I recently built a site for managing passwords without the need for a vault. Since there is no vault (online storage of passwords), there is nothing to hack or leak. There are also no servers for …
Security
Is it time we update our definition of a War Crime? Should civilian computers and networks be off-limit to hackers?
Hacked It seems like everyone is getting hacked. Who protects us? Are there rules? …
SSH keys are really neat! The DigitalOcean article on How To Set Up SSH Keys does an excellent job on explaining what SSH keys are and how to create them. In short, SSH keys are much more secure than …
Content Security Policy (CSP) is a great way to protect your sites. You implement it by adding a header to your web server’s HTTP response. The hardest part, in my opinion, is finding out where you …
Cloudflare Firewall rules a protecting my site from a brute force attack from a botnet. Below I’ll show you how to use Firewall Rules to keep your WordPress site safe. With the Cloudflare free plan, …
I was trying to find a simple way to secure my PHP Web App when I realized how difficult it could be. Securing it the easy way cost more money than I’m willing to spend, so I decided to build my own …
This post will cover securing a Linux server. Back in the day, I started with Red Hat 6 and Slackware 4; I still have a book from when I was learning Red Hat 6. I also ended up learning FreeBSD, but …
Adopt a dev: ltc1q9khrkdm83eayae9ffenqttgp6qhxhrvv6qfruw
Contact
- email levi.durfee@gmail.com
- encryption RSA Key
- protonmail levi@x6c.us
- www goproxy.dev
- www wappr.net
- www fetcher cdn fetcher
- www feed.levi.lol news feed
- www novault.pw vaultless passwords
Categories
- 6 how-to
- 10 javascript
- 22 php
- 5 programming
- 7 security
- 7 update