Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Steganography: How Defenders Face Hidden Data

Cybersecurity Steganography: How Defenders Face Hidden Data

Comments
3 min read
How Simple IDs Can Leak Your Secrets

How Simple IDs Can Leak Your Secrets

Comments
3 min read
How to protect Express routes in Node.js
Cover image for How to protect Express routes in Node.js

How to protect Express routes in Node.js

2
Comments
4 min read
A simple way to encrypt sensitive data using python

A simple way to encrypt sensitive data using python

Comments
1 min read
Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core

Comments
4 min read
Signal Private Messenger Crypto Algorithm Double to Triple

Signal Private Messenger Crypto Algorithm Double to Triple

5
Comments
4 min read
Configuring Users and Permissions on Linux and Windows: A Complete Guide

Configuring Users and Permissions on Linux and Windows: A Complete Guide

Comments
6 min read
Protect Your Software Supply Chain with SBOMs – Security and Compliance

Protect Your Software Supply Chain with SBOMs – Security and Compliance

Comments
6 min read
🔒 Encapsulation in Java: Building Code That Protects Itself

🔒 Encapsulation in Java: Building Code That Protects Itself

Comments
3 min read
Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.
Cover image for Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

Bridging Cloud and On-Prem: Running On-Prem Jobs from Apache Airflow in AWS using ssh-rsa key pair.

6
Comments
11 min read
Caddy, self-signed certificates and Certificate Authorities for web development

Caddy, self-signed certificates and Certificate Authorities for web development

Comments
3 min read
From Setup to Role-Based Access — Building a Platform for Two Worlds

From Setup to Role-Based Access — Building a Platform for Two Worlds

Comments
1 min read
Check a list of IP addresses for proxies using IP2Proxy Dart

Check a list of IP addresses for proxies using IP2Proxy Dart

Comments
5 min read
Azure Landing Zone

Azure Landing Zone

2
Comments 2
14 min read
Making Authentication Seamless: How SSO Works in Modern Systems
Cover image for Making Authentication Seamless: How SSO Works in Modern Systems

Making Authentication Seamless: How SSO Works in Modern Systems

Comments
3 min read
Math.random, friend or foe?
Cover image for Math.random, friend or foe?

Math.random, friend or foe?

8
Comments 4
5 min read
🧵 Understanding L1s, L2s, and Rollups

🧵 Understanding L1s, L2s, and Rollups

1
Comments
2 min read
Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Unlocking Privacy: The Role of Zero-Knowledge Proofs in AI

Comments
3 min read
Templating with Go's html/template and text/template

Templating with Go's html/template and text/template

1
Comments 1
5 min read
Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive
Cover image for Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Audits Decoded: Your Guide to Not Panicking When the Clipboard People Arrive

Comments
3 min read
How to send OTP codes with SMS in Node.js
Cover image for How to send OTP codes with SMS in Node.js

How to send OTP codes with SMS in Node.js

1
Comments
2 min read
How to use Okta to remotely authenticate to your BigQuery MCP Server

How to use Okta to remotely authenticate to your BigQuery MCP Server

4
Comments
6 min read
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes
Cover image for Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

4
Comments
9 min read
Cloud Architects are Movie Directors: An OCI IAM Story
Cover image for Cloud Architects are Movie Directors: An OCI IAM Story

Cloud Architects are Movie Directors: An OCI IAM Story

Comments
6 min read
How to Create a One-Time Payment Link and Secure Webhook Integration with Stripe
Cover image for How to Create a One-Time Payment Link and Secure Webhook Integration with Stripe

How to Create a One-Time Payment Link and Secure Webhook Integration with Stripe

1
Comments
3 min read
loading...