Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Scrapebase + Permit.io: Web Scraping with Authorization

Scrapebase + Permit.io: Web Scraping with Authorization

152
Comments 26
5 min read
When cert-manager meets Essendi XC
Cover image for When cert-manager meets Essendi XC

When cert-manager meets Essendi XC

1
Comments
5 min read
Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions
Cover image for Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions

Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions

6
Comments
5 min read
02: Create and configure network security groups
Cover image for 02: Create and configure network security groups

02: Create and configure network security groups

6
Comments
3 min read
JSX Curly Braces {} Got Your Back Behind the Scenes

JSX Curly Braces {} Got Your Back Behind the Scenes

1
Comments
2 min read
Exercise 03: Create and configure Azure Firewall
Cover image for Exercise 03: Create and configure Azure Firewall

Exercise 03: Create and configure Azure Firewall

5
Comments
2 min read
🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH
Cover image for 🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH

🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH

1
Comments 1
4 min read
EXPOSED! The Authorization Blind Spot!
Cover image for EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
SkyRulers – AI-Powered Drone Parts Ordering with Fine-Grained Access Control

SkyRulers – AI-Powered Drone Parts Ordering with Fine-Grained Access Control

26
Comments
3 min read
Secure by design in Python: A FastAPI app with 5 DevSecOps tools and a real time SSTI vulnerability remediation

Secure by design in Python: A FastAPI app with 5 DevSecOps tools and a real time SSTI vulnerability remediation

1
Comments
3 min read
The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security
Cover image for The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

1
Comments
5 min read
Linux System Hardening: Essential Security Practices for Servers

Linux System Hardening: Essential Security Practices for Servers

Comments
7 min read
Security news weekly round-up - 9th May 2025
Cover image for Security news weekly round-up - 9th May 2025

Security news weekly round-up - 9th May 2025

1
Comments
4 min read
Smart Doctor: AI-Powered Medical Assistant with Human-in-the-Loop Access Control using Permit.io- Permissions Redefined
Cover image for Smart Doctor: AI-Powered Medical Assistant with Human-in-the-Loop Access Control using Permit.io- Permissions Redefined

Smart Doctor: AI-Powered Medical Assistant with Human-in-the-Loop Access Control using Permit.io- Permissions Redefined

23
Comments 2
4 min read
🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

Comments
12 min read
PEM, DER, PFX, CER, CRT, and CSR for connecting to servers
Cover image for PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

Comments
4 min read
🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

1
Comments
1 min read
AuthClinic: A Unified Access Control Demo for Healthcare Applications
Cover image for AuthClinic: A Unified Access Control Demo for Healthcare Applications

AuthClinic: A Unified Access Control Demo for Healthcare Applications

16
Comments
3 min read
Microsoft Entra ID: Implementing Advanced Rights Management
Cover image for Microsoft Entra ID: Implementing Advanced Rights Management

Microsoft Entra ID: Implementing Advanced Rights Management

Comments
2 min read
Permitron: AI-Powered Task Management with Fine-Grained Permissions
Cover image for Permitron: AI-Powered Task Management with Fine-Grained Permissions

Permitron: AI-Powered Task Management with Fine-Grained Permissions

13
Comments
4 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source
Cover image for The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
How to Generate an AI SBOM, and What Tools to Use
Cover image for How to Generate an AI SBOM, and What Tools to Use

How to Generate an AI SBOM, and What Tools to Use

23
Comments 3
5 min read
Understanding Error Unions in Zig: Safe and Explicit Error Handling
Cover image for Understanding Error Unions in Zig: Safe and Explicit Error Handling

Understanding Error Unions in Zig: Safe and Explicit Error Handling

4
Comments 2
2 min read
HermitAI: Fine-Grained AI Access Control, API-First Auth & Permissions with Permit.io, Astro & Gemini
Cover image for HermitAI: Fine-Grained AI Access Control, API-First Auth & Permissions with Permit.io, Astro & Gemini

HermitAI: Fine-Grained AI Access Control, API-First Auth & Permissions with Permit.io, Astro & Gemini

14
Comments
8 min read
PermiShout: Recreating Twitter with Access Control using Permit.io
Cover image for PermiShout: Recreating Twitter with Access Control using Permit.io

PermiShout: Recreating Twitter with Access Control using Permit.io

28
Comments 3
15 min read
loading...