ПІДТРИМАЙ УКРАЇНУ ПІДТРИМАТИ АРМІЮ
Uk Uk

 Результат пошуку по запиту security 

IT

What is Forward Proxy and Reverse Proxy

We will encounter the terms forward proxy and reverse proxy at every turn. Before we get into the...

by @author 02 Грудня 2023
IT

What is the TCP/IP model

The TCP/IP model, whose origins date back to the 1970s, is also called the protocol model. It is...

by Mr. IT-man 02 Грудня 2023
IT

Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

$:# kubectl get ns Unable to connect to the server: x509: certificate is valid ... $:# Enter...

by Mr. IT-man 02 Грудня 2023
IT

Top 5 WordPress Security Threats

Security Threats for WordPress, is one of the most popular content management systems (CMS) on the internet.

by Mr. IT-man 26 Вересня 2023
IT

Architecting for Security: MySQL Edition

MySQL is a powerful, but complicated database management system - as popular as this RDBMS might be,...

by Mr. IT-man 26 Березня 2023
IT

OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

The Release Notes for OpenSSH 9.2 (published on 2023-02-02) mentioned “stricter default sandbox...

by Mr. IT-man 26 Березня 2023
IT

Improving security in HTTPS communication

Introduction We are living in a world where almost not left self-sufficient...

by Mr. IT-man 26 Березня 2023
IT

Securing Your Web Applications with PHP OOP and PDO

PHP is a widely-used scripting language for web development, and object-oriented programming (OOP) is...

by Mr. IT-man 26 Березня 2023
IT

A lesser-known vector for XSS attacks: SVG files

Cross-site scripting (XSS) is a type of security vulnerability commonly found in web applications....

by Mr. IT-man 26 Березня 2023
IT

Improving the Security of JSON Web Tokens (JWTs)

JSON Web Tokens (JWTs) are a popular way to securely authenticate users and exchange information...

by Mr. IT-man 26 Березня 2023
IT

SSL/TLS Configuration

SSL/TLSare cryptographic protocols that establish secure communication channels between web servers and browsers to protect data exchanged between them from unauthorized access and tampering

by Mr. IT-man 06 Березня 2023
IT

What is a cookie, and what are they used for?

If you are reading this, you are probably wondering what a cookie is. First, this cookie is not...

by Mr. IT-man 12 Січня 2023

Scroll to Top