Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Otimizando Wordlists para Pentests
Cover image for Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

14
Comments
7 min read
Training data poisoning to get what you want in LLMs, A Question

Training data poisoning to get what you want in LLMs, A Question

Comments
2 min read
Secure your API with these 16 Practices with Apache APISIX - part 2
Cover image for Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

26
Comments
3 min read
Dynamic AWS IAM Policies

Dynamic AWS IAM Policies

Comments
4 min read
Understanding How NGINX and HAProxy Improve Response Times (DDoS Testing)

Understanding How NGINX and HAProxy Improve Response Times (DDoS Testing)

Comments
1 min read
Proxy VS Reverse Proxy
Cover image for Proxy VS Reverse Proxy

Proxy VS Reverse Proxy

15
Comments 6
4 min read
Transfer contents and files using SCP from remote to local machine via bastion

Transfer contents and files using SCP from remote to local machine via bastion

8
Comments
2 min read
Auditing AWS EKS Pod Permissions
Cover image for Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

6
Comments
8 min read
The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age
Cover image for The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

Comments
3 min read
How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer
Cover image for How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

1
Comments
5 min read
Using WordPress Nonces
Cover image for Using WordPress Nonces

Using WordPress Nonces

Comments
4 min read
Writing a Network Scanner using Python
Cover image for Writing a Network Scanner using Python

Writing a Network Scanner using Python

78
Comments 3
12 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

5
Comments
2 min read
Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)
Cover image for Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

18
Comments
8 min read
Building a Simple Spy Camera with Python
Cover image for Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

17
Comments 6
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.