MeshWorld India Logo MeshWorld.
Back to Tags
Topic View

#Security.

Web and application security tutorials covering OWASP, authentication, encryption, and secure coding practices.

35 posts
Jan 2018 – Apr 2026
Filed under this topic
IRS Dirty Dozen 2026: The Definitive Guide to This Year's Tax Scams
AI 5 min read

IRS Dirty Dozen 2026: The Definitive Guide to This Year's Tax Scams

From AI voice cloning to 'Ghost' preparers and Form 2439 abuse, here is the complete breakdown of the 2026 IRS Dirty Dozen scams and how to stay safe.

Arjun
Arjun
AI-Powered Phishing: Why You Can No Longer Trust Your Inbox
AI 5 min read

AI-Powered Phishing: Why You Can No Longer Trust Your Inbox

Phishing isn't about typos anymore. It's about perfect LLM lures and deepfake voices that sound exactly like your boss. Here is how I protect systems in 2026.

Arjun
Arjun
How to Audit What Data Your Apps Are Sending
Security 5 min read

How to Audit What Data Your Apps Are Sending

Learn to audit app network traffic on macOS, Linux, and mobile. Use mitmproxy, Wireshark, and Charles Proxy to see exactly what data your apps are sending.

Arjun
Arjun
SSH Config & Aliases: The Developer's Connection Kit
SSH 5 min read

SSH Config & Aliases: The Developer's Connection Kit

Master SSH configuration — host aliases, jump hosts, key management, port forwarding, and secure connections. Save time with ~/.ssh/config automation.

Jena
Jena
How to Use Environment Variables in Docker
Docker 5 min read

How to Use Environment Variables in Docker

Manage environment variables in Docker containers and Compose files — inline values, .env files, runtime injection, secrets, and production patterns.

Cobie
Cobie
Docker Multi-Stage Builds: Smaller Images, Faster Deploys
Docker 5 min read

Docker Multi-Stage Builds: Smaller Images, Faster Deploys

Master Docker multi-stage builds — reduce image size, improve security, speed up builds. Production-ready patterns for Node.js, Python, Go, and more.

Cobie
Cobie
How to Harden SSH on a Linux Server
SSH 5 min read

How to Harden SSH on a Linux Server

Step-by-step SSH hardening guide. Learn to disable root login, enforce SSH keys, change ports, and add 2FA to protect your Linux server from brute-force bots.

Jena
Jena
Nginx Cheat Sheet: Routing, SSL & Performance Guide
Cheatsheet 5 min read

Nginx Cheat Sheet: Routing, SSL & Performance Guide

Complete Nginx reference for server blocks, location matching, and proxy_pass. Optimize SSL/TLS, rate limiting, and use our production-ready config template.

Jena
Jena
AI Is Now Fighting AI in Cybersecurity
AI 5 min read

AI Is Now Fighting AI in Cybersecurity

RSAC 2026 insight: Humans can't secure AI systems alone. Discover the new model of AI agents auditing each other with human oversight to handle machine speed.

Arjun
Arjun
How to Prevent Image Hotlinking in 2026
HowTo 5 min read

How to Prevent Image Hotlinking in 2026

Stop sites from stealing your bandwidth. Block image hotlinking with Apache, Nginx, Cloudflare, AWS, Vercel, and Netlify using these copy-paste configurations.

Vishnu
Vishnu
How to Secure Your WordPress Site in 2026
WordPress 5 min read

How to Secure Your WordPress Site in 2026

Ten steps to harden a self-hosted WordPress install — file permissions, login protection, 2FA, XML-RPC, and WAF. Updated for WordPress 6.x in 2026.

Vishnu
Vishnu
AI Agent Security: Preventing Data Leaks & Infinite API Loops
AI 5 min read

AI Agent Security: Preventing Data Leaks & Infinite API Loops

Securing AI agents is critical. Learn to prevent prompt injections, SSRF, and infinite API loops while maintaining safe access to production databases.

Vishnu
Vishnu
AI vs. AI: The Complete 2026 Guide to Killing Phishing and Scams
AI 5 min read

AI vs. AI: The Complete 2026 Guide to Killing Phishing and Scams

Protect yourself from AI-powered scams, voice cloning, and phishing. Learn to use smart tools and defense strategies to secure your identity and money in 2026.

Arjun
Arjun
Spotting Deepfake Video in Real-Time: A 2026 Guide for Remote Workers
AI 5 min read

Spotting Deepfake Video in Real-Time: A 2026 Guide for Remote Workers

Learn to spot real-time deepfakes on Zoom and Teams. Use AI verification overlays and behavioral 'glitch tests' to detect scammers impersonating staff.

Arjun
Arjun
Real-Time AI Phishing Detection: Stop Clicking Bad Links in 2026
AI 5 min read

Real-Time AI Phishing Detection: Stop Clicking Bad Links in 2026

Stop clicking malicious links with AI phishing detection. Learn how security agents detect 'Intent Divergence' to block sophisticated scams instantly in 2026.

Arjun
Arjun
AI-Driven Financial Security: Stop Scammers in Real-Time
AI 5 min read

AI-Driven Financial Security: Stop Scammers in Real-Time

Stop financial scams in real-time with AI transaction monitoring. Detect fraudulent merchants and high-risk wallets before you authorize any payments.

Arjun
Arjun
Stopping AI DM Scams on LinkedIn, Twitter, and WhatsApp
AI 5 min read

Stopping AI DM Scams on LinkedIn, Twitter, and WhatsApp

Learn to stop AI-driven DM scams on LinkedIn and WhatsApp. Use sentiment analysis and filters to detect 'Scam Vibes' from fake recruiters and crypto bots.

