Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

1
Comments 1
6 min read
Who is a Hacker?
Cover image for Who is a Hacker?

Who is a Hacker?

7
Comments 1
8 min read
Lightweight Web Shell Scanner
Cover image for Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

1
Comments
1 min read
The Biggest Crypto Scam in 2024
Cover image for The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments 5
3 min read
5 AI-Powered Content Detectors to Help Identify AI-Generated Text
Cover image for 5 AI-Powered Content Detectors to Help Identify AI-Generated Text

5 AI-Powered Content Detectors to Help Identify AI-Generated Text

4
Comments 2
5 min read
How to optimize BitNinja for weak servers
Cover image for How to optimize BitNinja for weak servers

How to optimize BitNinja for weak servers

6
Comments
5 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! đź”’

IT Security Made Simple: Protecting Your Digital Life Like a Pro! đź”’

1
Comments
2 min read
Top 10 Tips with Code Examples: C# Application Security
Cover image for Top 10 Tips with Code Examples: C# Application Security

Top 10 Tips with Code Examples: C# Application Security

14
Comments 1
8 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

2
Comments
3 min read
Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks
Cover image for Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Comments
5 min read
What happens when a user tries to access a resource in AWS ?
Cover image for What happens when a user tries to access a resource in AWS ?

What happens when a user tries to access a resource in AWS ?

Comments
1 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

33
Comments 6
10 min read
Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

1
Comments
7 min read
API7 Enterprise v3.2.16: Integrated Secret Providers

API7 Enterprise v3.2.16: Integrated Secret Providers

1
Comments
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

3
Comments 1
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.