#programming
Read more stories on Hashnode
Articles with this tag
Never be frustrated with CORS again. Learn what cross-origin resource sharing is, why it exists, and how to embrace it. · Never be frustrated with CORS...
Are you exposing your users to malicious websites? Learn how xs-leaks are used to exfiltrate data from a web application and how to prevent it in 7...
Learn why HTTPS is not enough to protect your website from network attacks and how the HSTS header comes in to solve the problem. · Learn why HTTPS is...
An explanation of CSRF (Cross-Site Request Forgery) vulnerabilities and practical steps for avoiding them · The original article can be read here What...
The original and up-to-date article can be read here: AppSec Monkey - XSS Attacks & Protection What are XSS vulnerabilities? XSS (Cross-Site...
The original, up-to-date post can be read here Learn about CSP, how it works, and why it’s awesome. You will build a content security policy header...