monday 3rd, february 2025
"in summary, there are three common ways that a browser uses to determine the character encoding of an html document, ordered by priority..."
source: sonarsource.com // stefan schiller format: text year: 2024 cache: webarchive provided by: eric sunday 22nd, december 2024
"a proliferation of vendors, underclear ownership of services and assets, and the difficulty of successfully communicating and explaining security risks exacerbate other security problems..."
source: tldrsec.com // maya kaczorowski format: text year: 2024 cache: webarchive provided by: eric thursday 19th, december 2024
"cross-origin resource sharing (cors) is a specification that enables truly open access across domain-boundaries. if you serve public content, please consider using cors to open it up for universal javascript/browser access..."
source: enable-cors.org format: text year: 2024 cache: webarchive provided by: eric monday 16th, december 2024
"dns was not designed with security in mind, and there are many types of attacks created to exploit vulnerabilities in the dns system..."
source: cloudflare.com format: text year: 2024 cache: webarchive provided by: eric thursday 12th, december 2024
"dnssec authenticates dns using digital signatures based on public key cryptography. with dnssec, it's not dns queries or response that are signed but rather the dns data itself is signed by the owner of the data..."
source: upguard.com // abi tyas tunggal format: text year: 2024 cache: webarchive provided by: eric "the internet engineering task force (ietf), which is responsible for standardizing the dns protocol, has been working steadily to improve the security and stability of dns. one key enhancement is the dns security extensions (dnssec) suite of features that adds authentication and validation in dns using digital signatures..."
source: catchpoint.com format: text year: 2024 cache: webarchive provided by: eric "dns security is like air traffic control for the internet. it manages the flow of data to ensure safe and correct routing, just like planes in crowded airspace..."
source: spaceship.com // colleen branch format: text year: 2024 cache: webarchive provided by: eric monday 9th, december 2024
"whether we like it or not, the entire internet is continuously scanned by bots looking for vulnerabilities, and, as soon as your website is even mildly popular, you will get even more attack attempts from criminals and bored hackers..."
source: kerkour.com // sylvain kerkour format: text year: 2024 cache: webarchive provided by: eric wednesday 4th, december 2024
"this article is about cross-site leak attacks and what recent defenses have been introduced to counter them. i also want to finally answer the question why web security best practices is always opt-in and finally how you can get increased security controls..."
source: frederikbraun.de // frederik braun format: text year: 2024 cache: webarchive provided by: eric friday 13th, september 2024
"your bitwarden vault contains (hopefully) all of your passwords and other sensitive data, so it would be good to have a backup of it in case something goes wrong..."
source: davidisaksson.dev // david isaksson format: text year: 2023 cache: webarchive provided by: eric load more