Quantcast
Channel: Lock Me Down
Browsing all 10 articles
Browse latest View live

Docker for Devs Part 1: Containerizing Your Application

Part 1: Containerize your Application Environment (this post) Part 2: Creating a Developer Image Part 3: Hot Module Reloading and Code Updates in Containers Part 4: Composing Multi-container Networks...

View Article


Docker for Developers Part 2: Creating a Developer Image

Part 1: Containerize your Application Environment Part 2: Creating a Developer Image (this post) Part 3: Hot Module Reloading and Code Updates in Containers Part 4: Composing Multi-container Networks...

View Article

Docker for Devs Part 3: Hot Module Reloading and Live Editing in Containers

Part 1: Containerize your Application Environment Part 2: Creating a Developer Image Part 3: Hot Module Reloading and Live Editing in Containers (this post) Part 4: Composing Multi-container Networks...

View Article

Docker for Devs Part 4: Composing Multi-container Networks with Docker Compose

Part 1: Containerize your Application Environment  Part 2: Creating a Developer Image Part 3: Hot Module Reloading and Live Editing in Containers Part 4: Composing Multi-container Networks with Docker...

View Article

Show 9: DDoS History as a Cyber Weapon Part 1

Story: DDoS History as a Cyber Weapon Like so many advancements in human history, they often have a tendency to be used for more than what the originator had conceived.  The internet provides a vast...

View Article


Docker for Devs Part 5: Sharing Images with Your Team Using Docker Hub

Part 1: Containerize your Application Environment  Part 2: Creating a Developer Image Part 3: Hot Module Reloading and Live Editing in Containers Part 4: Composing Multi-container Networks Sharing...

View Article

Securing Node.js: MongoDB Security from Injection Attacks

Due to the high popularity of RDBMS based databases and the lack of adoption of NoSQL database, the notion of SQL injection attacks became the defecto known type of injections attacks.  Because of...

View Article

3 Simple but Powerful Rules to Identify Your Applications Untrusted Data

What common denominator does the following web security risks all have in common? Cross-site Scripting (XSS) SQL / Injection Attacks Missing Function Level Access Controls Unvalidated Redirects and...

View Article


Docker for Devs: Debug Docker Containers with WebStorm

If you’re using Docker to host your applications development environment, it will be important to know how to debug your applications source code running in the container. This is the first of a three...

View Article


5 Steps to Handling Untrusted Node.js Data

Node.js Data In Your Application The role that untrusted data plays in a vast array of web security vulnerabilities is on par with a nuclear power plants dependency on water. Remove one and you...

View Article
Browsing all 10 articles
Browse latest View live