Haves For Ultimate AWS Security

7 Must-Haves For Ultimate AWS Security

6
Comments
1 min read
How to use a secure private NuGet source in Visual Studio or JetBrains Rider
Cover image for How to use a secure private NuGet source in Visual Studio or JetBrains Rider

How to use a secure private NuGet source in Visual Studio or JetBrains Rider

26
Comments 1
5 min read
Securing RMarkdown Documents
Cover image for Securing RMarkdown Documents

Securing RMarkdown Documents

5
Comments
1 min read
'Code injection' in AWS CodePipeline
Cover image for 'Code injection' in AWS CodePipeline

'Code injection' in AWS CodePipeline

7
Comments 6
4 min read
Create a React App with Biometric Authentication
Cover image for Create a React App with Biometric Authentication

Create a React App with Biometric Authentication

7
Comments
7 min read
Use ZAP to Perform DAST (Dynamic Application Security Testing)

Use ZAP to Perform DAST (Dynamic Application Security Testing)

8
Comments 1
5 min read
Read-only buckets in shared AWS accounts
Cover image for Read-only buckets in shared AWS accounts

Read-only buckets in shared AWS accounts

5
Comments
5 min read
How to Safely Share Passwords and Secrets Codes Online
Cover image for How to Safely Share Passwords and Secrets Codes Online

How to Safely Share Passwords and Secrets Codes Online

4
Comments
3 min read
When Package Dependencies Become Problematic
Cover image for When Package Dependencies Become Problematic

When Package Dependencies Become Problematic

6
Comments
6 min read
AWS Inspector and AWS Config - step by step towards more security
Cover image for AWS Inspector and AWS Config - step by step towards more security

AWS Inspector and AWS Config - step by step towards more security

3
Comments
5 min read
Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins
Cover image for Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins

Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins

2
Comments
7 min read
Secure your cloud with Cloudsploit!
Cover image for Secure your cloud with Cloudsploit!

Secure your cloud with Cloudsploit!

12
Comments
7 min read
Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does
Cover image for Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does

Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does

7
Comments
5 min read
Hashing a Password in NodeJs

Hashing a Password in NodeJs

3
Comments
1 min read
Environment Variables in Python

Environment Variables in Python

6
Comments
1 min read
Sessions: cookies vs localStorage - which one to use when
Cover image for Sessions: cookies vs localStorage - which one to use when

Sessions: cookies vs localStorage - which one to use when

8
Comments
3 min read
Firewall: Egress Filtering with ufw

Firewall: Egress Filtering with ufw

4
Comments
4 min read
Security news weekly round-up - 11th February 2022
Cover image for Security news weekly round-up - 11th February 2022

Security news weekly round-up - 11th February 2022

Comments
4 min read
Effective Session Management using Supertokens
Cover image for Effective Session Management using Supertokens

Effective Session Management using Supertokens

134
Comments 3
7 min read
Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice

Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice

7
Comments
18 min read
loading...