Web Security
Create your own VPN server with Vultr and OpenVPN. Learn to set up a new virtual machine, configure OpenVPN, and test your new setup.
Your website is open to attack from a range of third-party components. Fortunately, you can restrict their activities with a robust Content Security Policy.
Your primary website domain can be served on an address without the 'www' so is it necessary? Craig discusses the pros, cons and technical solutions.
Every website needs encryption. Read about the benefits that HTTPS offers to you and to your site's visitors, and then get started today!
The range of hosting options has become bewilderingly complex. Craig discusses the advantages and disadvantages of choosing a shared server option.
When you're new to the world of internet hosting, figuring out all options can be tough. In this article, Craig Buckler explains the dedicated server.
Ardian Haxha introduces Keybase, a social media service for sending, receiving and sharing encrypted messages.
Ben Dickson explores how to prevent replay attacks on your site via a nifty one-time token pattern.
Ben Dickson discusses four major challenges presented by IoT, from privacy and security to connectivity and compatibility/longevity.
Elio Qoshi looks at why he is hesitant to adopt the IoT or recommend it to consumers — security, quality and transparency concerns.
Shaumik introduces web scraping, and how you can create your own web scraping scripts for collecting data from the web.
Opera 38 offers a free, unrestricted, encrypted VPN which hides your browsing activities. Craig discusses the implications of easy online privacy.
Failure is a wonderful teacher – as long as it doesn't kill you. CyberCity lets hackers and security experts practice without anyone getting hurt.
Having a device that knows you better than your mom could be great for security. But it also marks a change in the power dynamic. Are you ready for that?
Tanay Pant introduces ProtonMail, a free, web-based, encrypted email service based in Switzerland.
Lukas White provides an introduction to the art and science of web app monitoring, and explains how Monitis can help you monitor smarter.
You need rarely worry about caching — until you're hit by bizarre behavior, such as pages returning JSON data on the live app but not the test versions ...
Jim Chiodo outlines common mistakes with website privacy policies that could put you at risk of fines or lawsuits.
DK Lynn details how to detect hacked files with SuperScan, a CRON script that tracks site changes and reports any changes to files in an account.
Ian Oxley looks at using CSP to create a whitelist of allowable resource types and locations, to prevent website injection attacks such as XXS.
Craig interviews SitePoint's Jude Aakjaer about the challenges of integrating hardware, software and services into cohesive systems which keep running.
Pavlo Prystupa goes through the questions your business should be asking to ensure you're safe in the cloud.
By default, every website is accessible to the whole planet. In this article we show you how to block entire countries, with pros, cons and code samples.
From having the right tools to tailoring your environment to suit, SitePoint sysadmin Adam Bolte shares his tips for surviving a life of being on-call.
It's possible to create a secure system which doesn't rely on passwords, biometrics or any complicated solutions. Craig looks at the pros and cons
Matthew Setter considers the security implications of transferring files over FTP - a common practice among developers, and how the process can be improved.
Shaumik Daityari takes a look at the emerging trend of ChatOps, and looks at how VictorOps can take your chat app's development powers even further.
Dhaivat Pandya explains how to use VictorOps' REST endpoint to integrate it with other services, in this case, SalesForce.
Read Surviving in the Age of Internet Pirates and learn with SitePoint. Our web development and design tutorials, courses, and books will teach you HTML, CSS, JavaScript, PHP, Python, and more.
IT security and network infrastructure expert Nazar Tymoshyk explains 5 ways to make sure your company's IT systems are secure.