Hacker News
- Learning CS while learning how to program http://owasp.org 3 comments learnprogramming
- What can be done to promote security in web application development? https://www.owasp.org/ 6 comments webdev
Linking pages
- GitHub - sdmg15/Best-websites-a-programmer-should-visit: :link: Some useful websites for programmers. https://github.com/sdmg15/Best-websites-a-programmer-should-visit 331 comments
- Infrastructure overview https://mangadex.dev/mangadex-v5-infrastructure-overview/ 258 comments
- SHA-3 Buffer Overflow – Nicky Mouha https://mouha.be/sha-3-buffer-overflow/ 209 comments
- Amazon CodeWhisperer, Free for Individual Use, is Now Generally Available | AWS News Blog https://aws.amazon.com/blogs/aws/amazon-codewhisperer-free-for-individual-use-is-now-generally-available/ 172 comments
- 2.5.3 Programming and Source Code Standards | Internal Revenue Service https://www.irs.gov/irm/part2/irm_02-005-003 149 comments
- Capture the Flag 2.0 https://stripe.com/blog/capture-the-flag-20 114 comments
- Top 10 secure C++ coding practices - Incredibuild https://www.incredibuild.com/blog/top-10-secure-c-coding-practices 106 comments
- GitHub - owasp-change/owasp-change.github.io: An Open Letter to the OWASP Board https://github.com/owasp-change/owasp-change.github.io 45 comments
- Five Pentesting Tools and Techniques (That Every Sysadmin Should Know) | by Jeremy Trinka | Medium https://medium.com/@jeremy.trinka/five-pentesting-tools-and-techniques-that-sysadmins-should-know-about-4ceca1488bff 39 comments
- GitHub - mike-goodwin/owasp-threat-dragon-desktop: An installable desktop variant of OWASP Threat Dragon https://github.com/mike-goodwin/owasp-threat-dragon-desktop 30 comments
- GitHub - WebGoat/WebGoat: WebGoat is a deliberately insecure application https://github.com/WebGoat/WebGoat 29 comments
- Eliminating Visual Debt http://ocramius.github.io/blog/eliminating-visual-debt/ 27 comments
- GitHub - OWASP/Go-SCP: Go programming language secure coding practices guide https://github.com/Checkmarx/Go-SCP 26 comments
- A few thoughts about Uber's breach https://cendyne.dev/posts/2022-09-19-a-few-thoughts-about-ubers-breach.html 24 comments
- Password auth in Rust, from scratch - Attacks and best practices | Luca Palmieri https://www.lpalmieri.com/posts/password-authentication-in-rust/ 18 comments
- GitHub - OWASP/DevGuide: The OWASP Guide https://github.com/OWASP/DevGuide 13 comments
- Guide to User Data Security - FusionAuth https://fusionauth.io/resources/guide-to-user-data-security 12 comments
- How to Get Started Using Java Cryptography Securely | Veracode https://www.veracode.com/blog/research/how-get-started-using-java-cryptography-securely?amp%3Butm_campaign=buffer&%3Butm_content=buffer5e760&%3Butm_medium=social&%3Butm_source=twitter.com&sdf= 10 comments
- Top 6 Application Security Must Dos with Limited Resources https://blog.hackedu.io/top-6-application-security-must-dos-with-limited-resources/ 10 comments
- The Enchiridion of Impetus Exemplar https://shellsharks.com/threat-modeling 9 comments
Would you like to stay up to date with Web Development? Checkout Web Development
Weekly.
Related searches:
Search whole site: site:owasp.org
Search title: OWASP Foundation, the Open Source Foundation for Application Security | OWASP Foundation
See how to search.