DEV Community

Carrie profile picture

Carrie

Cybersecurity Engineer | Follow Me and Learn Web Application Security Step by Step

Understanding ARM Server Deployment for Beginners

Understanding ARM Server Deployment for Beginners

10
Comments
3 min read

Want to connect with Carrie?

Create an account to connect with Carrie. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Is a WAF Worth Investing In Despite Its Notorious High False Positive Rate?

Is a WAF Worth Investing In Despite Its Notorious High False Positive Rate?

5
Comments
3 min read
What Are the Advantages of Using a WAF/Reverse Proxy?

What Are the Advantages of Using a WAF/Reverse Proxy?

6
Comments
3 min read
Why Homelab Users Need a WAF

Why Homelab Users Need a WAF

6
Comments
3 min read
Comprehensive Understanding of IPv6 Addresses

Comprehensive Understanding of IPv6 Addresses

6
Comments
3 min read
SafeLine WAF: Comprehensive Protection for Your Web Applications

SafeLine WAF: Comprehensive Protection for Your Web Applications

11
Comments 1
3 min read
Beginner's Understanding to WAF

Beginner's Understanding to WAF

10
Comments
3 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
The Beginner's Guide to Understanding WebSocket

The Beginner's Guide to Understanding WebSocket

81
Comments 10
3 min read
Understanding of Pulling WAF Definitions Updates

Understanding of Pulling WAF Definitions Updates

8
Comments
3 min read
Anti Bot Protection with SafeLine 7.0

Anti Bot Protection with SafeLine 7.0

6
Comments
3 min read
What is a Reverse Proxy

What is a Reverse Proxy

13
Comments 1
3 min read
What is an Upstream Server

What is an Upstream Server

9
Comments 1
3 min read
What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

5
Comments
3 min read
What Are Web Application Security Detection Rules?

What Are Web Application Security Detection Rules?

7
Comments
3 min read
How to Achieve Load Balancing with SafeLine WAF

How to Achieve Load Balancing with SafeLine WAF

8
Comments
2 min read
QPS for Beginners

QPS for Beginners

10
Comments
3 min read
HTTP/3 for Beginners and How to Protect Your HTTP/3 Website

HTTP/3 for Beginners and How to Protect Your HTTP/3 Website

11
Comments
3 min read
How to Purchase a SafeLine Pro License

How to Purchase a SafeLine Pro License

17
Comments
2 min read
What each container does in SafeLine WAF

What each container does in SafeLine WAF

10
Comments
3 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
Beginner's Guide to Understanding CDN

Beginner's Guide to Understanding CDN

7
Comments
2 min read
Analysis of the Compose Configuration File for SafeLine WAF - MGT

Analysis of the Compose Configuration File for SafeLine WAF - MGT

6
Comments
2 min read
How to Simply Implement Human Machine Verification for Web Applications

How to Simply Implement Human Machine Verification for Web Applications

6
Comments
3 min read
Open Source IDS/IPS Suricata for Beginners

Open Source IDS/IPS Suricata for Beginners

6
Comments
3 min read
What is Tengine

What is Tengine

6
Comments
3 min read
How to Test Effectiveness of a WAF (Web Application Firewall)

How to Test Effectiveness of a WAF (Web Application Firewall)

6
Comments
3 min read
OpenAPI Tutorial for SafeLine WAF

OpenAPI Tutorial for SafeLine WAF

7
Comments
1 min read
SafeLine WAF: Free/Community vs Pro

SafeLine WAF: Free/Community vs Pro

11
Comments
1 min read
Why Do Website Owners Use SafeLine Community Edition?

Why Do Website Owners Use SafeLine Community Edition?

7
Comments
3 min read
Understanding Domains and Wildcard Domains: A Guide for Beginners

Understanding Domains and Wildcard Domains: A Guide for Beginners

6
Comments
3 min read
How to Encrypt HTML Code for Web Security

How to Encrypt HTML Code for Web Security

9
Comments
3 min read
How to Encrypt JavaScript Code for Web Security

How to Encrypt JavaScript Code for Web Security

7
Comments 2
3 min read
The Ultimate Guide to Understanding Blind SQL injection

The Ultimate Guide to Understanding Blind SQL injection

10
Comments
3 min read
Understanding Semantic Analysis Algorithms: A Beginner’s Guide

Understanding Semantic Analysis Algorithms: A Beginner’s Guide

13
Comments
3 min read
Turning Your Server into a High-Security Server with a Free WAF

Turning Your Server into a High-Security Server with a Free WAF

12
Comments
4 min read
Guide to Addressing “Network File Descriptor is Not Connected”

Guide to Addressing “Network File Descriptor is Not Connected”

10
Comments
3 min read
Addressing Container Errors in Containerized Apps

Addressing Container Errors in Containerized Apps

8
Comments
3 min read
The Opposite of Self-hosting: Third-Party Hosting

The Opposite of Self-hosting: Third-Party Hosting

6
Comments 1
3 min read
Self-Hosting: What, Why and How

Self-Hosting: What, Why and How

8
Comments 1
3 min read
Top 10 Web Application Security Threats

Top 10 Web Application Security Threats

12
Comments
6 min read
Recent 0day Threat Intelligence Alert from Darknet

Recent 0day Threat Intelligence Alert from Darknet

10
Comments
2 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

10
Comments
5 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

10
Comments
6 min read
Hotel Booking Data Breach of Taiwan Tourists

Hotel Booking Data Breach of Taiwan Tourists

10
Comments
3 min read
POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

14
Comments
3 min read
The Book Nook: A Website Security Crisis

The Book Nook: A Website Security Crisis

14
Comments
3 min read
The Hidden Key: A Tale of Access Control

The Hidden Key: A Tale of Access Control

14
Comments
3 min read
Automated Security Operations with Safeline WAF (Part 2)

Automated Security Operations with Safeline WAF (Part 2)

13
Comments
5 min read
Automated Security Operations with Safeline WAF (Part 1)

Automated Security Operations with Safeline WAF (Part 1)

12
Comments
4 min read
Kong API Gateway x SafeLine, an Open Source WAF

Kong API Gateway x SafeLine, an Open Source WAF

14
Comments
2 min read
Configuring the SSL protocol for Open Source SafeLine WAF

Configuring the SSL protocol for Open Source SafeLine WAF

9
Comments
2 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
The 6 Best Web Application Firewalls Compared (2024)

The 6 Best Web Application Firewalls Compared (2024)

11
Comments
4 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

11
Comments
3 min read
How to Secure Static Resources with Open Source WAF, SafeLine

How to Secure Static Resources with Open Source WAF, SafeLine

11
Comments
1 min read
Addressing Configuration Issues of SafeLine WAF

Addressing Configuration Issues of SafeLine WAF

16
Comments 1
5 min read
Open API Usage Tutorial for Open Source WAF SafeLine

Open API Usage Tutorial for Open Source WAF SafeLine

12
Comments
2 min read
Understanding Remoting and Serialization Frameworks in Web Apps

Understanding Remoting and Serialization Frameworks in Web Apps

11
Comments 1
3 min read
Understanding Encoding Schemes in Web Apps

Understanding Encoding Schemes in Web Apps

9
Comments
3 min read
loading...