Arjun
Arjun
The 2026 Guide to Killing Voice-Clones and Deepfake Calls
AI 5 min read

The 2026 Guide to Killing Voice-Clones and Deepfake Calls

Protect your family from voice-cloning scams. Learn to use AI call screening and challenge-response protocols to verify deepfake calls in just 30 seconds.

Arjun
Arjun
Burner Email Guide 2026: 12+ Tools to Stop Spam
Privacy 5 min read

Burner Email Guide 2026: 12+ Tools to Stop Spam

Protect your privacy from AI trackers and spam. Learn to use 10-minute inboxes, alias services, and anonymous forwarding to keep your main inbox clean.

Darsh Jariwala
Darsh Jariwala
How to Generate Unlimited Gmail Aliases from One Account
Gmail 5 min read

How to Generate Unlimited Gmail Aliases from One Account

Learn how to use Gmail Plus and Dot addressing to create infinite email aliases. Track data leaks, manage spam, and loop free trials with one account in 2026.

Darsh Jariwala
Darsh Jariwala
File System Skills: Let Your Agent Read and Write Files
Agent Skills 5 min read

File System Skills: Let Your Agent Read and Write Files

Build safe file system skills that let an agent read, write, and list files — with path sandboxing, size limits, and guardrails to prevent runaway writes.

Vishnu
Vishnu
Private Search Engines that Do Not Track
List 5 min read

Private Search Engines that Do Not Track

A practical 2026 guide to privacy-focused search engines that reduce tracking, plus what each option is actually good at.

Vishnu
Vishnu
How to Set Up SSH Keys for GitHub (All Platforms)
HowTo 5 min read

How to Set Up SSH Keys for GitHub (All Platforms)

Generate SSH keys for GitHub on Ubuntu, macOS, and Windows. Learn to add keys to your account, manage multiple profiles, and troubleshoot connection issues.

Vishnu
Vishnu
How to Set Up a .env File and Stop Leaking Secrets
HowTo 5 min read

How to Set Up a .env File and Stop Leaking Secrets

Learn how to set up .env files in Node.js, Python, and Docker. Avoid common mistakes that expose API keys and manage your secrets safely in production.

Vishnu
Vishnu
SSH & GPG Cheat Sheet: Keys, Tunnels & Signed Commits
Cheatsheet 5 min read

SSH & GPG Cheat Sheet: Keys, Tunnels & Signed Commits

Complete SSH and GPG reference — key generation, ssh-agent, config file aliases, port forwarding, database tunneling, GPG signing, and signed git commits.

Vishnu
Vishnu
What You Should Never Paste Into AI Tools at Work
AI 5 min read

What You Should Never Paste Into AI Tools at Work

A practical security guide for teams using ChatGPT and other AI tools without accidentally leaking secrets, contracts, or customer data.

Vishnu
Vishnu
How to Spot AI-Generated Phishing Before You Click
AI 5 min read

How to Spot AI-Generated Phishing Before You Click

Generative AI has made phishing emails cleaner and more believable. This guide shows the practical signs that still give them away.

Vishnu
Vishnu
Prompt Injection, Explained for Normal People
AI 5 min read

Prompt Injection, Explained for Normal People

Prompt injection sounds technical, but the core idea is simple: attackers hide instructions inside content and try to make an AI system obey them.

Vishnu
Vishnu
How to Evaluate AI Security Tools Without Buying the Marketing
AI 5 min read

How to Evaluate AI Security Tools Without Buying the Marketing

A practical guide to evaluating AI security products so teams can separate useful controls from vague dashboards and inflated claims.

Vishnu
Vishnu
How to Red-Team Your Own Chatbot Before Users Do
AI 5 min read

How to Red-Team Your Own Chatbot Before Users Do

A practical starting guide for teams that want to test their chatbot for jailbreaks, prompt injection, unsafe outputs, and data leakage before launch.

Vishnu
Vishnu
An AI Security Checklist for Small Teams Shipping Fast
AI 5 min read

An AI Security Checklist for Small Teams Shipping Fast

A practical AI security checklist for small teams that want to move quickly without ignoring prompts, data exposure, tools, and basic safeguards.

Vishnu
Vishnu
Use Malwarebytes for ChatGPT to Fight AI Phishing Scams
AI 5 min read

Use Malwarebytes for ChatGPT to Fight AI Phishing Scams

Stop AI phishing with the Malwarebytes ChatGPT app. Learn to investigate delivery scams, bank alerts, and suspicious links faster using real-time threat data.

Vishnu
Vishnu
I Used Claude to Review My Code for a Week. Here Is What It Caught.
Claude 5 min read

I Used Claude to Review My Code for a Week. Here Is What It Caught.

A week-long experiment using Claude as a daily code reviewer on a real Node.js project — bugs found, security issues caught, and what actually changed.

Vishnu
Vishnu
GitHub Actions Secrets: Best Practices to Secure Credentials
GitHub Actions 5 min read

GitHub Actions Secrets: Best Practices to Secure Credentials

Stop leaking credentials in CI/CD. Learn to store, scope, and manage GitHub Actions secrets correctly while avoiding common pitfalls that expose API keys.

Vishnu
Vishnu
Install DuckDuckGo on any device to take your privacy back!
HowTo 5 min read

Install DuckDuckGo on any device to take your privacy back!

Learn how to install DuckDuckGo on any device to protect your online privacy. Block trackers, use private search, and take control of your data today.

Vishnu
Vishnu

Related Topics

Discover more topics that complement what you've been reading about.