
Learn tips and strategies to identify and address common WordPress security issues to protect your website and search rankings.
Learn tips and strategies to identify and address common WordPress security issues to protect your website and search rankings.
The best VPNs for developers, compared in-depth. Learn more about what a VPN is, why you need one, and which provider is right for you.
Tonino Jankov introduces Cloudflare, a website performance and security service, explaining how it works and how to get started using it.
Christian shows you how to deliver unexpected and large amounts of data (zip bombs) to people who might be attempting to access or crawl your server.
Your website is open to attack from a range of third-party components. Fortunately, you can restrict their activities with a robust Content Security Policy.
Dino Londis takes a look at the factors you should consider when selecting your website's DDoS protection service.
Scott explains how we can have a secure, encrypted, and hack-proof database, but still use normal SELECT and search queries on it. Interesting stuff!
In this comprehensive and advanced tutorial, Chris shows us how to scan fingerprints with Async PHP and React Native. The future is here!
Oliver talks about the most common simple hacks applied to small business websites, how a hack works, why, and whom they actually benefit. Stay safe!
Implementing social logins is making your head explode? Oauth to complex? No more! With Socialite, it's done in 30 minutes, for ANY social service.
Craig's simple tutorial is for anyone who's ever struggled to install a WordPress MySQL database using cPanel. That's everyone, right?!
Younes Rafie shows us how to add 2FA to a Laravel app - make sure your users can log in securely by adding an SMS layer!
Chris Burgess covers several useful WordPress SSL plugins and testing tools to help make your switch to HTTPS hassle free.
Ilya Bodrov-Krukowski walks through 10 common security issues when using Rails and how to avoid and manage each one.
Chris looks into two of the most feared and hated core functions of PHP: exec and eval. But are they really that evil?
Ardian Haxha introduces Keybase, a social media service for sending, receiving and sharing encrypted messages.
Viraj introduces Phpseclib: a package for securely communicating with a remote server via PHP. Execute commands, list dir trees, schedule crons, and more!
Simon Codrington demonstrates how we can add WordPress SVG media support and also improve WordPress’ processing, handling and display of SVGs overall.
Ben Dickson covers what you need to know about SQL injection and how to protect your site against it.
Charles Costa looks at the implications facial recognition may have on the doxing attacks of the future.
Deivi Taka looks at how to secure your Android apps with the Marshmallow Fingerprint API.
Ben Dickson looks at how to face the crucial IoT challenges of connectivity, security and privacy, compatibility and data collection.
Ben Dickson explores how to prevent replay attacks on your site via a nifty one-time token pattern.
Ben Dickson discusses four major challenges presented by IoT, from privacy and security to connectivity and compatibility/longevity.
Miguel implements the Halite library in a sample email sending application, to get symmetrically encrypted emails going for full communication security!
Theodhor Pandeli looks at requesting runtime permissions in Android M and N, the new permission model that gives more control to users.
Opera 38 offers a free, unrestricted, encrypted VPN which hides your browsing activities. Craig discusses the implications of easy online privacy.
Rafay Saeed Ansari walks us through a step-by-step procedure to set IP restrictions for the WordPress login page.
Shaumik examines the purpose of APIs, and how Postman can help with the critical task of testing them for functionality, exception handling and security.
Jeff Smith expands on his previous "Defensive programming" post by offering more tips on making sure your apps do what they're supposed to. Check it out!