Security Tutorials and Insights

Learn about the latest trends in Security. Read tutorials, posts, and insights from top Security experts and developers for free.

GET STARTED

Security tutorials, posts, and more

IoT Security Through Open Certification

As the number of IoT devices proliferate and the attacks increase in sophistication, we can also expect an increase in bad days for network admins, not to mention the hapless end user.
IoT Security Through Open Certification

How I learned Security+

Security journey
How I learned Security+

Defaulting to Secure

When writing good, solid (and DRY) code for your applications, we as developers want to make it the best that we can. Depending on the library or feature that we're creating, this can mean a lot of...
Defaulting to Secure

Passwords are Dead, Long Live Passwords

Anyone that's been around web applications (or really any applications) that need to protect data or restrict access to only a certain group of users has experience with passwords. They're a...
Passwords are Dead, Long Live Passwords

Linux Quick Tip: Adding GitHub Keys as Authorized Keys

As a software developer, Codementor Vyacheslav constantly works with a bunch of virtual environments used for testing. Here he shares with you a handy batch that will add all of your GitHub keys as authorized keys
Linux Quick Tip: Adding GitHub Keys as Authorized Keys

What is Cross Site Scripting (XSS)

Cross Site Scripting (XSS) occurs when user input is processed without being sanitized. The victim is the user and not the system. This article serves as a quick intro to commonly-used XSS attacks and how to prevent them.
What is Cross Site Scripting (XSS)

7 Tips to Improve WordPress Security

Follow this detailed WordPress security measures to provide the most common and easily executable steps to ensure optimum level of WordPress security for your website.  
7 Tips to Improve WordPress Security

Hybrid Cryptography: Off-The-Record Framework

Learn how to use OTR framework to enhance information privacy.
Hybrid Cryptography: Off-The-Record Framework

Write secure code now

A call to write secure code starting now.
Write secure code now

Yes, the Internet is a War Zone

A simple list showing number and type of attacks on a single domain in 9 days, over 500,000 in total.
Yes, the Internet is a War Zone

How to Create an Unlisted Tag in WordPress

Create "Unlisted" pages and posts in WordPress that behave like a visibility setting between "Published" and "Private," where the pages/posts are not able to be found when searching on the front-end.
How to Create an Unlisted Tag in WordPress

Get curated posts in your inbox

Learn programming by reading more posts like this

YOU MAY ALSO BE INTERESTED IN

Share ideas
with an editor
built for developers

LEARN MORE