Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Code Security Series Memory Management in Programming: Taming the Wild Beast of Bytes
Cover image for Code Security Series Memory Management in Programming: Taming the Wild Beast of Bytes

Code Security Series Memory Management in Programming: Taming the Wild Beast of Bytes

Comments
5 min read
OpenResty Manager
Cover image for OpenResty Manager

OpenResty Manager

Comments
2 min read
Beyond Git: Features Every Young Professional Should Know in 2025
Cover image for Beyond Git: Features Every Young Professional Should Know in 2025

Beyond Git: Features Every Young Professional Should Know in 2025

5
Comments 1
3 min read
Implementing Fingerprint Authentication in Next.js with WebAuthn
Cover image for Implementing Fingerprint Authentication in Next.js with WebAuthn

Implementing Fingerprint Authentication in Next.js with WebAuthn

Comments 1
3 min read
The Untold Misadventures of Red Teaming Kimi K2 with Promptfoo
Cover image for The Untold Misadventures of Red Teaming Kimi K2 with Promptfoo

The Untold Misadventures of Red Teaming Kimi K2 with Promptfoo

5
Comments
14 min read
How to export indicators from XSOAR to Splunk
Cover image for How to export indicators from XSOAR to Splunk

How to export indicators from XSOAR to Splunk

Comments
3 min read
Oops... I Locked Myself Out with UFW - Here's How I Fixed It
Cover image for Oops... I Locked Myself Out with UFW - Here's How I Fixed It

Oops... I Locked Myself Out with UFW - Here's How I Fixed It

Comments
5 min read
Mastering Linux Ecosystem Flux: Navigating Kernel Updates, Distribution Upgrades, and Enterprise Adoption with Confidence

Mastering Linux Ecosystem Flux: Navigating Kernel Updates, Distribution Upgrades, and Enterprise Adoption with Confidence

Comments
7 min read
Fortifying Your DevOps Pipeline: 6 Cutting-Edge Container Registries Revolutionising Secure Image Management

Fortifying Your DevOps Pipeline: 6 Cutting-Edge Container Registries Revolutionising Secure Image Management

Comments
9 min read
Building a Starbucks Calorie Tracker with JavaScript + Custom Logic
Cover image for Building a Starbucks Calorie Tracker with JavaScript + Custom Logic

Building a Starbucks Calorie Tracker with JavaScript + Custom Logic

Comments
2 min read
Part 4: GPU Security and Isolation
Cover image for Part 4: GPU Security and Isolation

Part 4: GPU Security and Isolation

Comments
2 min read
Unlocking Android Bootloader and Flashing GSI: A Complete Guide for Motorola Edge 40 Neo

Unlocking Android Bootloader and Flashing GSI: A Complete Guide for Motorola Edge 40 Neo

3
Comments
3 min read
Is the CCSP Certification Worth It for Cloud Security?

Is the CCSP Certification Worth It for Cloud Security?

1
Comments
1 min read
Vulnerability Assessment Costs: A Complete Breakdown
Cover image for Vulnerability Assessment Costs: A Complete Breakdown

Vulnerability Assessment Costs: A Complete Breakdown

1
Comments
3 min read
Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits
Cover image for Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

19
Comments
11 min read
Securing the Cloud: A Focused Overview of Microsoft Azure Security Features

Securing the Cloud: A Focused Overview of Microsoft Azure Security Features

1
Comments
1 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
🕵️ JavaScript powers the modern web — and tracks you in ways you don’t expect

🕵️ JavaScript powers the modern web — and tracks you in ways you don’t expect

Comments
1 min read
Manage Tags and Locks on VMs
Cover image for Manage Tags and Locks on VMs

Manage Tags and Locks on VMs

Comments
2 min read
Day 1/50 Basics on cyber security & web2
Cover image for Day 1/50 Basics on cyber security & web2

Day 1/50 Basics on cyber security & web2

1
Comments
2 min read
🚀 Speed Up containerd Image Pulls with These Proven Techniques
Cover image for 🚀 Speed Up containerd Image Pulls with These Proven Techniques

🚀 Speed Up containerd Image Pulls with These Proven Techniques

Comments
3 min read
🧱 containerd vs Docker: What's Really Happening Under the Hood?
Cover image for 🧱 containerd vs Docker: What's Really Happening Under the Hood?

🧱 containerd vs Docker: What's Really Happening Under the Hood?

Comments
3 min read
Why security isn't just an afterthought?
Cover image for Why security isn't just an afterthought?

Why security isn't just an afterthought?

Comments
1 min read
Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection
Cover image for Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection

Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection

1
Comments 1
5 min read
Adding Dynamics 365 Users through Security Roles as Members
Cover image for Adding Dynamics 365 Users through Security Roles as Members

Adding Dynamics 365 Users through Security Roles as Members

2
Comments
2 min read
loading...