What Is Email Obfuscation?

Learn about why and how email addresses are obfuscated on websites.

Learn More

What is Web Application Firewall (WAF) and How is it Used to Protect Your Website?

WAFs -- their pros, cons and how they work.

Learn More

What is a Honeypot?

What "honeypot" servers are, how they're used and why they exist.

Learn More

What are Cross Site Scripting (XSS) attacks?

What XSS attacks are and how attacks take place.

Learn More

What Are Man In The Middle (MITM) Attacks?

What MITM attacks are, and why they're dangerous.

Learn More

What is CAPTCHA? How does it work and is it effective?

How CAPTCHA challenges are retrieved, processed, and some of their pros/cons.

Learn More