Yanick Van Weydeveldt
Browse Topics
About
Get in Touch
Security & Hardening
17 posts
CVEs: Identify, Prioritise, and Manage Security Vulnerabilities
Hashing: Verify Data Integrity, Detect Corruption, and Identify Tampering
NGINX: Set Up Basic HTTP Authentication for Secure Access Control
Backup Fundamentals: Key Principles for Secure and Resilient Data Protection
Default Settings Are Insecure: Harden Configurations Before Deployment
NGINX: Harden Security and Boost Performance
HTTPS: Secure Your Website and Protect User Data from Threats
NGINX: Configure a Cloudflare Domain and Enable HTTPS
Linux Webserver: Harden with Proven Techniques
Domain Security Guide: Prevent Email Spoofing and Abuse
Ransomware Explained: Protect Your Systems and Secure Your Data
Secure Unused and Parked Domains from Spoofing and Abuse
SPF, DKIM & DMARC: Protect Your Domain Against Email Spoofing
Phishing Explained: Recognise and Prevent Email Scams
Email Spoofing Explained: Prevent Domain Abuse and Deceptive Attacks
SSH: Harden Remote Access with Proven Techniques
Cybersecurity: Strengthen Passwords and Manage Them Securely