排序
Spring Security. Creating users
Spring Security. Creating users, Spring security (2 Part Series) 1 Spring Security. Creating users 2 Spring Security. Managing users Introduction This series is going to be on Spri...
Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud
Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud,Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud ...
Implementing Two-factor Authentication with Flask, PyOTP, and Fauna
Implementing Two-factor Authentication with Flask, PyOTP, and Fauna,Written in connection with the Write with Fauna program. This article focuses on implementing two-factor authent...
The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses
The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses,AI in Cybersecurity and Social Engineering Threats The emergence of artificial in...
Understanding JWT Authentication: Spring Security’s Architecture and Go Implementation
Understanding JWT Authentication: Spring Security's Architecture and Go Implementation,After setting up JWT stateless authentication (available here), I wanted to understand what h...
Managing Coding and College Studies
Managing Coding and College Studies,Tier 3 First Sem subjects are so boring and they have no relation with Coding and stuff and These subject don't need so much of attention like w...
Secure your Python Code with Bandit
Secure your Python Code with Bandit,Python is a popular programming language for building web applications, scientific computing, data analysis, and more. However, like any other p...
Exploring Steganography in the Wild – Part 1
Exploring Steganography in the Wild - Part 1, Outlines Introduction Steganography Digital Images and Pixels Color Models Binary Code What To Expect Project Setup Core Concepts Mapp...
Secure Device Authentication in Python: Introducing the System Hardware ID Generator Script
Secure Device Authentication in Python: Introducing the System Hardware ID Generator Script,In today's world of distributed applications and cloud computing, ensuring secure device...
Jackson Deserialization Vulnerability
Jackson Deserialization Vulnerability,On July 29th, 2019 a high severity Deserialization of Untrusted Data vulnerability (CVE-2019-14379, CVE-2019-14439) affecting all versions of ...
Spring Security e JWT
Spring Security e JWT,Implementar segurança em aplicações não é algo simples e requer atenção em muitos detalhes. Pensando nisso o Spring Security surgiu para descomplicar m...
Pentest network python tool
Pentest network python tool,Hey guys! Hope you all doing well. I just want to show you a project I am working on (https://github.com/medpaf/medsec). MedSec is a network utility too...