Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Your API Needs Rate Limiting (And How to Do It Right)
Cover image for Why Your API Needs Rate Limiting (And How to Do It Right)

Why Your API Needs Rate Limiting (And How to Do It Right)

13
Comments
3 min read
How One Line of Code Almost Cost My Client Their OpenAI Credits
Cover image for How One Line of Code Almost Cost My Client Their OpenAI Credits

How One Line of Code Almost Cost My Client Their OpenAI Credits

1
Comments
2 min read
What Are Preflight Requests and Why They Matter

What Are Preflight Requests and Why They Matter

2
Comments 2
4 min read
Remove Internet Junk from Ground Up: A DNS-Based Approach
Cover image for Remove Internet Junk from Ground Up: A DNS-Based Approach

Remove Internet Junk from Ground Up: A DNS-Based Approach

Comments
3 min read
Using rate limits and JA4 fingerprinting in AWS WAF
Cover image for Using rate limits and JA4 fingerprinting in AWS WAF

Using rate limits and JA4 fingerprinting in AWS WAF

7
Comments
7 min read
DEK-KEK the industry standard to protect highly sensitive data (Part 1)
Cover image for DEK-KEK the industry standard to protect highly sensitive data (Part 1)

DEK-KEK the industry standard to protect highly sensitive data (Part 1)

1
Comments 3
6 min read
Reset Windows 10/11 Password Without USB or Reinstall

Reset Windows 10/11 Password Without USB or Reinstall

4
Comments
3 min read
Puppet Core 8.14 Released with Critical Security Patches and AI-powered Doc Search
Cover image for Puppet Core 8.14 Released with Critical Security Patches and AI-powered Doc Search

Puppet Core 8.14 Released with Critical Security Patches and AI-powered Doc Search

Comments
2 min read
IAM security: from fundamentals to advanced protection (Best practices 2025)
Cover image for IAM security: from fundamentals to advanced protection (Best practices 2025)

IAM security: from fundamentals to advanced protection (Best practices 2025)

1
Comments
5 min read
⚙️ Go Tools: Password Hashing with Argon2 Instead of bcrypt
Cover image for ⚙️ Go Tools: Password Hashing with Argon2 Instead of bcrypt

⚙️ Go Tools: Password Hashing with Argon2 Instead of bcrypt

2
Comments
4 min read
How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.
Cover image for How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

6
Comments 8
7 min read
I rolled my own auth

I rolled my own auth

4
Comments 2
1 min read
Laravel Vulnerability Scanner – Scan for CVEs, .env, SQLi, and More

Laravel Vulnerability Scanner – Scan for CVEs, .env, SQLi, and More

2
Comments
1 min read
SSH Authentication Key Rotation: Why and How to Expire SSH Keys
Cover image for SSH Authentication Key Rotation: Why and How to Expire SSH Keys

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

8
Comments
4 min read
The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)
Cover image for The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

11
Comments 2
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.