Skip to content
Navigation menu
Search
Search
Log in
Create account
CodeNewbie Community 🌱
Close
#
cybersecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
SafeLine WAF: Comprehensive Protection for Your Web Applications
11
11
11
Follow
Nov 5
SafeLine WAF: Comprehensive Protection for Your Web Applications
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
3 min read
Beginner's Understanding to WAF
11
11
11
Follow
Nov 5
Beginner's Understanding to WAF
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
3 min read
The Beginner's Guide to Understanding WebSocket
11
11
11
Follow
Nov 5
The Beginner's Guide to Understanding WebSocket
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
3 min read
Advanced WAF Not Fully Based on Rules or Signatures
11
11
11
Follow
Nov 5
Advanced WAF Not Fully Based on Rules or Signatures
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
2 min read
Understanding of Pulling WAF Definitions Updates
11
11
11
Follow
Nov 5
Understanding of Pulling WAF Definitions Updates
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
3 min read
What is an Upstream Server
11
11
11
Follow
Nov 4
What is an Upstream Server
#
cybersecurity
#
opensource
#
webdev
#
beginners
Comments
Add Comment
3 min read
What is a Reverse Proxy
11
11
11
Follow
Nov 4
What is a Reverse Proxy
#
cybersecurity
#
opensource
#
webdev
#
beginners
Comments
Add Comment
3 min read
Anti Bot Protection with SafeLine 7.0
11
11
11
Follow
Nov 4
Anti Bot Protection with SafeLine 7.0
#
cybersecurity
#
opensource
#
webdev
#
beginners
Comments
1
comment
3 min read
What Are Web Application Security Detection Rules?
11
11
11
Follow
Nov 4
What Are Web Application Security Detection Rules?
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
3 min read
What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?
11
11
11
Follow
Nov 4
What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
Add Comment
3 min read
HTTP/3 for Beginners and How to Protect Your HTTP/3 Website
11
11
11
Follow
Oct 31
HTTP/3 for Beginners and How to Protect Your HTTP/3 Website
#
cybersecurity
#
opensource
#
webdev
#
beginners
5
reactions
Comments
1
comment
3 min read
Cybersecurity in the Hospitality Industry: Best Practices and Guidelines
Taryn Moss
Taryn Moss
Taryn Moss
Follow
Jul 22
Cybersecurity in the Hospitality Industry: Best Practices and Guidelines
#
cybersecurity
#
hospitality
#
security
Comments
3
comments
4 min read
Steps of Integrating Security Audits into Application Development
Zorian
Zorian
Zorian
Follow
Jun 7
Steps of Integrating Security Audits into Application Development
#
webdev
#
codenewbie
#
security
#
cybersecurity
Comments
8
comments
2 min read
Tookie, an advanced OSINT tool.
alfredredbird
alfredredbird
alfredredbird
Follow
Apr 17
Tookie, an advanced OSINT tool.
#
tutorial
#
osint
#
python
#
cybersecurity
1
reaction
Comments
4
comments
1 min read
Alfred, an advanced OSINT tool
alfredredbird
alfredredbird
alfredredbird
Follow
Nov 28 '23
Alfred, an advanced OSINT tool
#
osint
#
python
#
cybersecurity
#
code
1
reaction
Comments
2
comments
1 min read
Alfred version v2.2(a)
alfredredbird
alfredredbird
alfredredbird
Follow
Oct 21 '23
Alfred version v2.2(a)
#
osint
#
python
#
cybersecurity
#
opensource
1
reaction
Comments
4
comments
1 min read
loading...
Log in
Create account