Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Aisuru Botnet: Deep Dive into Its Evolving Threat Landscape

Aisuru Botnet: Deep Dive into Its Evolving Threat Landscape

Comments
7 min read
🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

Comments
3 min read
Tor: Anonymity Shield or Privacy Illusion?

Tor: Anonymity Shield or Privacy Illusion?

Comments
6 min read
Security by Design: A Guide to Building Secure Software

Security by Design: A Guide to Building Secure Software

Comments
8 min read
NTP: The Unsung Hero of Internet Time Synchronization

NTP: The Unsung Hero of Internet Time Synchronization

Comments
9 min read
Spring Security Flow

Spring Security Flow

Comments
1 min read
Serverless Student Management System (AWS)
Cover image for Serverless Student Management System (AWS)

Serverless Student Management System (AWS)

1
Comments
2 min read
OSI Layer 4 Security Vulnerabilities & Resolutions
Cover image for OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
A Guide to Production-Ready Security, Logging and Architecture in the express app

A Guide to Production-Ready Security, Logging and Architecture in the express app

Comments
4 min read
Human vs. Machine Cognition: Brains, Minds, and Meaning
Cover image for Human vs. Machine Cognition: Brains, Minds, and Meaning

Human vs. Machine Cognition: Brains, Minds, and Meaning

Comments
3 min read
RaaS: The Evolution of Cybercrime-as-a-Service

RaaS: The Evolution of Cybercrime-as-a-Service

Comments
5 min read
The Hard Truth About Random Number Generation

The Hard Truth About Random Number Generation

Comments
7 min read
IoT Security: Addressing the Gaping Vulnerability

IoT Security: Addressing the Gaping Vulnerability

Comments
8 min read
Windows vs. Linux: Ultimate Secure Desktop Battle

Windows vs. Linux: Ultimate Secure Desktop Battle

Comments
8 min read
Golden Images: A Security Powerhouse

Golden Images: A Security Powerhouse

Comments
6 min read
Legacy Insecure Protocols: A Guide to Modern Risks

Legacy Insecure Protocols: A Guide to Modern Risks

Comments
8 min read
IPSec Explained: Securing Network Communications

IPSec Explained: Securing Network Communications

Comments
8 min read
Mullvad's DAITA: Shielding Against AI Traffic Analysis

Mullvad's DAITA: Shielding Against AI Traffic Analysis

Comments
6 min read
WireGuard Explained: A Deep Dive into Modern VPN Technology

WireGuard Explained: A Deep Dive into Modern VPN Technology

Comments
6 min read
"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome
Cover image for "Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

Comments
2 min read
Snapchat Privacy: Deconstructing Its Ephemeral Promises

Snapchat Privacy: Deconstructing Its Ephemeral Promises

Comments
7 min read
WhisperLeak: Unmasking LLM Conversation Topics

WhisperLeak: Unmasking LLM Conversation Topics

Comments
7 min read
Android vs. iOS: Which is Easier for App Development?

Android vs. iOS: Which is Easier for App Development?

Comments
8 min read
Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research
Cover image for Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Comments
2 min read
How Bluetooth Works: A Technical Deep Dive

How Bluetooth Works: A Technical Deep Dive

Comments
6 min read
loading...