An Introductory guide to securing your Express.js apps by setting various secure HTTP headers.

Photo by Unsplash


Helmet is a collection of middleware functions that has http response headers. It can be used in different Node.js frameworks but it has been promoted to use mainly with Express.js. We’ll also use Express for the demonstration of the library. Basically, it is used to secure your http response headers.

Sometimes developers ignore the HTTP headers. Since HTTP headers can leak sensitive information about the application, therefore, it is important to use the headers in a secure way.

Headers included in Helmet.js: Helmet.js comes with more…

Cron is a daemon used in *nix systems (Unix and Linux). It executes scheduled jobs known as cronjobs.

With this utility, you can run some commands or some of your scripts regularly or some fixed frequent time period.

In *nix systems, you can use this utility by command crontab. It creates a crontab file that contains different instructions for the cron daemon. It runs as cron.service.

crontab -l

This will lists all the active cronjobs for the user.

crontab -e

This will edit your crontab file, or create one if it doesn’t already exist for the user.

crontab -a ‘file-name’

npm logo

Every web developer has dealt with npm throughout their career. It is a fascinating packaging tool which provides you many important packages and helps you to add and manage your dependencies for your webapp.

It’s a package manager (short for Node Package Manager) for the javascript programming language. It can manage your local packages and its dependencies for your project. It is usually comes pre-bundled with Node.js installer.

But, have you thought that how this packages are available on npm? They are uploaded by such devs as you and me!

In this article I’m gonna tell you how to publish…

Almighty config

There are very less chances in a developer’s programming career, where they haven’t used SSH , whether it involves cloning a git repository or connecting to a remote server. We’ve all been there.

But beyond the ssh protocol itself, there’s a configuration file for it, commonly known as ssh config file. Usually it’s created in ~/.ssh directory and named as config. It can be used to ease your ‘ssh-ing’ into any remote.

Note that this blog is for beginner level only so we will not go into depth.

There are two types of config files:

  1. system-wide config file (/etc/ssh/ssh_config) —…

Enthuastic Developer. Linux, Network and Security Excites me

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store