Security

Security posts, videos, courses, and more

Supernova3339 · 11 months ago

How to add two factor authentication to your laravel application

Two factor authentication is a security measure that adds an extra layer of protection to a user's account or system by requiring two forms of identification. Instead of relying solely on a...
5

TechvBlogs · 1 year ago

How to Secure Your Laravel Application: Get the Best Tips for Laravel Security

Laravel is certainly almost everyone's favorite PHP framework and an excellent developer's companion. It attempts to relieve the pain that comes with development tasks such as sessions, auth...
5

Mariam Reba Alexander · 2 years ago

Cross-site scripting (XSS) attack - part 3

By now you have an understanding of Stored XSS attack and Reflected XSS attack, and some measures to prevent it. Now we will look into the last type of XSS attack, DOM based XSS attack. In t...
4

Mariam Reba Alexander · 2 years ago

Cross-site scripting (XSS) attacks - part 2

In the last post I went through what is Cross-site scripting and Stored XSS attack, a type of cross-site scripting caused by stored javascript in database from user inputs. If you haven't re...
4

Mariam Reba Alexander · 2 years ago

Cross-site scripting (XSS) attacks - part 1

As frontend developers we are constantly adding and releasing new features or fixing bugs as per business requirements, and it's hard to keep vigilance on the security side of things. It has...
7

Dev Yoda · 2 years ago

Top VS Code Extensions for Application Security in 2021

Companies are investing heavily in technologies to protect their users' data as part of policies. Hackers and other bad players will get more sophisticated in stealing information and infilt...
7

Petre Popescu · 2 years ago

How to invalidate a compromised JWT

In a past article, I wrote about JWTs, how to generate one and how to use them for authorization. JSON Web Tokens, however, have one major drawback. Once it is generated and submitted to the...
6

Petre Popescu · 3 years ago

Using “pepper” to increase password storing security

Article originally posted o my personal website under How to securely store the password using a salt and pepper In a previous article I wrote how to securely store a password in the databas...
8

Joshua Arulsamy · 3 years ago

What is a DDoS Attack?

What is a DDoS Attack? DDoS stands for distributed denial of service but is often referred to as a simple denial of service. A DDoS attack consists of a website being flooded by requests dur...
4

Ruan Bekker · 3 years ago

Capturing 54 Million Passwords with a Docker SSH Honeypot

The last couple of days I observed thousands of SSH Brute Force Attacks, so I decided I will just revisit my SSH Server configuration, and change my SSH port to something else for the interi...
5

Ruan Bekker · 3 years ago

Encryption using PyCrypto in Python

While I'm learning a lot about encryption at the moment, I wanted to test out encryption with the PyCrypto module in Python using the Advanced Encryption Standard (AES) Symmetric Block Ciphe...
3

Petre Popescu · 3 years ago

You should always do server-side validation! Always!

Original article with another example on my personal website Web technologies have evolved a lot in the past few years, both on the server-side as well as on the client’s side. There are man...
4

Ruan Bekker · 3 years ago

Setup AWS S3 Cross Account Access

In this tutorial, I will demonstrate how to set up cross-account access for S3, from using two AWS Accounts. Scenario We will have 2 AWS Accounts: a Green AWS Account which will host the I...
1

Petre Popescu · 3 years ago

How to properly store a password in the Database

Article originally posted on my website un How to securely store the password in the Database When I started LOGaritmical, one of the first functionalities that I implemented was registering...
2

Bobby Iliev · 3 years ago

How to encrypt and decrypt a string in Laravel?

Introduction Encryption is the process of encoding information so that it can not be understood or intercepted. Encryption has been used long ago before computers were invented; actually, th...
6

Loading More Content