Best of AuthenticationDecember 2022

  1. 1
    Article
    Avatar of hackernoonHacker Noon·3y

    How to Build a Smooth Authentication Flow System with Firebase

    An authentication service protects your website from unverified users having access to the website's features or contents. It ensures users' identity is genuine by verifying their credentials, which are usually the username/email and password. We've all experienced this on platforms such as Facebook, Instagram or Twitter when we are trying to sign into our accounts.

  2. 2
    Article
    Avatar of communityCommunity Picks·3y

    How JWTs Could Be Dangerous and Its Alternatives

    JWTs are the most popularly used tokens for web authentication and managing user sessions in modern-day software applications. They are a standardized format for securely transferring cryptographically signed data across systems. JWTs can make websites vulnerable to a variety of high-security threats and attacks if not managed properly.

  3. 3
    Article
    Avatar of phProduct Hunt·3y

    Hyper Fetch - Framework for data exchange, async state management and more

    Framework for data exchange,ync state management and more. Take advantage of caching, queuing, persistence, offline first support, request deduplication, authentication and authentication.

  4. 4
    Article
    Avatar of changelogChangelog·3y

    SSH server hardening

    Some are trivial and should be set immediately, and some require some more work. For the upcoming changes of the config, I have to edit. It might differ from your setup. Please make sure that you test it on another machine first. There are options to lock you out if it is not set up correctly.

  5. 5
    Article
    Avatar of auth0Auth0·3y

    Auth0 SDK for NextJS v2.0 released!

    Auth0 SDK for NextJS v2.0 released! The Auth0 team released a new major version of the Auth0 NextJS SDK. This article will cover some of the most significant changes, but for a complete set, plus indications on how to migrate your current project to the new SDK.

  6. 6
    Article
    Avatar of vercelVercel·3y

    Announcing SvelteKit Auth: Bringing NextAuth.js to all frameworks – Vercel

    SvelteKit Auth (experimental) is the first framework outside of Next.js officially supported, built on top of the new decoupled library. This new package marks the larger move to Auth.js, providing authentication for the Web, with any framework you like.

  7. 7
    Article
    Avatar of moralisMoralis·3y

    Python for Ethereum Development – Build a Web3 Ethereum Python App

    Python is one of the most popular programming languages used by developers all over the world. In this tutorial, we will show you how to integrate Web3 and blockchain functionality into Python projects with Moralis’ Python SDK. In the next section, we cover the basics by exploring the intricacies of Python.

  8. 8
    Article
    Avatar of drDark Reading·3y

    Why Attackers Target GitHub, and How You Can Secure It

    Last week Okta announced a security breach that involved an attacker gaining access to its source code hosted in GitHub. GitHub is the most popular source code management tool for both open source and private enterprise code repositories. A single stolen repository can yield intellectual property, valid credentials, and a nice list of vulnerabilities in production software.

  9. 9
    Article
    Avatar of reactnativeexampleReact Native Example·3y

    FoodHub application with React Native

    FoodHub application with React Native foodHubApp-ReactNative Project features. FoodHub app includes React Native app, React Native and React Native Flash Message Screens. For more information on React Native, visit React Native FoodHubApp.com.

  10. 10
    Article
    Avatar of supabaseSupabase·3y

    Multi-factor Authentication via Row Level Security Enforcement

    Multi-factor authentication (MFA) adds an additional layer of security to your application by letting you verify users’ identity through extra steps. We built MFA in response to customer requests - developers wanted enhanced security - be it for compliance, client requirements, or simply for peace of mind.