Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building an Experimental eBPF Firewall in Rust (XDP + Heuristic Risk Scoring)

Building an Experimental eBPF Firewall in Rust (XDP + Heuristic Risk Scoring)

Comments
1 min read
How I Finally Fixed My .gitignore (and Ended Up Writing an Extension)
Cover image for How I Finally Fixed My .gitignore (and Ended Up Writing an Extension)

How I Finally Fixed My .gitignore (and Ended Up Writing an Extension)

5
Comments 2
1 min read
Deconstructing a Production-Ready AI Agent: A Beginner's Guide - Part 3

Deconstructing a Production-Ready AI Agent: A Beginner's Guide - Part 3

Comments
5 min read
Building a Password Strength Analyzer with Entropy and Crack Time for Beginners
Cover image for Building a Password Strength Analyzer with Entropy and Crack Time for Beginners

Building a Password Strength Analyzer with Entropy and Crack Time for Beginners

Comments
5 min read
Zurich Insurance Group: Building an Effective Log Management Solution on AWS

Zurich Insurance Group: Building an Effective Log Management Solution on AWS

Comments
6 min read
Pebble's Open Source Revival: A Guide to Its Enduring Legacy

Pebble's Open Source Revival: A Guide to Its Enduring Legacy

Comments
7 min read
AWS Policy Deep Dive
Cover image for AWS Policy Deep Dive

AWS Policy Deep Dive

Comments
3 min read
🛠️ Devs, check this out: automatic frontend hosting + proxying inside TEEs
Cover image for 🛠️ Devs, check this out: automatic frontend hosting + proxying inside TEEs

🛠️ Devs, check this out: automatic frontend hosting + proxying inside TEEs

2
Comments 2
1 min read
Matrix Protocol: Decentralized, Secure Communication Guide

Matrix Protocol: Decentralized, Secure Communication Guide

Comments
9 min read
How to Implement Content Security Policy in Nuxt
Cover image for How to Implement Content Security Policy in Nuxt

How to Implement Content Security Policy in Nuxt

3
Comments
3 min read
Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Comments
18 min read
AI Camouflage: Clothing That Breaks the Algorithm

AI Camouflage: Clothing That Breaks the Algorithm

Comments
2 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

4
Comments
4 min read
New winaudit crate designed for Windows Security Assessment | Audit.

New winaudit crate designed for Windows Security Assessment | Audit.

Comments
1 min read
How I Reverse-Engineered Perplexity’s Referral Signup
Cover image for How I Reverse-Engineered Perplexity’s Referral Signup

How I Reverse-Engineered Perplexity’s Referral Signup

Comments
6 min read
ICYMI - pre:Invent announcements 2025
Cover image for ICYMI - pre:Invent announcements 2025

ICYMI - pre:Invent announcements 2025

Comments
10 min read
Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Comments
1 min read
Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

1
Comments
2 min read
Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds
Cover image for Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Comments
1 min read
Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

1
Comments
2 min read
A importância de gerenciar corretamente variáveis de ambiente (.env)

A importância de gerenciar corretamente variáveis de ambiente (.env)

Comments
3 min read
RDAP: The Modern Successor to WHOIS

RDAP: The Modern Successor to WHOIS

Comments
7 min read
Key Lessons From the Bitcoin Whitepaper

Key Lessons From the Bitcoin Whitepaper

Comments
3 min read
Why the Directory Is the Core of IAM: The Digital Heartbeat of Every Organization

Why the Directory Is the Core of IAM: The Digital Heartbeat of Every Organization

Comments
3 min read
Designing RBAC for AI agents

Designing RBAC for AI agents

Comments
13 min read
loading...