Best Practices to Protect Your Magento Company From Hackers Post date October 2, 2024 Post author By Bytes Technolab Inc Post categories In cyber-protection, good-company, Magento, magento-development, magento-development-services, magento-mobile-app-development, password-security, web-security
How to Detect Proxies on Your Site with Flask Backend and IPQuery API Post date September 7, 2024 Post author By dvr Post categories In bot-detection, flask-ip-checker, flask-proxy-checker, ipquery-api, ipquery-integration-with-flask, web-development, web-security, website-bot-detection
Redirect HTTP Traffic To HTTPS On An NGINX Server Post date August 27, 2024 Post author By RedSwitches Post categories In nginx, nginx-server, redirect-http-to-https, redirect-http-traffic, seo, web-development, web-development-guide, web-security
Understanding Authentication: A Guide to Cookie-Based and Session-Based Authentication Post date July 5, 2024 Post author By Emmanuel Okolie Post categories In authentication, backend, cookies, full-stack-development, php, session, web-development, web-security
A Deep Dive into Path Traversal Vulnerabilities Post date June 30, 2024 Post author By hackernoon Post categories In how-path-traversal-works, path-traversal-attacks, secure-web-applications, server-side-security, url-encoding-tricks, web-app-penetration-testing, web-application-security, web-security
Securing Your Data: The Advantages of Cookies Over Local and Session Storage Post date June 20, 2024 Post author By Embedded Nature Post categories In browser-security, software-development, Web Applications, web-development, web-security
Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? Post date April 2, 2024 Post author By Beloslava Petrova Post categories In cloud, web, Web Hosting & Domains, web-security
Designing & Implementing Access Control in React Post date September 28, 2022 Post author By Lakindu Hewawasam Post categories In JavaScript, react, security, web-development, web-security
Web Security: What Is a CSRF Attack? Post date July 7, 2022 Post author By Alex Zelinsky Post categories In coding, csrf, programming, web-development, web-security
Create Your Own VPN Server in 10 Minutes with Vultr & OpenVPN Post date April 27, 2022 Post author By SitePoint Sponsors Post categories In computing, developer-tools, Essential Tools, web, web-security
Understanding CSRF Attacks Post date February 23, 2022 Post author By Zell Liew Post categories In express, JavaScript, node, web-security
What You Should Know About Web Security Post date February 21, 2022 Post author By Tadeáš Peták Post categories In JavaScript, nodejs, programming, web-development, web-security
6 Best Practices to Improve Node.js Security Post date February 21, 2022 Post author By Lahiru Hewawasam Post categories In JavaScript, nodejs, programming, software-development, web-security
How Nonprofits can Protect Themselves Against Getting Hacked Post date October 1, 2021 Post author By TechSoup Post categories In cyber-security, getting-hacked, how-to-prevent-getting-hacked, nonprofit, prevent-cybercrime, security, techsoup, web-security
5 Popular Types of Penetration Testing for SaaS Businesses Post date September 5, 2021 Post author By Kanishk Tagade Post categories In cyber-security, network-security, penetration-testing, physical-security, saas, saas-security, security, web-security
The Story Behind The Most Popular Android Malware Distributor on Dark Web Post date September 1, 2021 Post author By Check Point Software Post categories In android-malware, checkpoint, cybersecurity, darkweb, good-company, hackernoon-top-story, malware, web-security
How We Pay For Free Websites With Our Privacy Post date August 23, 2021 Post author By The Markup Post categories In adtech, internet-privacy, invasion-of-privacy, privacy, the-markup, third-party-cookies, third-party-trackers, web-security
On Making The Internet A Safer Space: Inti De Ceukelaire, Head Of Hackers At Intigriti Post date August 12, 2021 Post author By Hacker Noon Post categories In bug-bounty, cybersecurity, infosec, intigriti, startup-advice, startups-of-the-year, vulnerability-disclosure, web-security
Your Guide To AWS Instance Metadata Service (IMDS) Post date August 5, 2021 Post author By Check Point Software Post categories In aws, checkpoint-research, cybersecurity, good-company, instance-metadata-service, metadata, open-reserve-proxies, web-security
Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit Post date July 27, 2021 Post author By Check Point Software Post categories In checkpoint, exploit, good-company, malware, malware-threat, security, vulnerability, web-security
Leverage Asterisk Servers for Monetization: An INJ3CTOR3 Operation Post date July 27, 2021 Post author By Check Point Software Post categories In asterisk-servers, checkpoint, cyber-attack, good-company, session-initiation-protocol, sip, voip, web-security
How to Run Reverse Shell for Hacking in Linux Post date July 14, 2021 Post author By Morpheuslord Post categories In cyber-security, cybercrime, cybersecurity, darkness-diaries, security, Shell, web-development, web-monetization, web-security
Domain Fronting 101: What is Domain Fronting and How Does it Work? Post date July 13, 2021 Post author By Jessica Truong Post categories In blogging-fellowship, content-delivery-network, cybersecurity, domain-fronting, hackernoon-top-story, internet-censorship, TLS, web-security
How to Set Up Portable VirtualBox With Kali Linux Post date June 10, 2021 Post author By Morpheuslord Post categories In cybersecurity, kali, kali-linux, security, virtual-box, virtual-machine, virtualization, web-monetization, web-security
Using a Passive Vulnerability Scan To Identify Website Security Risks Post date June 8, 2021 Post author By SmartScanner Post categories In cyber-security, cybersecurity, good-company, HTTPS, security, security-vulnerability, vulnerability-assessments, web-security
How To Enhance Website Security Post date May 13, 2021 Post author By Amelia Johnson Post categories In cyber-security-awareness, cybersecurity, internet-security, online-security, security, web-security, website-development, website-security
Common Web Security Vulnerabilities Post date May 9, 2021 Post author By SmartScanner Post categories In cross-site-scripting, good-company, hacking, passwords, security, vulnerabilities, web-security, web-vulnerabilities
Web Application Penetration Testing: A Complete Guide Post date May 1, 2021 Post author By Kanishk Tagade Post categories In cyber-security, cyber-threats, cybersecurity, penetration-testing, security, vulnerability-assessments, web-app-security, web-security
Web Application Security Explained: Why Is It Important and What Does It Include? Post date March 20, 2021 Post author By Abeshek_AntWak Post categories In application-security, cybersecurity, security, security-testing, testing, web-app-security, web-apps, web-security