Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Safely Handling JWTs
Cover image for Safely Handling JWTs

Safely Handling JWTs

55
Comments 3
9 min read
Symmetric vs. Asymmetric Encryption
Cover image for Symmetric vs. Asymmetric Encryption

Symmetric vs. Asymmetric Encryption

5
Comments
2 min read
Implementa Auth0 Tokens como un campeón

Implementa Auth0 Tokens como un campeón

6
Comments
2 min read
Descubra o que é ransomware e saiba como manter seus dados seguros
Cover image for Descubra o que é ransomware e saiba como manter seus dados seguros

Descubra o que é ransomware e saiba como manter seus dados seguros

3
Comments
5 min read
Introducing the AWS Firewall Factory

Introducing the AWS Firewall Factory

10
Comments 2
3 min read
A simple buffer overflow exploit

A simple buffer overflow exploit

4
Comments
4 min read
How I Hacked Kerala Road Transport Corporation(KSRTC)?
Cover image for How I Hacked Kerala Road Transport Corporation(KSRTC)?

How I Hacked Kerala Road Transport Corporation(KSRTC)?

7
Comments 2
3 min read
Go language

Go language

7
Comments
1 min read
Password Protect Static Sites with PageCrypt
Cover image for Password Protect Static Sites with PageCrypt

Password Protect Static Sites with PageCrypt

8
Comments
5 min read
Connect to your EC2 instance using SSH the modern way
Cover image for Connect to your EC2 instance using SSH the modern way

Connect to your EC2 instance using SSH the modern way

8
Comments
5 min read
Containerless! How to Run WebAssembly Workloads on Kubernetes with Rust
Cover image for Containerless! How to Run WebAssembly Workloads on Kubernetes with Rust

Containerless! How to Run WebAssembly Workloads on Kubernetes with Rust

75
Comments 7
11 min read
Secure your AWS account
Cover image for Secure your AWS account

Secure your AWS account

3
Comments
7 min read
🔒 Make your JavaScript project safer by using this workflow

🔒 Make your JavaScript project safer by using this workflow

17
Comments
3 min read
Dealing with Discord Malicious Domains
Cover image for Dealing with Discord Malicious Domains

Dealing with Discord Malicious Domains

2
Comments
1 min read
Differences between the 6 types of Hackers
Cover image for Differences between the 6 types of Hackers

Differences between the 6 types of Hackers

8
Comments
2 min read
Cross-Site Scripting (XSS) Vulnerabilities (3 Tips to prevent it)
Cover image for Cross-Site Scripting (XSS) Vulnerabilities (3 Tips to prevent it)

Cross-Site Scripting (XSS) Vulnerabilities (3 Tips to prevent it)

29
Comments 2
3 min read
How to get a job as a AWS Pentester?

How to get a job as a AWS Pentester?

2
Comments
4 min read
What Hackers Know About Your Software Supply Chain (That You Don’t)
Cover image for What Hackers Know About Your Software Supply Chain (That You Don’t)

What Hackers Know About Your Software Supply Chain (That You Don’t)

3
Comments 1
2 min read
Trusting in your IaC -Terraform-Compliance

Trusting in your IaC -Terraform-Compliance

13
Comments 4
5 min read
Acra. Features: Authentication
Cover image for Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Configurar alertas en Database Migration Service
Cover image for Configurar alertas en Database Migration Service

Configurar alertas en Database Migration Service

2
Comments
5 min read
A Serverless API to validate AWS Access Keys based on AWS SAM

A Serverless API to validate AWS Access Keys based on AWS SAM

6
Comments
9 min read
Not a Regular Password Regex
Cover image for Not a Regular Password Regex

Not a Regular Password Regex

6
Comments
2 min read
Angular Interceptors to Manage HTTP Requests ⚡

Angular Interceptors to Manage HTTP Requests ⚡

5
Comments
15 min read
Auth0 JWT Middleware in Go - Gin Web Framework

Auth0 JWT Middleware in Go - Gin Web Framework

11
Comments 1
5 min read
loading...