Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security with Haskell

Security with Haskell

61
Comments 2
2 min read
Computer Security Algorithms package in csharp

Computer Security Algorithms package in csharp

86
Comments
1 min read
Cryptoheist!

Cryptoheist!

37
Comments 5
6 min read
Error messages in login process: Privacy and Security
Cover image for Error messages in login process: Privacy and Security

Error messages in login process: Privacy and Security

11
Comments
3 min read
GDPR Is Making Changes In Tech Data Strategy, Are you ready?

GDPR Is Making Changes In Tech Data Strategy, Are you ready?

18
Comments 10
3 min read
Immutable infrastructure can be dramatically more secure
Cover image for Immutable infrastructure can be dramatically more secure

Immutable infrastructure can be dramatically more secure

19
Comments
3 min read
Breaking bad to make good: Firefox CVE-2017–7843

Breaking bad to make good: Firefox CVE-2017–7843

29
Comments
3 min read
Kristina Balaam on Breaking in to Security

Kristina Balaam on Breaking in to Security

91
Comments
5 min read
NMandelbrot : running arbitrary code on client

NMandelbrot : running arbitrary code on client

8
Comments
2 min read
Everything you need to know about Linux Logs

Everything you need to know about Linux Logs

17
Comments
1 min read
WebAuthn: A Developer's Guide to What's on the Horizon

WebAuthn: A Developer's Guide to What's on the Horizon

9
Comments
3 min read
How do you save your secret keys on Android Development securely?

How do you save your secret keys on Android Development securely?

8
Comments 4
1 min read
Check Your Passwords for Pwnage - The Pythonic Way
Cover image for Check Your Passwords for Pwnage - The Pythonic Way

Check Your Passwords for Pwnage - The Pythonic Way

35
Comments 3
2 min read
Web Developer Security Checklist V1
Cover image for Web Developer Security Checklist V1

Web Developer Security Checklist V1

310
Comments 12
5 min read
Automating your reconnaissance workflow with meg
Cover image for  Automating your reconnaissance workflow with meg

Automating your reconnaissance workflow with meg

22
Comments
3 min read
RESTful Security: Plug the Leaks!

RESTful Security: Plug the Leaks!

74
Comments 11
2 min read
Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky

Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky

151
Comments 2
5 min read
The Fundamentals of Security Every Developer Should Understand
Cover image for The Fundamentals of Security Every Developer Should Understand

The Fundamentals of Security Every Developer Should Understand

332
Comments 9
1 min read
How to DOS Yourself With Argon2

How to DOS Yourself With Argon2

15
Comments
3 min read
What is the OAuth 2.0 Authorization Code Grant Type?

What is the OAuth 2.0 Authorization Code Grant Type?

13
Comments
5 min read
What's the big deal with privacy?

What's the big deal with privacy?

26
Comments 21
1 min read
What are some fundamentals of security every developer should understand?

What are some fundamentals of security every developer should understand?

195
Comments 47
1 min read
Better passwords in Ruby applications with the Pwned Passwords API
Cover image for Better passwords in Ruby applications with the Pwned Passwords API

Better passwords in Ruby applications with the Pwned Passwords API

108
Comments 8
6 min read
A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation

A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation

7
Comments
6 min read
Beefing Up Your Spring Security with Two-Factor Authentication

Beefing Up Your Spring Security with Two-Factor Authentication

18
Comments 1
10 min read
loading...