Web Security
X-XSS-Protection
X-XSS-Protection X-XSS-Protection allows developers to change the behavior of the Reflected XSS (Cross-Site Scripting) security filters. These...
X-Permitted-Cross-Domain-Policies
X-Permitted-Cross-Domain-Policies Using Adobe products like PDF, Flash, etc.? You can implement this header to instruct...
X-Frame-Options
X-Frame-Options The X-Frame-Options Header is a security header suggested by Microsoft to avoid the UI...
X-Content-Type-Options
X-Content-Type-Options This HTTP header is typically used to control the MIME Type Sniffing function in...
What is VPN?
A Virtual Private Network (VPN) is a technology that allows users to create a secure...
Types of IP addresses: All you need to know
An IP address, or Internet Protocol address, serves as a unique identifier for devices connected...
Referrer-Policy
Referrer-Policy Referer is a request header that is confusing on multiple levels. First of all...
Permissions-Policy
Permissions-Policy Earlier known as Feature-Policy, it is renamed as Permissions-Policy with enhanced features. You can...
IPv4 vs. IPv6: Differences
IPv4 and IPv6 are two versions of the Internet Protocol (IP) used to identify devices...
HTTP Strict Transport Security
HTTP Strict Transport Security HSTS (HTTP Strict Transport Security) header to ensure all communication from...
How accurate is IP-based Geolocation Lookup?
IP-based geolocation lookup estimates the physical location of an internet-connected device based on its IP...
Expect-CT
Expect-CT The header that will eventually replace HPKP is called Expect-CT. Even though HPKP was...
- 1
- 2