Mask your email from Spam

Masking by character encoding Common character encoding, used when masking email addresses in the source code, is based on HTML […]

IPBAN – Windows

In Linux we can use fail2ban to prevent brute attack based on the login failure attempt. Windows has a similar […]

Encryption and Tunneling Techniques

Authentication can be performed in several different ways, including the following: ■ Something you know—Passwords ■ Something you have—Tokens, smart cards, […]

User Agent Strings

User Agent Strings User agent strings act as another method to fingerprint a client. These characteristics range from identifying the browser […]