Skip to content
No results
  • Home
  • About Us
  • Blog
  • Bootcamp
  • Contact Us
Secure Coding Practices
  • Home
  • About Us
  • Blog
  • Bootcamp
  • Contact Us
Secure Coding Practices
  • Language-Specific Secure Coding, Secure Coding in PHP

Guide to Avoid PHP Remote File Inclusion RFI LFI

A person’s hand typing on a laptop keyboard, with the laptop screen showing programming codes.

Credits: pexels.com (Photo by Goumbik) There’s a certain unease that creeps in when you spot an unchecked include statement in a PHP project. RFI (Remote File Inclusion) and LFI (Local File Inclusion) are traps we see students fall into all…

  • Leon I. Hicks
  • June 22, 2025
  • Language-Specific Secure Coding, Secure Coding in PHP

Master PHP Session Security Best Practices Hijacking Fixation

The hands of a developer working on a coding project, showcasing the technical aspect of software development.

Credits: pexels.com (Photo by Mart) You can spot a sloppy session setup from a mile away, usually, it’s the first thing we check when reviewing student code. Sessions are the backbone of authentication, but they’re also a favorite playground for…

  • Leon I. Hicks
  • June 21, 2025
  • Language-Specific Secure Coding, Secure Coding in PHP

Secure File Uploads PHP Implementation Guide Step-by-Step

Laptop with source code visible on the screen, surrounded by an orange lighting setup.

Credits: pexels.com (Photo by Duncan Oluwaseun) You notice the risks right away when you let users upload files. It only takes one poorly designed upload form to let in a world of trouble, malware, server crashes, or even remote code…

  • Leon I. Hicks
  • June 20, 2025
  • Language-Specific Secure Coding, Secure Coding in PHP

PHP Cross Site Scripting XSS Prevention Techniques That Work

Closeup of a screen showing intricate programming code in a dark coding environment.

Credits: pexels.com (Photo by Nemuel) You can spot the signs of a cross-site scripting (XSS) attack if you know where to look, usually, it’s hiding in plain sight, buried in a comment box or a URL parameter. Developers at our…

  • Leon I. Hicks
  • June 19, 2025
  • Language-Specific Secure Coding, Secure Coding in PHP

Prevent SQL Injection PHP PDO MySQL Guide

prevent sql injection

You can almost hear the collective sigh in a dev room when someone mentions SQL injection. It’s the sort of thing that can turn a quiet night into a disaster, and we’ve seen it firsthand, one overlooked line, and suddenly…

  • Leon I. Hicks
  • June 18, 2025
  • Language-Specific Secure Coding, Secure Coding in PHP

PHP Secure Coding Practices OWASP Recommendations You Need

Close-up view of a person's hands working on programming tasks on two laptop computers.

Credits: pexels.com (Photo by Olia Danilevich) There’s this thing that happens when you first start coding PHP, building out features feels like magic, and it’s easy to get swept up in the rush. Security? Most folks push it to the…

  • Leon I. Hicks
  • June 17, 2025
  • Language-Specific Secure Coding

Secure Coding in PHP: Top Tactics to Block Attacks

Master secure coding in PHP with expert-backed practices that prevent vulnerabilities and protect your web apps from common threats.

PHP apps get hammered by attacks every day. SQL injection, XSS, file upload tricks, you name it. If you want your code to hold up, you have to treat security as the default, not an afterthought. That means validating user…

  • Leon I. Hicks
  • June 16, 2025
  • Secure Coding in C# / .NET

Secure File IO Operations .NET Framework Core: Protect Files with Proven Practices

Secure File IO Operations .NET Framework Core

We don’t often think about how dangerous something as simple as a file can be. But we’ve seen firsthand how just one insecure file operation can open a backdoor into an otherwise secure .NET Core application. That’s why we can’t…

  • Leon I. Hicks
  • June 15, 2025
  • Secure Coding in C# / .NET

Implementing Authorization ASP.NET Core Identity: A Clear Path to Secure Access

Implementing Authorization ASP.NET Core Identity

We didn’t always think about roles and policies. Back when we built our first API, we just wanted it to work. But once real users started logging in, asking questions they shouldn’t ask, or seeing things they shouldn’t see—things clicked.…

  • Leon I. Hicks
  • June 14, 2025
  • Secure Coding in C# / .NET

Prevent Cross Site Scripting XSS ASP NET Core: How to Secure Your Web App

Prevent Cross Site Scripting XSS ASP NET Core

We’ve all stared down a blank code editor, thinking our app’s solid, airtight, ready to ship. But then—bam. A script injection sneaks in. Not because we didn’t care, but because we assumed something we shouldn’t.  That’s how Cross-Site Scripting (XSS)…

  • Leon I. Hicks
  • June 13, 2025
Prev
1 … 32 33 34 35 36 37 38 … 42
Next
Secure Coding Practices

Join a thriving global community of developers dedicated to writing cleaner, safer, and more resilient code. Whether you're just starting out or leveling up your skills, this bootcamp gives you the practical knowledge and hands-on experience needed to identify vulnerabilities, apply secure coding principles, and build software that stands up to real-world threats.

Join the Next Bootcamp →

  • About us
  • Blog
  • Bootcamp
  • Disclaimer
  • Contact us
  • Privacy Policy
  • Terms & Conditions

Copyright © 2026 SecureCodingPractices.com — All rights reserved.