Blog
Articles on hosting, software
and the digital world.
Category: Security
How to Check if a Link is Safe in 2026: URL Lookup, Phishing Detection and Website Safety
The 2026 guide to checking whether a link is safe: URL parsing, HTTPS/SSL inspection, WHOIS age, Google Safe Browsing, VirusTotal, urlscan.io, sandbox analysis and phishing indicators.
How to Get an SSL Certificate: Free vs Paid Options Explained
How and where to get an SSL/TLS certificate. Let's Encrypt, ZeroSSL, Sectigo and DigiCert compared. Installation with Certbot, acme.sh, cPanel and Plesk. CSR generation, Nginx TLS 1.3 config and A+ security.
Password Hashing: bcrypt, argon2id and scrypt Compared
Modern password hashing — bcrypt, argon2id and scrypt compared, salt, pepper, work factor tuning and Node.js / Python implementations.
HTTPS and TLS 1.3: Modern Web Encryption and Performance
HTTPS and TLS 1.3 — handshake tuning, cipher suite selection, HSTS, OCSP stapling, an SSL Labs A+ score and performance.
OAuth 2.0 and OIDC: Secure Auth with the Authorization Code Flow
OAuth 2.0 and OpenID Connect — authorization code flow, PKCE, scopes, refresh tokens and a guide to integrating social login.
Multi-Layer DDoS Protection with Cloudflare and Nginx
DDoS attack types (L3/L4/L7), Cloudflare WAF, Nginx rate limiting, Fail2ban and application-level defences — the full stack.
JWT Security Pitfalls: alg:none, Weak Secrets, JKU Attack and How to Defend
JSON Web Token security issues — alg:none, weak secrets, JKU/X5U injection, algorithm confusion and the controls that make JWT safe.
XSS Attacks and Defending with Content Security Policy (CSP)
Reflected, stored and DOM-based XSS explained, plus sanitization, output encoding and layered protection with Content Security Policy.
SQL Injection: How It Works and How Parameterized Queries Stop It
The mechanics of classic, blind, time-based and union-based SQL injection, plus how prepared statements and ORMs shut them down for good.
OWASP Top 10 2026: Web Application Risks and How to Prevent Them
A walkthrough of the OWASP Top 10 2026 — Broken Access Control, Injection, Cryptographic Failures, SSRF and more, with practical mitigations.
Minecraft & Game Guides
Server setup, plugins, optimization guides in our gaming section.