© 2023 Hashnode
#security
Instant messaging applications become a huge part of a digital lifestyle and can affect someone's personal life if somebody can get hold of it. Not just external threat actors but these days companies…
This post will give you an overview of what happens whenever you try to access a web page through a web browser... Whenever you entered a URL such as www.google.com into your web browser, the browser …
How are ebpf programs written? You write an eBPF program. Mostly in restricted C. Compile the program into bytecode using tools like clang Use bpftool or another high-level program to load bytecode…
In this blog post, I'll show what detection methods exist and share code examples. But more importantly, I'll discuss the motivation for jailbreak detection, share related implementation, and present …
Have you ever liked an application to the point that you want to view its source code? Well, I have been there. For .Net executable files and libraries such as DLL files, viewing the source code is a …
Expanding your cybersecurity knowledge can be a rewarding experience, and there are many great resources available to help you achieve this goal. YouTube and podcast channels are a great place to star…
Introduction: What is OAuth 2.0 and How Does it Work? OAuth is simply an open standard for token-based authorization that makes it easier for users to sign into your web app without having to create a…
In this post, we will look at realms and users in Keycloak. Before we start creating these things, we should familiarize ourselves with these terms from the Keycloak universe. What is a realm? A realm…
TL;DR There is a way to protect your public properties in Livewire 2 in the way it will work in the upcoming Livewire 3. There is a Trait at the end of the article you can use for this. Why should you…
Securing your web application is a crucial step in ensuring the safety of your users' data and your business. With the increasing frequency of data breaches and cyber attacks, it's important to make s…