Debajyati Deydebajyatidey.hashnode.dev·5 hours agoDemystifying Same Origin Policy in Simple WordsAccording to MDN Web Docs, - The same-origin policy is a critical security mechanism that restricts how a document or script loaded by one origin can interact with a resource from another origin. If you are a web developer or someone learning node....Discuss·10 likesJavaScript
Prajoti Raneprajotirane.hashnode.dev·Apr 26, 2024LinkedIn Data Breach: Analyzing the 2012 breach resulting in stolen user credentials.Technical Analysis of the 2012 LinkedIn Data Breach: Decrypting the Theft of User Credentials The 2012 LinkedIn data breach remains one of the most notable incidents in cybersecurity history, involving the compromise of millions of user credentials....DiscussBlogging
Canopascanopas.hashnode.dev·Apr 26, 2024Implement Face ID Authentication in the iOS AppExciting News! Our blog has a new home! 🚀 Introduction Biometric authentication has transformed mobile security, and Apple’s Face ID, introduced with the iPhone X in 2017, stands at the forefront of this revolution. Utilizing advanced facial recogni...DiscussiOS
Lasith Hettiarachchiblog.lasith.dev·Apr 26, 2024Access Your Home Lab Remotely with Tailscale: A Secure and Private SolutionIntroduction Welcome to the second part of our series on securing your home lab! In the previous article, we showed you how to set up Traefik, Pi-hole, and Cloudflare for secure and convenient access to your self-hosted services within your local net...DiscussSecuring Home Labfqdn
Lasith Hettiarachchiblog.lasith.dev·Apr 24, 2024FeaturedSecure Home Lab Services with FQDNs, SSL: A Comprehensive GuideIntroduction Tired of self-signed certificate warnings when accessing your home lab services? This article will guide you through setting up a secure and convenient way to access them using FQDNs (Fully Qualified Domain Names) with SSL encryption, al...Discuss·14 likes·47 readsSecuring Home LabSSL/TLS
YiliaforAPI7api7.hashnode.dev·Apr 24, 2024Integrating Alert Notifications with IM SystemsIntroduction In today's digitized business environment, monitoring and alerting are playing crucial roles. It not only helps enterprises detect system anomalies in a timely manner but also effectively reduces business losses caused by faults. API7 En...Discuss·17 likesalerting
Prathmesh Vibhuteprathmeshh.hashnode.dev·Apr 24, 2024Day 44 : Relational Database Service in AWSIn today's tech-driven world, businesses rely heavily on data to make informed decisions and drive growth. Managing data efficiently and securely is paramount, which is where cloud services like Amazon Web Services (AWS) come into play. AWS offers a ...Discussday44
Nicolás GeorgerforSREDevOps.orgsredevopsorg.hashnode.dev·Apr 24, 2024Un exploit en GitHub permitía inyectar archivos en -casi- cualquier repositorio y distribuir malware "legítimo"Una vulnerabilidad de seguridad en GitHub permitía a atacantes inyectar malware en repositorios legítimos. El atacante podría subir un archivo malicioso como comentario en un issue o pull request. Incluso si el comentario se eliminaba, el archivo ma...DiscussDevSecOps
Nicolás GeorgerforSREDevOps.orgsredevopsorg.hashnode.dev·Apr 24, 2024Un exploit en GitHub permitía inyectar archivos en -casi- cualquier repositorio y distribuir malware "legítimo"Una vulnerabilidad de seguridad en GitHub permitía a atacantes inyectar malware en repositorios legítimos. El atacante podría subir un archivo malicioso como comentario en un issue o pull request. Incluso si el comentario se eliminaba, el archivo ma...DiscussDevSecOps
Nicolás GeorgerforSREDevOps.orgsredevopsorg.hashnode.dev·Apr 24, 2024Un exploit en GitHub permitía inyectar archivos en -casi- cualquier repositorio y distribuir malware "legítimo"Una vulnerabilidad de seguridad en GitHub permitía a atacantes inyectar malware en repositorios legítimos. El atacante podría subir un archivo malicioso como comentario en un issue o pull request. Incluso si el comentario se eliminaba, el archivo ma...DiscussDevSecOps