Logo
Login
Tech Posts 31243
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Secure Your CI/CD Pipeline with Jenkins, ArgoCD, and Vault – A Hands-On DevSecOps Guide

Secure Your CI/CD Pipeline with Jenkins, ArgoCD, and Vault – A Hands-On DevSecOps Guide
In a world where security breaches and unstable deployments can instantly ruin user trust, building a secure and automated CI/CD pipeline is no longer optional - it's essential.In this hands-on gu...
05.05.2025 0 Read More

macOS Security in 2025: Why Your Mac Isn’t as Safe as You Think (And What IT Teams Are Doing About It)

📌 TL;DR (Too Long; Didn’t Read) Macs are increasingly targeted by cyber threats — especially in remote, BYOD, and developer environments. Default macOS security (e.g., Gatekeeper, XPr...
05.05.2025 0 Read More

API Key Vs. OAuth – How to Choose the best Authentication

API Key Vs. OAuth – How to Choose the best Authentication
Authentication is like the lock on your app’s front door—It decides who gets in and keeps the bad guys out. Let’s say you’re embedding an e-signature workflow in your app where people sign con...
05.05.2025 0 Read More

Exploring the MCP Ecosystem: Looking Under the Hood

Exploring the MCP Ecosystem: Looking Under the Hood
Exploring the MCP Ecosystem: Looking Under the Hood In my previous article, I introduced Model Context Protocol (MCP) as the USB-C of AI integrations - a standardized way to connect LLMs with...
05.05.2025 0 Read More

ATLSecCon 2025: Security Readiness Means Human Readiness

ATLSecCon 2025: Security Readiness Means Human Readiness
Halifax has always been a city built on readiness. Its ferry system, among the oldest in North America, has connected communities across Halifax Harbour since 1752. It has run through storms, wartime,...
05.05.2025 0 Read More

Se protéger du phishing et du spam : pourquoi j’ai créé ma propre app de mails temporaires

Se protéger du phishing et du spam : pourquoi j’ai créé ma propre app de mails temporaires
Internet évolue vite… et les menaces aussi. Entre les spams, les fuites de données et les mails de phishing, notre boîte de réception est devenue un terrain miné. Et si on reprenait un peu le ...
05.05.2025 0 Read More

Securing $1 Downloads in Emerging Markets

Established digital delivery solutions are often cost-prohibitive so emerging market entrepreneurs need affordable alternatives. A Proposed Low-Cost Solution to Digital Download Fraud While de...
05.05.2025 0 Read More

Introduction to access control model: ACL, RBAC, ABAC

Access Control Models: ACL, RBAC, ABAC In system design, access control is a critical mechanism to ensure data security and correct authorization of functionalities. Depending on the complexi...
05.05.2025 0 Read More

Disposable emails: What they are, Why they exist, and how to handle them in your app

This article is created by Logto, an open-source solution that helps developers implement secure auth in minutes instead of months. Imagine this:You find a free online tool that promises to generate...
05.05.2025 0 Read More

Encrypted Chat Application with web option

I'll be making an chat application which is fully encrypted end to end and it will also have a web option. Does anyone want to collaborate...
06.05.2025 0 Read More
Loading...
#reading
Mastering CSS Layouts: Grid vs Flexbox Explained
0
How to Pick ⚖️ Platform Engineering Tools 🔧 in 2025 - Advanced Guide 😎
0
AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift
0
sort
0
..
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
How to Run DeepSeek Locally Using Ollama
0