How to Protect and Encrypt Files using VeraCrypt

Using VeraCrypt, you can easily protect important files. This open-source software allows you to protect your files with passwords. You can create an encrypted file container with a password of your choice, save confidential files in it, and access the files later by decrypting the container. This article provides a step-by-step guide on creating an … Read more

Configure Cloudflare Zero Trust for Web Applications

Attackers often target the login page of a web application. Security mechanisms such as Two-Factor Authentication (2FA), Rate Limitation, and Web Application Firewall (WAF) are adopted to mitigate the security risks. Cloudflare Zero Trust (a.k.a. Cloudflare Access) is a security model which offers the ability to verify user identity for accessing web applications. You can … Read more

Cryptography Basics: Encryption and Hashing

Cryptography can be separated into major categories including Asymmetric Encryption, Symmetric Encryption and Hashes. The article explains the categories with related examples and screen captures. Asymmetric and symmetric encryption Asymmetric encryption In terms of asymmetric encryption, different keys are used for encryption and decryption. The public key can be revealed to everyone. Therefore, it is … Read more

Security Basics: Configure Cloudflare CDN

Websites are frequently targeted by hackers as they can be accessed by anyone on the Internet. Looking at the access logs of a web server, it is not unusual to discover that bad actors attempted to make multiple HTTP POST requests with query strings. Attackers may try to access your admin panel through brute force … Read more