Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
websecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Configure SafeLine WAF to Correctly Obtain the Source IP
Carrie
Carrie
Carrie
Follow
Oct 16 '24
How to Configure SafeLine WAF to Correctly Obtain the Source IP
#
cybersecurity
#
opensource
#
websecurity
12
reactions
Comments
Add Comment
3 min read
The Significance of Website Hacking
Carrie
Carrie
Carrie
Follow
Oct 15 '24
The Significance of Website Hacking
#
websecurity
#
cybersecurity
11
reactions
Comments
Add Comment
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests
Carrie
Carrie
Carrie
Follow
Oct 14 '24
Understanding How an Open Source WAF Monitor HTTP Requests
#
webdev
#
cybersecurity
#
websecurity
#
opensource
11
reactions
Comments
Add Comment
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine
Carrie
Carrie
Carrie
Follow
Oct 14 '24
Demystifying the Technology Architecture of Open Source WAF, SafeLine
#
cybersecurity
#
opensource
#
websecurity
#
webdev
10
reactions
Comments
Add Comment
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)
Carrie
Carrie
Carrie
Follow
Oct 11 '24
Deploying High Availability SafeLine WAF on K3s(Part 4)
#
kubernetes
#
opensource
#
websecurity
#
cybersecurity
17
reactions
Comments
Add Comment
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 10 '24
How to Prevent Brute Force Attacks with SafeLine WAF
#
bruteforce
#
cybersecurity
#
beginners
#
websecurity
14
reactions
Comments
Add Comment
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
Carrie
Carrie
Carrie
Follow
Oct 9 '24
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
#
cybersecurity
#
docker
#
linux
#
websecurity
18
reactions
Comments
Add Comment
3 min read
The Ultimate Guide to Understanding Web Application Authentication
Carrie
Carrie
Carrie
Follow
Oct 9 '24
The Ultimate Guide to Understanding Web Application Authentication
#
authentication
#
webapplication
#
cybersecurity
#
websecurity
18
reactions
Comments
Add Comment
3 min read
The Beginner's Guide to Install and Deploy SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 8 '24
The Beginner's Guide to Install and Deploy SafeLine WAF
#
cybersecurity
#
websecurity
#
beginners
#
opensource
10
reactions
Comments
Add Comment
3 min read
Open Source Tool List for Web App Security
Carrie
Carrie
Carrie
Follow
Oct 6 '24
Open Source Tool List for Web App Security
#
webdev
#
cybersecurity
#
beginners
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure PHP Applications from SQL Injection Attacks
Dhaval Upadhyay
Dhaval Upadhyay
Dhaval Upadhyay
Follow
Oct 6 '24
How to Secure PHP Applications from SQL Injection Attacks
#
websecurity
#
sql
#
programming
#
security
3
reactions
Comments
Add Comment
3 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
Haque.
Haque.
Haque.
Follow
Aug 27 '24
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
#
websecurity
#
webdev
#
cybersecurity
#
devtips
Comments
Add Comment
3 min read
Load Balancing with Reverse Proxy
Carrie
Carrie
Carrie
Follow
Sep 28 '24
Load Balancing with Reverse Proxy
#
cybersecurity
#
webdev
#
websecurity
#
beginners
2
reactions
Comments
Add Comment
3 min read
Addressing Arbitrary Input with SafeLine
Carrie
Carrie
Carrie
Follow
Oct 8 '24
Addressing Arbitrary Input with SafeLine
#
cybersecurity
#
webdev
#
beginners
#
websecurity
1
reaction
Comments
1
comment
3 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
Carrie
Carrie
Carrie
Follow
Sep 19 '24
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
#
webdev
#
cybersecurity
#
websecurity
6
reactions
Comments
Add Comment
2 min read
Five Free WAF Performance Comparison
Carrie
Carrie
Carrie
Follow
Sep 19 '24
Five Free WAF Performance Comparison
#
cybersecurity
#
webdev
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure OpenResty with a Free WAF
Carrie
Carrie
Carrie
Follow
Sep 19 '24
How to Secure OpenResty with a Free WAF
#
websecurity
#
webapplicationfirewall
#
opensource
#
nginx
12
reactions
Comments
Add Comment
3 min read
5 Best Free and Open Source WAF for 2025
Carrie
Carrie
Carrie
Follow
Sep 18 '24
5 Best Free and Open Source WAF for 2025
#
websecurity
#
webapplicationfirewall
#
beginners
#
opensource
20
reactions
Comments
Add Comment
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
Sachin Gadekar
Sachin Gadekar
Sachin Gadekar
Follow
Sep 17 '24
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
#
ssl
#
security
#
websecurity
#
webdev
2
reactions
Comments
1
comment
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31 '24
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 27 '24
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
#
node
#
webdev
#
backend
#
websecurity
1
reaction
Comments
Add Comment
5 min read
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 25 '24
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
#
node
#
websecurity
#
webdev
#
javascript
4
reactions
Comments
Add Comment
7 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
Lulu
Lulu
Lulu
Follow
Aug 2 '24
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
#
opensource
#
github
#
cybersecurity
#
websecurity
14
reactions
Comments
Add Comment
2 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 20 '24
Protect JWT Token from Token Forgery and Data Manipulation Attack
#
javascript
#
websecurity
#
jwt
#
apisecurity
1
reaction
Comments
Add Comment
3 min read
Preventing Weak Cryptography in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 26 '24
Preventing Weak Cryptography in JavaScript
#
javascript
#
websecurity
#
cryptography
#
encryption
Comments
Add Comment
3 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account