Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky

Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky

151
Comments 2
5 min read
The Fundamentals of Security Every Developer Should Understand

The Fundamentals of Security Every Developer Should Understand

332
Comments 9
1 min read
How to DOS Yourself With Argon2

How to DOS Yourself With Argon2

15
Comments
3 min read
What is the OAuth 2.0 Authorization Code Grant Type?

What is the OAuth 2.0 Authorization Code Grant Type?

13
Comments
5 min read
What's the big deal with privacy?

What's the big deal with privacy?

26
Comments 21
1 min read
Better passwords in Ruby applications with the Pwned Passwords API

Better passwords in Ruby applications with the Pwned Passwords API

108
Comments 8
6 min read
What are some fundamentals of security every developer should understand?

What are some fundamentals of security every developer should understand?

195
Comments 47
1 min read
A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation

A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation

7
Comments
6 min read
Beefing Up Your Spring Security with Two-Factor Authentication

Beefing Up Your Spring Security with Two-Factor Authentication

17
Comments 1
10 min read
Crypto Is Hard

Crypto Is Hard

10
Comments
1 min read
An in-depth look at CVE-2018-8778 or why integer overflows are still a thing!

An in-depth look at CVE-2018-8778 or why integer overflows are still a thing!

14
Comments 1
8 min read
How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

6
Comments 1
8 min read
Beware of browser extensions that track you everywhere

Beware of browser extensions that track you everywhere

109
Comments 15
1 min read
Testing A WordPress Plugin Can Be Fun!

Testing A WordPress Plugin Can Be Fun!

10
Comments 2
9 min read
Java - JVM Security Information Gathering

Java - JVM Security Information Gathering

10
Comments
2 min read
AWS S3 or the Pandora's box

AWS S3 or the Pandora's box

11
Comments
1 min read
How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

18
Comments 7
2 min read
AWS and Messy Git Practices: SecDSM March MiniCTF Solution

AWS and Messy Git Practices: SecDSM March MiniCTF Solution

34
Comments 2
5 min read
Operation FGTNY 🗽 - Solving the H1-212 CTF.

Operation FGTNY 🗽 - Solving the H1-212 CTF.

11
Comments
11 min read
Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

12
Comments
4 min read
An analysis of logic flaws in web-of-trust services

An analysis of logic flaws in web-of-trust services

16
Comments
5 min read
Protect your Node.js app from Cross-Site Request Forgery

Protect your Node.js app from Cross-Site Request Forgery

160
Comments
6 min read
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

12
Comments
3 min read
A House of Cards: An Exploration of Security When Building Docker Containers

A House of Cards: An Exploration of Security When Building Docker Containers

31
Comments 2
10 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

13
Comments
2 min read
loading...