2coffee.dev

  • Some Security Methods for Webhooks
    • webhook
    • security

    Some Security Methods for Webhooks

    Recently, I had the task of researching the integration of App Store Server Notifications, a type of webhook, to receive notifications from Apple on my server. During the integration process, I discovered some interesting details that I think would be helpful to share. If you're not familiar with what a webhook is, you can refer to the article What is a Webhook? When to Use Webhooks. We all know about making purchases within applications. When a purchase is successfully made, Apple sends a notification to our server, which contains...

    10 months ago

  • I'm Under DDoS Attack
    • other
    • ddos

    I'm Under DDoS Attack

    Since the moment I started building my website, I have always considered the possibility of it being targeted for destruction. There are various forms of attacks such as DDoS, spam, or attacks on certain security vulnerabilities... Do you think I have made any enemies that I should be worried about? Actually, no, I have never had any conflicts with anyone, but I can't escape the "watchful eyes" of these malicious actors on the internet. This is not the first website I have built, so paying attention to these unfriendly behaviors is not new to me...

    1 year ago

  • Premium
    Hello

    Me & the desire to "play with words"

    Have you tried writing? And then failed or not satisfied? At 2coffee.dev we have had a hard time with writing. Don't be discouraged, because now we have a way to help you. Click to become a member now!

    Have you tried writing? And then failed or not satisfied? At 2coffee.dev we have had a hard time with writing. Don't be discouraged, because now we have a way to help you. Click to become a member now!

    View all
  • Backdoor in JavaScript Applications through Invisible Character Attacks and Homoglyph Attacks
    • javascript

    Backdoor in JavaScript Applications through Invisible Character Attacks and Homoglyph Attacks

    A backdoor is a method to bypass regular authentication or create a "secret entrance" to remotely access a software system without typical authentication. Backdoors attempt to avoid detection through common monitoring methods like code reviews, logging, etc. Imagine being responsible for developing an API system and cleverly creating an endpoint that no one knows about except you, allowing you to easily steal user information...

    1 year ago

  • What is MIME Sniffing? How to Protect Your Website from MIME "Guessing" Attacks
    • other

    What is MIME Sniffing? How to Protect Your Website from MIME "Guessing" Attacks

    As you may already know, alongside securing your website on the server side to ensure that no one can access it and perform unauthorized actions, client-side security is also crucial. Popular web browsers are constantly being updated with security patches and additional technical specifications to enhance their security. Every user wants a browser that offers maximum protection.

    2 years ago

  • HSTS and Protecting Websites from Man-In-The-Middle Attacks
    • security
    • other

    HSTS and Protecting Websites from Man-In-The-Middle Attacks

    Protecting your website and its users from the dangers of the internet is always an important task. No one wants their website to be compromised or cause serious harm to its users. Technical specifications are constantly being updated to find solutions to prevent or at least minimize potential threats to your website and its users...

    2 years ago

  • Preventing XSS Attacks with Content Security Policy (CSP)
    • browser
    • xss

    Preventing XSS Attacks with Content Security Policy (CSP)

    Content Security Policy (CSP) is an additional security layer that helps detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data attacks. These attacks can be used for various purposes, from data theft and website defacement to distributing malware...

    2 years ago

  • What solutions are there to invalidate jwt tokens (jwt access tokens) when a user logs out?
    • jwt
    • authentication

    What solutions are there to invalidate jwt tokens (jwt access tokens) when a user logs out?

    Authenticating users through token-based authentication is becoming increasingly popular as the client-server model is widely used. While session or cookies were commonly used to identify user sessions in the past, now we have another option which is token-based authentication, especially jwt...

    2 years ago