Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Run AI Models Privately on Your AI PC with Model HQ; No Cloud, No Code
Cover image for How to Run AI Models Privately on Your AI PC with Model HQ; No Cloud, No Code

How to Run AI Models Privately on Your AI PC with Model HQ; No Cloud, No Code

80
Comments 17
5 min read
Configure secure access to your workloads using Azure networking
Cover image for Configure secure access to your workloads using Azure networking

Configure secure access to your workloads using Azure networking

1
Comments 1
13 min read
Implementing OAuth for Secure and Scalable API Access Control
Cover image for Implementing OAuth for Secure and Scalable API Access Control

Implementing OAuth for Secure and Scalable API Access Control

Comments
5 min read
Locking the Gate: Secure and Scalable API Authentication in Phoenix
Cover image for Locking the Gate: Secure and Scalable API Authentication in Phoenix

Locking the Gate: Secure and Scalable API Authentication in Phoenix

1
Comments
3 min read
Kyverno: Seu aliado ideal para governança e políticas no Kubernetes
Cover image for Kyverno: Seu aliado ideal para governança e políticas no Kubernetes

Kyverno: Seu aliado ideal para governança e políticas no Kubernetes

Comments
3 min read
AI and the new era of credentials theft

AI and the new era of credentials theft

Comments
4 min read
100DaysOfCode — Day 14

100DaysOfCode — Day 14

Comments
1 min read
Did you know what DevOps Security (DS) is ??
Cover image for Did you know what DevOps Security (DS) is ??

Did you know what DevOps Security (DS) is ??

Comments 1
1 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set": frame-ancestors directive and frame-src directive

Security - Solving the "Content Security Policy (CSP) Header Not Set": frame-ancestors directive and frame-src directive

1
Comments 1
1 min read
Simple Gas Optimization Techniques Every Ethereum Developer Should Know

Simple Gas Optimization Techniques Every Ethereum Developer Should Know

11
Comments
3 min read
HOW TO BUILD AND SECURE A SECURE FLASK LOGIN SYSTEM
Cover image for HOW TO BUILD AND SECURE A SECURE FLASK LOGIN SYSTEM

HOW TO BUILD AND SECURE A SECURE FLASK LOGIN SYSTEM

Comments 1
2 min read
What is rate limiting & why it matters

What is rate limiting & why it matters

6
Comments
2 min read
IP & Mac Address
Cover image for IP & Mac Address

IP & Mac Address

Comments 1
1 min read
Made a simple API to block fake users (temp emails, VPNs, temp phones)
Cover image for Made a simple API to block fake users (temp emails, VPNs, temp phones)

Made a simple API to block fake users (temp emails, VPNs, temp phones)

1
Comments 1
1 min read
Implement Rate Limiting in ASP.NET Core [.NET9]
Cover image for Implement Rate Limiting in ASP.NET Core [.NET9]

Implement Rate Limiting in ASP.NET Core [.NET9]

11
Comments 7
4 min read
A Developer's Guide to Surviving Meta's Broken App Review Process
Cover image for A Developer's Guide to Surviving Meta's Broken App Review Process

A Developer's Guide to Surviving Meta's Broken App Review Process

1
Comments 1
4 min read
WAF Checker: A Simple Web Tool for Testing Your Web Application Firewall
Cover image for WAF Checker: A Simple Web Tool for Testing Your Web Application Firewall

WAF Checker: A Simple Web Tool for Testing Your Web Application Firewall

Comments
1 min read
Encrypted Chat Application with web option

Encrypted Chat Application with web option

Comments
1 min read
Behind the Fake CAPTCHA: How We Fought Back Against Platform Abuse

Behind the Fake CAPTCHA: How We Fought Back Against Platform Abuse

Comments
11 min read
See what scira.ai searched for me
Cover image for See what scira.ai searched for me

See what scira.ai searched for me

Comments 1
3 min read
LLM Framework Vulns Exposed: Learnings from CVEs

LLM Framework Vulns Exposed: Learnings from CVEs

6
Comments
11 min read
Securing $1 Downloads in Emerging Markets
Cover image for Securing $1 Downloads in Emerging Markets

Securing $1 Downloads in Emerging Markets

Comments
7 min read
Se protéger du phishing et du spam : pourquoi j’ai créé ma propre app de mails temporaires

Se protéger du phishing et du spam : pourquoi j’ai créé ma propre app de mails temporaires

Comments
2 min read
Effortless Token Refresh in React Using Axios Interceptors
Cover image for Effortless Token Refresh in React Using Axios Interceptors

Effortless Token Refresh in React Using Axios Interceptors

1
Comments
3 min read
CISA: Real-world Information Systems Auditing
Cover image for CISA: Real-world Information Systems Auditing

CISA: Real-world Information Systems Auditing

Comments
2 min read
loading...