Forem

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Angular Security Best Practices: Are You Protecting Your App the Right Way?

🔐 Angular Security Best Practices: Are You Protecting Your App the Right Way?

5
Comments
2 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences
Cover image for The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

6
Comments
4 min read
Common PHP Security Issues and How to Prevent Them

Common PHP Security Issues and How to Prevent Them

Comments
5 min read
Hashing

Hashing

20
Comments
1 min read
How PHP Session Management Works and How to Handle Session Security

How PHP Session Management Works and How to Handle Session Security

Comments
5 min read
Best Practices for Secure File Uploads in PHP: Preventing Common Vulnerabilities

Best Practices for Secure File Uploads in PHP: Preventing Common Vulnerabilities

Comments
4 min read
Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript

Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript

Comments
4 min read
Comprehensive Guide to Cookies in JavaScript

Comprehensive Guide to Cookies in JavaScript

Comments
3 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
How to Select a WAF for New Webmasters(Part 1)

How to Select a WAF for New Webmasters(Part 1)

7
Comments
4 min read
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒

The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒

1
Comments
4 min read
Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy

Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy

6
Comments
5 min read
SSRF Attacks: The Silent Threat Hiding in Your Server

SSRF Attacks: The Silent Threat Hiding in Your Server

1
Comments
1 min read
OAuth and OpenID Connect: Protecting User Authentication Properly
Cover image for OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks
Cover image for Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Comments
5 min read
Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks
Cover image for Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks

Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks

1
Comments
2 min read
Authentication and Authorization Techniques in Modern Web Applications
Cover image for Authentication and Authorization Techniques in Modern Web Applications

Authentication and Authorization Techniques in Modern Web Applications

6
Comments
4 min read
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks
Cover image for Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks

Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks

1
Comments
4 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

12
Comments
3 min read
The Significance of Website Hacking

The Significance of Website Hacking

11
Comments
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests

Understanding How an Open Source WAF Monitor HTTP Requests

11
Comments
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine

Demystifying the Technology Architecture of Open Source WAF, SafeLine

10
Comments
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)

Deploying High Availability SafeLine WAF on K3s(Part 4)

17
Comments
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF

How to Prevent Brute Force Attacks with SafeLine WAF

15
Comments
3 min read
loading...