Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Math.random, friend or foe?
Cover image for Math.random, friend or foe?

Math.random, friend or foe?

9
Comments 4
5 min read
How Simple IDs Can Leak Your Secrets

How Simple IDs Can Leak Your Secrets

Comments
3 min read
How to protect Express routes in Node.js
Cover image for How to protect Express routes in Node.js

How to protect Express routes in Node.js

2
Comments
4 min read
A simple way to encrypt sensitive data using python

A simple way to encrypt sensitive data using python

Comments
1 min read
Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Comments
4 min read
Signal Private Messenger Crypto Algorithm Double to Triple

Signal Private Messenger Crypto Algorithm Double to Triple

5
Comments
4 min read
Configuring Users and Permissions on Linux and Windows: A Complete Guide

Configuring Users and Permissions on Linux and Windows: A Complete Guide

Comments
6 min read
Protect Your Software Supply Chain with SBOMs – Security and Compliance

Protect Your Software Supply Chain with SBOMs – Security and Compliance

Comments
6 min read
đź”’ Encapsulation in Java: Building Code That Protects Itself

đź”’ Encapsulation in Java: Building Code That Protects Itself

Comments
3 min read
Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.
Cover image for Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

5
Comments
11 min read
Why Enterprise Application Governance is the Next Frontier in SaaS Management

Why Enterprise Application Governance is the Next Frontier in SaaS Management

Comments 1
1 min read
Caddy, self-signed certificates and Certificate Authorities for web development

Caddy, self-signed certificates and Certificate Authorities for web development

1
Comments
3 min read
From Setup to Role-Based Access — Building a Platform for Two Worlds

From Setup to Role-Based Access — Building a Platform for Two Worlds

Comments
1 min read
Check a list of IP addresses for proxies using IP2Proxy Dart

Check a list of IP addresses for proxies using IP2Proxy Dart

Comments
5 min read
Azure Landing Zone

Azure Landing Zone

2
Comments 2
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.