Logo
Login
Tech Posts 31249
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy
tea2adt is a free and open source Linux command-line utility for Chat, Remote Shell, Remote AI Prompt and File Transfer, that reads and writes encrypted data across peer-to-peer or broadcast audio con...
17.04.2025 0 Read More

Secure Key-Value Store for Raspberry Pi Pico

Stop Hardcoding Secrets: How to Secure Configuration on Raspberry Pi Pico.When developing IoT applications using the Raspberry Pi Pico W or Pico 2 W, you often need to handle configuration data such a...
17.04.2025 0 Read More

Stealthy FortiGate Backdoor: SSL-VPN Symlink Exploit Bypasses Patches

Stealthy FortiGate Backdoor: SSL-VPN Symlink Exploit Bypasses Patches
Fortinet, a prominent cybersecurity firm, has issued a critical advisory warning users of a newly discovered exploit that allows attackers to maintain unauthorized, read-only access to FortiGate devic...
17.04.2025 0 Read More

Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs

As more SaaS products look to scale from indie startup to enterprise-ready solution, developers often find themselves at the heart of a transformation. What separates hobby projects from deals with Fo...
17.04.2025 0 Read More

Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?
Kliento is a workload authentication protocol that brings the concept of Kubernetes- and GCP-style "service accounts" to the whole Internet in a vendor-neutral and decentralised way.I'm genuinely seek...
17.04.2025 0 Read More

The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

Cyber security is no longer a luxury — it’s a necessity. In Africa, where digital transformation is advancing at an impressive pace, cyber security is now a critical pillar for both governments an...
17.04.2025 0 Read More

Securing Email with Cisco Email Security Appliance: The Essential Guide

In my years of working in the IT and networking field, one thing has always been true—email is the lifeblood of communication for businesses worldwide. Unfortunately, it is also one of the most comm...
17.04.2025 0 Read More

From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

Mathematics is a timeless pursuit of patterns, proofs, and profound insights. Two towering figures in this journey—Euclid and Euler—laid the groundwork for concepts that not only shaped ancient nu...
17.04.2025 0 Read More

AWS Shared Responsibility Model and Security Principles

Introduction Security is a fundamental pillar of the AWS Well-Architected Framework, alongside operational excellence, reliability, performance efficiency, cost optimization, and sustainabili...
17.04.2025 0 Read More

SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

SAST vs SCA: Choosing the Right Source Code Security Scanning Tools
Engineering teams want to satisfy security teams. Security teams want to be seen as value-added and not a nuisance or distraction to development. The threat from not addressing application security is...
17.04.2025 0 Read More
Loading...
#reading
Understanding Babel: The JavaScript Compiler
0
Firework Simulator v2
0
OSD700 - RAG on DuckDB
0
STOP USING THE AWS CONSOLE…use CloudFormation (IaC) instead
0
The Best Productivity Apps for Software Developers
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
1
What is Model Context Protocol (MCP): Explained in detail
1
How to Disable NSFW Filter in FaceFusion 3.2.0
0
Beginner's Guide to the Model Context Protocol (MCP)
0
How to Run DeepSeek Locally Using Ollama
0