Olumide Michealcodewithmide.hashnode.dev·Oct 23, 2023Ensuring Accessibility Beyond the MouseI first learned about accessibility while I was taking the ALX SW Engineering Boot Camp. I got interested in it because "accessibility is not a feature" as Ethan Marcotte said. The project covered a lot about accessibility. But in this article, I'll ...Discuss·21 likes·28 readsaccess control
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 20, 2023How to Create an S3 Bucket and Assign Full Access to One IAM User Using TerraformIntroduction :- Amazon S3 is a widely used object storage service that provides industry-leading scalability, durability, and security. With #Terraform, a popular infrastructure as code (IaC) tool, you can easily create and manage S3 buckets and thei...DiscussS3
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 20, 2023How to Create an IAM Role with Ec2 Full Permissions Using TerraformIntroduction :- AWS Identity and Access Management (IAM) is a powerful tool that allows you to control access to your AWS resources. IAM roles are a type of IAM entity that enables you to grant permissions to users, applications, or services to acces...DiscussTerraform
rafna bashrafna.hashnode.dev·Oct 14, 2023Session management in access control of web applicationsIn the previous article, we learned some basics of authentication and prevention methods of access control in web applications through authentication. In this article, let's talk about session management in access control of web applications. Server...DiscussSecurity
Esther Breathestherbreath01.hashnode.dev·Oct 2, 2023ACCESS CONTROL AS AN ATTACK VECTOR IN SOLIDITY Access Control Checks on Critical FunctionsINTRODUCTION Before we can discuss this topic, let’s understand what Blockchain and Smart contracts are. Blockchain is a globally shared transactional database. This means that everyone can read entries in the database just by participating in the ne...Discussaccess control
rafna bashrafna.hashnode.dev·Sep 1, 2023Access control in web applicationsMy last article was about the importance of web security in small applications and how to ensure security practices in those applications. So I thought to continue the conversation on the same topic. This article is about various challenges with prev...Discuss·27 readswebsecurity
Stefan BirdProscbird.hashnode.dev·Aug 23, 2023Authorising Users: A Complete WalkthroughIf there's one part of an application that developers don't like touching, it's authorisation. A critical piece of any multi-user application, it's the code that ensures the user can only do the things they're meant to be able to do. Most of the tuto...Discuss·1 like·34 readsUser Authorisation: A complete walkthroughauthorization
Vincent ChosenforOpen Replay's Technical Blogopenreplay.hashnode.dev·Aug 15, 2023Broken Access Control: A Serious Web VulnerabilityIn today's digital world, where web applications and software systems, in general, have become an integral part of our lives, ensuring the security and integrity of these systems is of the utmost importance. A key factor that stands out among the man...Discussaccess control
Komal DhullforP0 Securityp0security.hashnode.dev·Aug 1, 2023Granting Temporary Access in Google CloudDo your cloud environments end up cluttered with excess permissions that are no longer being used? Engineers will often need access to a production cloud environment for brief periods: maybe an hour to debug a production incident or access for a week...DiscussIAM
Pooja Singhclouddevops23.hashnode.dev·Jul 26, 2023"Securing Your Linux World: Understanding File Permissions and Access Control"Introduction In the world 🌍of operating systems, file permissions 📁and access control🔐 lists (ACLs) play a crucial role in determining who can access, modify, or execute files and directories. Here we'll dive🏊 into practical examples of File perm...Discuss·8 likes·60 reads#90daysofdevops