PinnedEnhancing Data Privacy Protection in Indonesia: Integrating Next.jsThis story start when in my current jobs there are regulations to add some security in data privacy because of the government regulations…Oct 12Oct 12
Fixing the Node Cross-Spawn Vulnerability (CVE-2024–21538): What You Need to Know!On November 18, 2024, after addressing some bugs and deploying the fixes to the staging environment, an unexpected warning appeared in…2d ago22d ago2
Alternatives Approaches for Secure libcrypto and libssl Management in Vulnerability Mitigation…Security is paramount when building and deploying applications on the internet. For systems supporting essential business functions, even a…Nov 13Nov 13
MinIO as Scalable and Resilient Cloud Storage with Elysia.js #3As our applications continue to grow in both functionality and user base, managing data storage efficiently has become a pivotal challenge…Oct 30Oct 30
Build An Paddy Disesase Object Detection with ONLY $13In the current era, AI has become a powerful tool that simplifies our work and makes analysis more efficient. However, many might think…Oct 21Oct 21
JWT Authentication Elysia.js with Redis #3Today, I’ll be sharing details about a mini-project i worked on that implements authentication while incorporating security features like…Sep 27Sep 27
File Upload and Security Validation on Elysia.js #2In this next part, based on first meets. We already learn how the basic implement clean code in using Elysia.js. In this story, i explore…Sep 19Sep 19
Prisma and Clean Code Pattern For Elysiajs #1When do some researchers about back-end development frameworks in typescript based, i found an unique framework. That’s not just unique but…Sep 16Sep 16