DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
(Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶

(Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶

1
Comments 1
4 min read
7 Azure Security Gaps I have Seen in Production (and How to Fix Them)

7 Azure Security Gaps I have Seen in Production (and How to Fix Them)

2
Comments
4 min read
Laravel Bastion: Stripe-Style API Authentication for Laravel

Laravel Bastion: Stripe-Style API Authentication for Laravel

Comments
1 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Stop Uploading Your Data! Why I Built a Privacy-First Dev Toolkit (CodeCoffeeTools)

Stop Uploading Your Data! Why I Built a Privacy-First Dev Toolkit (CodeCoffeeTools)

Comments 1
2 min read
AI Agents Deleting Home Folders? Run Your Agent in Firejail and Stay Safe

AI Agents Deleting Home Folders? Run Your Agent in Firejail and Stay Safe

5
Comments
8 min read
Building a Simple, Secure File Upload System with AWS Lambda and S3

Building a Simple, Secure File Upload System with AWS Lambda and S3

Comments
2 min read
How to Secure a Linux Server for Node.js (Beginner-Friendly, Step by Step)

How to Secure a Linux Server for Node.js (Beginner-Friendly, Step by Step)

Comments
4 min read
The Most Common Website Security Issues

The Most Common Website Security Issues

Comments
2 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
What Developers Can Learn From Exchange Security Models

What Developers Can Learn From Exchange Security Models

3
Comments
2 min read
Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Comments
16 min read
We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

Comments
2 min read
Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Comments
1 min read
Day 14 — Network Boundary Monitoring (Watched from the Woods)

Day 14 — Network Boundary Monitoring (Watched from the Woods)

4
Comments
2 min read
SQL Injection Audit Challenge Week 1

SQL Injection Audit Challenge Week 1

Comments
27 min read
How Quality Assurance Engineers Can Strengthen Application Security

How Quality Assurance Engineers Can Strengthen Application Security

Comments
2 min read
Why CAPTCHAs today are so bad (and what we should be building instead)

Why CAPTCHAs today are so bad (and what we should be building instead)

1
Comments
1 min read
QARX-256

QARX-256

Comments
1 min read
Stealth Inline Hook Detection via LR Return Address

Stealth Inline Hook Detection via LR Return Address

Comments
2 min read
Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
How 129KB of Whitespace (and a Recursive Loop) Broke the Web

How 129KB of Whitespace (and a Recursive Loop) Broke the Web

Comments
5 min read
Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Comments
4 min read
ASP.NET CORE - How to using IAuthorizationRequirementData

ASP.NET CORE - How to using IAuthorizationRequirementData

Comments
2 min read
📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

Comments
3 min read
loading...