Homepage
Open in app
Sign in
Get started
Contribute
Tech
Programming
Data Science
Software Development
Cybersecurity
Newsletter
Cybersecurity
Latest
OAuth2 Scopes and Claims: Fine-Grained Access Control
OAuth2 Scopes and Claims: Fine-Grained Access Control
Master OAuth2 scopes and claims to secure APIs with fine-grained access control and build trust
Igor Venturelli
Jan 14
Defending OAuth2: Advanced Tactics to Block Replay Attacks
Defending OAuth2: Advanced Tactics to Block Replay Attacks
Prevent OAuth2 replay attacks with advanced strategies like PKCE, state parameters, and secure tokens
Igor Venturelli
Jan 7
From Phishing to Payloads: Decoding Hacker Speak
From Phishing to Payloads: Decoding Hacker Speak
Hacking is one of the most debated and respected terminologies in the world today.
Abhinav Pathak
Jan 11
Mastering Web Application Security: Understanding the OWASP Top 10 Vulnerabilities
Mastering Web Application Security: Understanding the OWASP Top 10 Vulnerabilities
A Comprehensive Guide to Protecting Your Web Applications from the Most Critical Security Threats
Someone
Jan 4
Unlocking the Power of Web Applications: A Deep Dive into HTTP, HTTPS, and Web Security
Unlocking the Power of Web Applications: A Deep Dive into HTTP, HTTPS, and Web Security
Master the Basics of Web Apps and Learn How Protocols Shape Their Security
Someone
Jan 3
Practical Guide: Writing a Basic Encryption Program in C/C++
Practical Guide: Writing a Basic Encryption Program in C/C++
Unlock the Power of Cryptography with C/C++: Learn Encryption from Scratch!
Someone
Dec 31, 2024
Unlocking the Power of Cryptographic Hash Functions: A Practical Guide to Cybersecurity
Unlocking the Power of Cryptographic Hash Functions: A Practical Guide to Cybersecurity
From File Integrity to Blockchain Security — Understanding How Cryptographic Hashes Safeguard Our Digital World
Someone
Dec 29, 2024
Mastering System Automation: Practical Scripts for Everyday Tasks — Part 2
Mastering System Automation: Practical Scripts for Everyday Tasks — Part 2
Automate Your Linux System with Real-World Scripting Techniques
Someone
Dec 25, 2024
Symmetric vs Asymmetric Encryption: Understanding the Key Differences and Practical Applications
Symmetric vs Asymmetric Encryption: Understanding the Key Differences and Practical Applications
Unlocking the Secrets of Data Protection: A Comprehensive Guide to Choosing the Right Encryption Method
Someone
Dec 27, 2024
Privacy
🕵️♂️🔐Unlocking Privacy and Performance: Understanding DNS in V2Ray and the Benefits of DNS…
🕵️♂️🔐Unlocking Privacy and Performance: Understanding DNS in V2R...
Since the unsuspecting, online privacy of many users is being intruded upon, and due to the recent expansion of the V2Ray application, it…
Arash hadad
Oct 30, 2024
Incognito Mode Won’t Keep Your Browsing Private. Do This Instead.
Incognito Mode Won’t Keep Your Browsing Private. Do This Instead.
In this article, we’ll explain what Incognito mode really does, its limitations to protect your online privacy.
Rehmanabdul
Oct 19, 2024
Understanding Grabify: IP Loggers and Ethics
Understanding Grabify: IP Loggers and Ethics
In today’s digital landscape, safeguarding online privacy has become more important than ever. With the proliferation of tracking tools…
Rohit Saini
Sep 13, 2024
Enabling Next-Gen LLM Applications via Multi-Agent Conversation: A Comprehensive Framework
Enabling Next-Gen LLM Applications via Multi-Agent Conversation: A ...
AutoGen is a novel open-source framework designed to facilitate the development of next-generation applications utilizing Large Language…
Patel
Aug 31, 2024
About CodeX
Latest Stories
Archive
About Medium
Terms
Privacy
Teams