Category: Security
Posts of Category: Security
Posts of Category: Security
Hashing Passwords in Python with BCrypt
Introduction Storing passwords securely should be imperative for any credible engineer. Plain text passwords are extremely insecure - you shouldn't even bother considering storing them a plain format. It's enou...Learn MorePythonSecurityChecking Vulnerabilities in Your Python Code with Bandit
Introduction As developers, we're encouraged from the start of the journey to write clean code. Equally as important, but less talked about is writing and using secure code. In Python projects, we typically ins...Learn MorePythonSecuritytestingSpring Security: In-Memory Invalidation of JWT Tokens During User Logout
Introduction As technology evolves and becomes more prevalent - including the evolution of large-scale service-oriented architectures, managing web security becomes more and more complex. There are many more ed...Learn MoreJavaSecuritySpringSpring Bootspring securityjwtPassword Encoding with Spring Security
Password Encoding with Spring Security Introduction Password Encoding is the process in which a password is converted from a literal text format into a humanly unreadable sequence of characters. If done correct...Learn MoreJavaSecuritySpringSpring BootencodingSecuring Spring Boot Web Applications
Securing Spring Boot Web Applications This article applies to sites created with the Spring Boot framework. We will be discussing the following four methods to add additional layers of security to Spring Boot a...Learn MoreJavaWebsiteSecuritySpringSpring BootMonitoring Data Changes Using a HIDS
Monitoring Data Changes Using a HIDS In this article I'll explain how to monitor your data and how to detect changes. This kind of monitoring is mostly done using a Host-based Intrusion Detection System (HIDS) ...Learn MoreSecurityUnixImplementing User Authentication the Right Way
Implementing User Authentication the Right Way Introduction Writing about Passport.js the other day got me thinking about how authentication actually works, and more importantly how many ways it can go wrong. T...Learn MoreSecurityHTTPSecuring Your Node.js App
Securing Your Node.js App By default, Node.js is fairly secure by itself. Although, there are definitely things you have to watch out for. If your Node web-app starts to get more and more popular, for example, ...Learn MoreJavaScriptNodejsSecurityexpressSpring Security: Forgot Password Functionality
Spring Security: Forgot Password Functionality Introduction The internet is becoming more and more service oriented with more businesses and companies coming up with offerings that can be provided or accessed o...Learn MoreFunctionJavaSecuritySpringSpring Bootspring securityHow to Fix "WARNING: UNPROTECTED PRIVATE KEY FILE!" on Mac and Linux
How to Fix "WARNING: UNPROTECTED PRIVATE KEY FILE!" on Mac and Linux Have you run in to the warning message below, and don't know how to fix it? Warning: Permanently added '192.168.1.1' (RSA) to the list of kno...Learn MoreLinuxSecurityMacUnixsshSpring Security: Email Verification Registration
Spring Security: Email Verification Registration Overview The first action a customer takes after visiting a website is creating an account, usually to place an order, book an appointment, pay for a service, et...Learn MoreJavaSecurityEmailSpringSpring BootHow to fix: "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED" on Mac and Linux
How to fix: "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED" on Mac and Linux SSH, or Secure Shell, is a very common way to securely access remote machines, typically via the command line. It aims at ensuring ...Learn MoreHostingLinuxSecurityMacUnixssh