Category: Security
Posts of Category: Security
  1. Hashing Passwords in Python with BCrypt

    Introduction Storing passwords securely should be imperative for any credible engineer. Plain text passwords are extremely insecure - you shouldn't even bother considering storing them a plain format. It's enou...Learn More
    PythonSecurity
  2. Checking Vulnerabilities in Your Python Code with Bandit

    Introduction As developers, we're encouraged from the start of the journey to write clean code. Equally as important, but less talked about is writing and using secure code. In Python projects, we typically ins...Learn More
    PythonSecuritytesting
  3. Spring Security: In-Memory Invalidation of JWT Tokens During User Logout

    Introduction As technology evolves and becomes more prevalent - including the evolution of large-scale service-oriented architectures, managing web security becomes more and more complex. There are many more ed...Learn More
    JavaSecuritySpringSpring Bootspring securityjwt
  4. Password Encoding with Spring Security

    Password Encoding with Spring Security Introduction Password Encoding is the process in which a password is converted from a literal text format into a humanly unreadable sequence of characters. If done correct...Learn More
    JavaSecuritySpringSpring Bootencoding
  5. Securing Spring Boot Web Applications

    Securing Spring Boot Web Applications This article applies to sites created with the Spring Boot framework. We will be discussing the following four methods to add additional layers of security to Spring Boot a...Learn More
    JavaWebsiteSecuritySpringSpring Boot
  6. Monitoring Data Changes Using a HIDS

    Monitoring Data Changes Using a HIDS In this article I'll explain how to monitor your data and how to detect changes. This kind of monitoring is mostly done using a Host-based Intrusion Detection System (HIDS) ...Learn More
    SecurityUnix
  7. Implementing User Authentication the Right Way

    Implementing User Authentication the Right Way Introduction Writing about Passport.js the other day got me thinking about how authentication actually works, and more importantly how many ways it can go wrong. T...Learn More
    SecurityHTTP
  8. Securing Your Node.js App

    Securing Your Node.js App By default, Node.js is fairly secure by itself. Although, there are definitely things you have to watch out for. If your Node web-app starts to get more and more popular, for example, ...Learn More
    JavaScriptNodejsSecurityexpress
  9. Spring Security: Forgot Password Functionality

    Spring Security: Forgot Password Functionality Introduction The internet is becoming more and more service oriented with more businesses and companies coming up with offerings that can be provided or accessed o...Learn More
    FunctionJavaSecuritySpringSpring Bootspring security
  10. How to Fix "WARNING: UNPROTECTED PRIVATE KEY FILE!" on Mac and Linux

    How to Fix "WARNING: UNPROTECTED PRIVATE KEY FILE!" on Mac and Linux Have you run in to the warning message below, and don't know how to fix it? Warning: Permanently added '192.168.1.1' (RSA) to the list of kno...Learn More
    LinuxSecurityMacUnixssh
  11. Spring Security: Email Verification Registration

    Spring Security: Email Verification Registration Overview The first action a customer takes after visiting a website is creating an account, usually to place an order, book an appointment, pay for a service, et...Learn More
    JavaSecurityEmailSpringSpring Boot
  12. How to fix: "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED" on Mac and Linux

    How to fix: "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED" on Mac and Linux SSH, or Secure Shell, is a very common way to securely access remote machines, typically via the command line. It aims at ensuring ...Learn More
    HostingLinuxSecurityMacUnixssh