Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your Slow Website is a Legal Risk: Why Technical Debt is Now a Liability
Cover image for Your Slow Website is a Legal Risk: Why Technical Debt is Now a Liability

Your Slow Website is a Legal Risk: Why Technical Debt is Now a Liability

Comments
4 min read
What Happens When You Type a URL in Your Browser?

What Happens When You Type a URL in Your Browser?

1
Comments 1
3 min read
The admiral just quoted our thesis on the Senate floor

The admiral just quoted our thesis on the Senate floor

Comments
3 min read
KIOKU v0.5.0 + v0.5.1 — unified ingest router + hot cache, shipped same day
Cover image for KIOKU v0.5.0 + v0.5.1 — unified ingest router + hot cache, shipped same day

KIOKU v0.5.0 + v0.5.1 — unified ingest router + hot cache, shipped same day

Comments
9 min read
Gatekeeping Your Software
Cover image for Gatekeeping Your Software

Gatekeeping Your Software

2
Comments
5 min read
Building Scync: Why I made a Zero-Knowledge Secrets Manager for us, Developers.
Cover image for Building Scync: Why I made a Zero-Knowledge Secrets Manager for us, Developers.

Building Scync: Why I made a Zero-Knowledge Secrets Manager for us, Developers.

8
Comments 1
7 min read
3 Ways Your AI Agent Can Alert You: Push, Telegram, and WalletConnect Notifications
Cover image for 3 Ways Your AI Agent Can Alert You: Push, Telegram, and WalletConnect Notifications

3 Ways Your AI Agent Can Alert You: Push, Telegram, and WalletConnect Notifications

Comments
4 min read
The state of PrestaShop stores in 2026: what we learned scanning 130 of them
Cover image for The state of PrestaShop stores in 2026: what we learned scanning 130 of them

The state of PrestaShop stores in 2026: what we learned scanning 130 of them

Comments
6 min read
Remote Server Monitoring over VPN: A Docker Approach (Part 2)
Cover image for Remote Server Monitoring over VPN: A Docker Approach (Part 2)

Remote Server Monitoring over VPN: A Docker Approach (Part 2)

Comments
4 min read
Deploy a Private Website with Cloudflare Zero Trust and Terraform
Cover image for Deploy a Private Website with Cloudflare Zero Trust and Terraform

Deploy a Private Website with Cloudflare Zero Trust and Terraform

Comments
2 min read
OpenMythos Teardown: Dissecting the Open-Source Reconstruction of Claude Mythos
Cover image for OpenMythos Teardown: Dissecting the Open-Source Reconstruction of Claude Mythos

OpenMythos Teardown: Dissecting the Open-Source Reconstruction of Claude Mythos

Comments
14 min read
Segurança em nuvem na prática: o que aprendi sobre misconfiguration com Datadog

Segurança em nuvem na prática: o que aprendi sobre misconfiguration com Datadog

Comments
4 min read
GHSA-RHF7-WVW3-VJVM: GHSA-RHF7-WVW3-VJVM: Cross-Origin Arbitrary File Write via Missing CSRF Protection in goshs

GHSA-RHF7-WVW3-VJVM: GHSA-RHF7-WVW3-VJVM: Cross-Origin Arbitrary File Write via Missing CSRF Protection in goshs

Comments
2 min read
MD5, SHA-1, SHA-256, SHA-512: Which Hash Algorithm Should You Actually Use?

MD5, SHA-1, SHA-256, SHA-512: Which Hash Algorithm Should You Actually Use?

Comments
4 min read
Sovereign AI – Why Your Agents Should Run on Your Hardware

Sovereign AI – Why Your Agents Should Run on Your Hardware

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.