Chetan Mittalblog.railsforgedev.com·Dec 13, 2024Rails 8.0 Credentials: The Ultimate Guide to Secure Configuration ManagementIn the ever-evolving landscape of web development, Ruby on Rails continues to prioritize security and developer experience. The removal of config.read_encrypted_secrets in Rails 8.0 marks a significant shift in how applications handle sensitive con...179 readsRails 8.0
Chetan Mohanrao Mohoddevops-concepts-by-chetan.hashnode.dev·Nov 13, 2024Storing Passwords in Jenkins—Here’s How I Keep Them Safe and Sound!First, create a Personal Access Token. How do you create a PAT? Follow These Steps: Log in to DockerHub: https://hub.docker.com/ Go to Account settings: Click on Generate New Token: Add the following details: Once you click on Generate,...45 readsJenkins credentials
Romman Sabbirrommansabbir.com·Oct 28, 2024Data Encryption in Android: A Comprehensive Guide [PART 1]Data encryption is a fundamental part of securing mobile applications, particularly those handling sensitive information like user credentials, tokens, or files. Android provides several encryption techniques and APIs that developers can implement to...45 readsAndroid : Security, Encryption and Secure Practicesfile-based encryption
Derek Murawskyblog.murawsky.net·Oct 4, 2024What is the Easiest Way to Manage Your AWS Root Credentials?There are many ways of handling your AWS Root credentials, but after many years of going back and forth with various vaults and password management systems, I came across a surprisingly simple pattern: Don’t bother remembering those passwords to begi...10 likes·113 readsAWS
Akbar Khanakbarkhan.hashnode.dev·Sep 25, 2024Extracting NTLM Hashes with Mimikatz: A Step-by-Step Approach.Mimikatz is a powerful post-exploitation tool used by penetration testers, security researchers, and cyber attackers to interact with the Windows security model. Developed by Benjamin Delpy, it's widely known for its ability to extract plaintext pass...1 like·230 readsmimikatz
Nilanjan RaychaudhuriforTUBLIAN BLOGdevlog.tublian.com·Sep 24, 2024Open Source for Emerging developersThe best way to become a successful software developer in 2023 and beyond and build an amazing career in tech is to "Build in Public." Sounds crazy? 🤯 Hear me out. Demonstrate Credibility Gone are the days when degrees and certificates were sufficie...55 likes·1.4K readsOpen Source
Yilia Linapi7.hashnode.dev·Sep 18, 2024API7 Enterprise v3.2.15: Multi-Credential AuthenticationAs API services become increasingly complex, traditional access control methods relying solely on IP addresses or basic request headers are no longer sufficient. API7 Enterprise introduces the concept of "Consumers", allowing developers to bind consu...11 likesauthentication
Peter Abahoddabok.hashnode.dev·Aug 31, 2023A Guide to Encrypted Credentials in RailsCredentials/secrets are sensitive pieces of information or configurations, such as API tokens from third party services, that a web application needs to function. It is important that developers keep these credentials private to prevent security vuln...36 readsRuby
Darren Robinsondarrenjrobinson.hashnode.dev·Jun 30, 2023PowerShell Automation for 1PasswordOver two years ago I authored a PowerShell Module that enabled the automation of 1Password. I created the module because I wanted to be able to: Securely store locally a configuration for accessing a 1Password online Vault Automate authentication a...3 likes·68 reads1password
PopLab AgencyforAD Attacksad-attacks.hashnode.dev·May 28, 2023Understanding Pass-the-Hash (PtH) AttackThis article provides a detailed overview of Pass-the-Hash (PtH), an exploitation technique used in cybersecurity attacks. Learn how PtH works, its implications for authentication security, and strategies to mitigate the risks. In the realm of cybers...authentication