Articles by Tag #security

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Top 5 AI Models YOU Can Run Locally on YOUR Device! 🤯

What's up, folks? Did you know you can run an AI model on YOUR machine?! Let me explain. Most AI...

Learn More 541 48Sep 17 '24

Database 101: SSL/TLS for beginners

Once again, I'm bringing some knowledge from my day-to-day work as a Developer Advocate at ScyllaDB,...

Learn More 276 7Oct 4 '24

Empowering Developers to Achieve Microservices Observability on Kubernetes with Tracestore, OPA, Flagger & Custom Metrics

Introduction In modern microservices architectures, achieving comprehensive observability...

Learn More 190 41Mar 10

Scrapebase + Permit.io: Web Scraping with Authorization

This is a submission for the Permit.io Authorization Challenge: API-First Authorization Reimagined ...

Learn More 152 26May 5

Join us for the Permit.io Authorization Challenge: $3,000 in Prizes and a Mechanical Keyboard for Each Winner 🤩

We're thrilled to partner with Permit.io for a brand new DEV challenge focused on reimagining...

Learn More 149 22Apr 23

🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

We're back with our series of posts in which we interview open-source maintainers and showcase the...

Learn More 137 9Oct 30 '24

How to remove a leaked .env file from GitHub permanently...

OOoooppss... Ok we don't have time to waste, you did the unthinkable, it was a rookie...

Learn More 113 24Aug 31 '24

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

Kali metapackages; install all the tools you want with a simple Command' Did you just...

Learn More 109 4Sep 7 '24

What is Rate Limiter and Why Use It?

In web systems, it is common for the same client (whether a user or a service) to make multiple...

Learn More 101 7Jan 7

Forward Proxy vs Reverse Proxy vs Load Balancers

Have you ever wondered how some of the world’s largest websites handle millions of users...

Learn More 96 3Dec 23 '24

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Best Docker Practices 1. Optimize Image Size Use Official Images: Start with...

Learn More 88 12Nov 1 '24

Hacking Access to Power Automate

Accessing Power Automate is controlled by security roles, with the 3 main ones being System Admin,...

Learn More 82 1Jul 29 '24

Webhooks vs. polling

This article will compare webhooks vs. polling, analyze the advantages and disadvantages of each...

Learn More 77 7Jul 23 '24

10 MLOps Tools That Comply With the EU AI Act

The EU AI Act has introduced strict guidelines to regulate the development and deployment of AI...

Learn More 77 2Oct 15 '24

Zedd : AI-Powered Knowledge Base with Fine-Grained AI Access Control Using Permit.io

Zedd:A Secure AI Knowledge Base with Fine-Grained Access Control For the Permit.io...

Learn More 72 2May 4

Congrats to the Permit.io Authorization Challenge Winners!

The results are in! We’re thrilled to announce the winners of the Permit.io Authorization...

Learn More 70 20May 15

SaaS-Ready Web Scraping with Tiered Permissions using Permit.io

This is a submission for the Permit.io Authorization Challenge: Permissions Redefined What...

Learn More 67 1May 5

Access Control? Handled. Here's How I Built My DMS 🌠

This is a submission for the Permit.io Authorization Challenge: Permissions Redefined What...

Learn More 63 4Apr 29

Why I Quit Development to Break Into Cybersecurity

I started at the terminal with my fingers frozen, time ticking–tic-tic-tic–less than 5 minutes left...

Learn More 61 14Jun 15

POST only? Let's end this absurd API design debate

Debunking the "POST only" API myth, explaining why it stems from a misunderstanding of API design...

Learn More 60 8Jul 23 '24

Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

Introduction The container landscape has changed a fair bit since Docker changed...

Learn More 59 2Dec 26 '24

Access Granted!! Here's the recipe behind my AI DMS 🤞

This is a submission for the Permit.io Authorization Challenge: AI Access Control   Hey...

Learn More 59 3May 4

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

AI projects face security challenges that stem from the difficulties in ensuring model integrity and...

Learn More 58 0Aug 8 '24

🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game

This is a submission for the Permit.io Authorization Challenge: API-First Authorization Reimagined ...

Learn More 58 22May 3

Storing passwords safely (C#)

Introduction Learn and easy way to stored passwords in a SQL-Server database table using...

Learn More 57 26Nov 3 '24

Is CSP Actually Helping with Your Security? 🤔

Content Security Policy (CSP) – sounds fancy, right? Like the shiny new toy in the web security...

Learn More 57 5Aug 29 '24

Simples Mudanças, Grandes Impactos: Como Fortalecer a Segurança da Sua Aplicação Laravel

Se você já trabalhou em algum projeto Laravel com certeza já ter percebido como o framework entrega...

Learn More 57 6Sep 1 '24

How to be a White Hat Hacker in Power Automate

If anyone is unlucky enough to read my previous blogs you will know I like to hack the Power...

Learn More 56 1Aug 26 '24

Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

We have 3 new announcements for Supabase Auth: Support for third-party Auth providers Phone-based...

Learn More 55 0Aug 22 '24

Cybersecurity Beginner's Guide: Build Your Own Vulnerable Lab in 5 Minutes (DVWA + More)

In cybersecurity learning and hands-on training, a cyber range is a must-have environment. It...

Learn More 55 5Apr 17