Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cyber security
Cover image for Cyber security

Cyber security

1
Comments
3 min read
Windows Security Alert: Disable Print Spooler

Windows Security Alert: Disable Print Spooler

5
Comments
1 min read
Mobile Security Tips and Best Practices 📱
Cover image for Mobile Security Tips and Best Practices 📱

Mobile Security Tips and Best Practices 📱

8
Comments
4 min read
Kubernetes Hardening Guidance
Cover image for Kubernetes Hardening Guidance

Kubernetes Hardening Guidance

2
Comments 1
1 min read
How To Hide Your .env While You're Livestreaming
Cover image for How To Hide Your .env While You're Livestreaming

How To Hide Your .env While You're Livestreaming

31
Comments 2
1 min read
Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know
Cover image for Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

44
Comments
8 min read
How to write an effective cloud security guideline

How to write an effective cloud security guideline

6
Comments
4 min read
Keeping things safe, using React Router !

Keeping things safe, using React Router !

7
Comments
2 min read
Mobile Security Framework (MobSF) for automated Mobile security testing
Cover image for Mobile Security Framework (MobSF) for automated Mobile security testing

Mobile Security Framework (MobSF) for automated Mobile security testing

12
Comments
2 min read
OpenBSD httpd: Basic authentication with htpasswd

OpenBSD httpd: Basic authentication with htpasswd

7
Comments
1 min read
Security news weekly round-up - 30th July 2021
Cover image for Security news weekly round-up - 30th July 2021

Security news weekly round-up - 30th July 2021

2
Comments
4 min read
Azure DevOps: Limit User Visibility and Collaboration to Specific Projects
Cover image for Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

5
Comments 1
3 min read
Protect Your SignalR Service Based Real-time Application with Application Gateway
Cover image for Protect Your SignalR Service Based Real-time Application with Application Gateway

Protect Your SignalR Service Based Real-time Application with Application Gateway

18
Comments 10
6 min read
Openssl by Example

Openssl by Example

5
Comments
1 min read
Cross-site scripting (XSS) attack - part 3
Cover image for Cross-site scripting (XSS) attack - part 3

Cross-site scripting (XSS) attack - part 3

8
Comments
4 min read
Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts
Cover image for Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

14
Comments
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement
Cover image for JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
Authenticating Event Hubs publishers with SAS Token

Authenticating Event Hubs publishers with SAS Token

6
Comments
4 min read
The 10 most in-demand roles in the Information Security domain
Cover image for The 10 most in-demand roles in the Information Security domain

The 10 most in-demand roles in the Information Security domain

6
Comments
2 min read
Delete all users in an Azure AD Tenant programmatically

Delete all users in an Azure AD Tenant programmatically

8
Comments
4 min read
Delete an Azure AD B2C tenant programmatically

Delete an Azure AD B2C tenant programmatically

8
Comments
2 min read
Let's Make a Security Camera using your smartphone [2021]
Cover image for Let's Make a Security Camera using your smartphone [2021]

Let's Make a Security Camera using your smartphone [2021]

3
Comments 1
1 min read
Who's responsible for securing software?
Cover image for Who's responsible for securing software?

Who's responsible for securing software?

3
Comments
2 min read
AWS: Route53 Private Hosted Zones — hiding domains from the Internet

AWS: Route53 Private Hosted Zones — hiding domains from the Internet

2
Comments
4 min read
Stealthy Code Injection in a Running .NET Process

Stealthy Code Injection in a Running .NET Process

12
Comments
8 min read
loading...