Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Handling JWT in Admin Apps the Right Way
Cover image for Handling JWT in Admin Apps the Right Way

Handling JWT in Admin Apps the Right Way

11
Comments
10 min read
How to Think About JavaScript Security

How to Think About JavaScript Security

22
Comments
3 min read
Drops #01: Corrigindo vulnerabilidades em dependências com Yarn! (ou quase)
Cover image for Drops #01: Corrigindo vulnerabilidades em dependências com Yarn! (ou quase)

Drops #01: Corrigindo vulnerabilidades em dependências com Yarn! (ou quase)

12
Comments
3 min read
Network Security- Terminology

Network Security- Terminology

10
Comments 2
3 min read
Make yourself rich by hacking this juice shop 💵
Cover image for Make yourself rich by hacking this juice shop 💵

Make yourself rich by hacking this juice shop 💵

48
Comments
3 min read
Why anti-encryption laws are crazy
Cover image for Why anti-encryption laws are crazy

Why anti-encryption laws are crazy

68
Comments 8
4 min read
Why not to create db asset from code

Why not to create db asset from code

3
Comments 3
1 min read
Hardening your server security with Fail2Ban
Cover image for Hardening your server security with Fail2Ban

Hardening your server security with Fail2Ban

15
Comments
6 min read
DevSecOps - Mass Assignment

DevSecOps - Mass Assignment

10
Comments
6 min read
Kendimize özel VPN kurulumu 🇹🇷

Kendimize özel VPN kurulumu 🇹🇷

7
Comments
5 min read
Email Security and Privacy
Cover image for Email Security and Privacy

Email Security and Privacy

8
Comments 7
2 min read
The Impact of Cross-Site Scripting Vulnerabilities and their Prevention
Cover image for The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

6
Comments
7 min read
Infrastructure-as-code security 101
Cover image for Infrastructure-as-code security 101

Infrastructure-as-code security 101

7
Comments
5 min read
Managed Identity - How it works behind the scenes
Cover image for Managed Identity - How it works behind the scenes

Managed Identity - How it works behind the scenes

24
Comments 3
5 min read
I was emailed after abandoning a registration form. I did not click Submit. This is not ok.
Cover image for I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

466
Comments 112
3 min read
White Box and Black Box Testing: Outlining the Difference Between Them
Cover image for White Box and Black Box Testing: Outlining the Difference Between Them

White Box and Black Box Testing: Outlining the Difference Between Them

13
Comments
7 min read
How to Block IP Addresses in WordPress?
Cover image for How to Block IP Addresses in WordPress?

How to Block IP Addresses in WordPress?

7
Comments
9 min read
SSL/TLS Handshake Failed Errors — Its Types and Learning How to Fix Them

SSL/TLS Handshake Failed Errors — Its Types and Learning How to Fix Them

2
Comments
6 min read
How can you find the most Secure Web Hosting

How can you find the most Secure Web Hosting

3
Comments 1
2 min read
rails 6: Prevents logging sensitive info accidentally

rails 6: Prevents logging sensitive info accidentally

12
Comments
2 min read
Zooming in on Zoom
Cover image for Zooming in on Zoom

Zooming in on Zoom

32
Comments
3 min read
Detecting Attackers from Within

Detecting Attackers from Within

7
Comments
6 min read
How to enable T.L.S 1.2 in R-Serve
Cover image for How to enable T.L.S 1.2 in R-Serve

How to enable T.L.S 1.2 in R-Serve

9
Comments
2 min read
How To Prevent Data Tampering In Your Business
Cover image for How To Prevent Data Tampering In Your Business

How To Prevent Data Tampering In Your Business

7
Comments
6 min read
Web Sockets Everywhere!

Web Sockets Everywhere!

15
Comments
3 min read
loading...