Articles by Tag #security

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Top 5 AI Models YOU Can Run Locally on YOUR Device! 🤯

What's up, folks? Did you know you can run an AI model on YOUR machine?! Let me explain. Most AI...

Learn More 575 48Sep 17 '24

Database 101: SSL/TLS for beginners

Once again, I'm bringing some knowledge from my day-to-day work as a Developer Advocate at ScyllaDB,...

Learn More 276 7Oct 4 '24

Empowering Developers to Achieve Microservices Observability on Kubernetes with Tracestore, OPA, Flagger & Custom Metrics

Introduction In modern microservices architectures, achieving comprehensive observability...

Learn More 240 51Mar 10

Scrapebase + Permit.io: Web Scraping with Authorization

This is a submission for the Permit.io Authorization Challenge: API-First Authorization Reimagined ...

Learn More 152 26May 5

Join us for the Permit.io Authorization Challenge: $3,000 in Prizes and a Mechanical Keyboard for Each Winner 🤩

We're thrilled to partner with Permit.io for a brand new DEV challenge focused on reimagining...

Learn More 144 22Apr 23

🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

We're back with our series of posts in which we interview open-source maintainers and showcase the...

Learn More 138 9Oct 30 '24

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

Kali metapackages; install all the tools you want with a simple Command' Did you just...

Learn More 120 4Sep 7 '24

How to remove a leaked .env file from GitHub permanently...

OOoooppss... Ok we don't have time to waste, you did the unthinkable, it was a rookie...

Learn More 114 24Aug 31 '24

What is Rate Limiter and Why Use It?

In web systems, it is common for the same client (whether a user or a service) to make multiple...

Learn More 101 7Jan 7

Forward Proxy vs Reverse Proxy vs Load Balancers

Have you ever wondered how some of the world’s largest websites handle millions of users...

Learn More 96 3Dec 23 '24

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Best Docker Practices 1. Optimize Image Size Use Official Images: Start with...

Learn More 89 12Nov 1 '24

10 MLOps Tools That Comply With the EU AI Act

The EU AI Act has introduced strict guidelines to regulate the development and deployment of AI...

Learn More 77 2Oct 15 '24

How to Run AI Models Privately on Your AI PC with Model HQ; No Cloud, No Code

In an era where efficiency and data privacy are paramount, Model HQ by LLMWare emerges as a...

Learn More 75 17Jun 27

Zedd : AI-Powered Knowledge Base with Fine-Grained AI Access Control Using Permit.io

Zedd:A Secure AI Knowledge Base with Fine-Grained Access Control For the Permit.io...

Learn More 72 2May 4

SaaS-Ready Web Scraping with Tiered Permissions using Permit.io

This is a submission for the Permit.io Authorization Challenge: Permissions Redefined What...

Learn More 64 1May 5

Why I Quit Development to Break Into Cybersecurity

I started at the terminal with my fingers frozen, time ticking–tic-tic-tic–less than 5 minutes left...

Learn More 62 17Jun 15

Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

Introduction The container landscape has changed a fair bit since Docker changed...

Learn More 60 2Dec 26 '24

Access Control? Handled. Here's How I Built My DMS 🌠

This is a submission for the Permit.io Authorization Challenge: Permissions Redefined What...

Learn More 59 4Apr 29

🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game

This is a submission for the Permit.io Authorization Challenge: API-First Authorization Reimagined ...

Learn More 59 22May 3

Is CSP Actually Helping with Your Security? 🤔

Content Security Policy (CSP) – sounds fancy, right? Like the shiny new toy in the web security...

Learn More 57 5Aug 29 '24

Storing passwords safely (C#)

Introduction Learn and easy way to stored passwords in a SQL-Server database table using...

Learn More 57 26Nov 3 '24

Simples Mudanças, Grandes Impactos: Como Fortalecer a Segurança da Sua Aplicação Laravel

Se você já trabalhou em algum projeto Laravel com certeza já ter percebido como o framework entrega...

Learn More 57 6Sep 1 '24

How to be a White Hat Hacker in Power Automate

If anyone is unlucky enough to read my previous blogs you will know I like to hack the Power...

Learn More 56 1Aug 26 '24

Cybersecurity Beginner's Guide: Build Your Own Vulnerable Lab in 5 Minutes (DVWA + More)

In cybersecurity learning and hands-on training, a cyber range is a must-have environment. It...

Learn More 55 5Apr 17

Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

We have 3 new announcements for Supabase Auth: Support for third-party Auth providers Phone-based...

Learn More 55 0Aug 22 '24

Access Granted!! Here's the recipe behind my AI DMS 🤞

This is a submission for the Permit.io Authorization Challenge: AI Access Control   Hey...

Learn More 55 3May 4

API Security: Protecting the Backbone of Modern Web Apps

Introduction: APIs Are Everywhere—And So Are the Threats Have you ever ordered food from...

Learn More 54 3Mar 22

JSON Web Tokens (JWT)

What are JSON Web Tokens (JWT)? A JSON Web Token (JWT) is a widely used open standard...

Learn More 52 7Dec 9 '24

MCP 2025-06-18 Spec Update: Security, Structured Output & Elicitation

The Model Context Protocol has faced significant criticism in the past due to its security...

Learn More 52 2Jul 4

AI safety controls at scale with Amazon Bedrock Guardrails

This week I'm back with another "learn with me" on a topic that consistently weighs heavily on me: AI...

Learn More 51 6Mar 27