Category Archives: Web Security

Secure HLS on CDNsun | URL Signing & Access Control
11 Feb 2026
Secure HLS on CDNsun HLS (HTTP Live Streaming) is easy to deliver at scale, but it is also easy to steal: a single leaked .m3u8 can be shared, embedded elsewhere, or used for unauthorized restreaming. Because HLS is built from playlists and many small segments, protecting only one URL is rarely enough. This article explains how to secure HLS on CDNsun using URL signing and complementary controls like hotlinking, geo-blocking, IP rules, and password protection. URL signing for HLS on CDNsun: [...]
ConnectBot Logo
31 May 2024
This is my own personal experience, a story about looking for and finding the best SSH client for my Android phone. My requirements were the following: I was looking for a free SSH client for Android 14 with agent forwarding. By agent forwarding, I mean that I want to be able to connect to a server, and from that server, I want to be able to connect to another server. For that, you need agent forwarding; otherwise, you will [...]
Blockchain CDN
30 Nov 2020
Blockchain is an emerging technology that has grown in popularity with innovators and solution architects over the past few years. With real-world use cases that range from the confidential sharing of medical data to supply chain monitoring, this platform offers any organization a secure system to store and retrieve transactional information.  At its core, blockchain is a database. It differs from traditional databases by the method it uses to store and retrieve information. As it records data in virtual blocks, [...]
CDN Security
03 Aug 2020
SDP, VPN, or Hybrid are three models organizations can leverage to strengthen their cybersecurity. As securing the perimeter of your network is a fundamental requirement for any organization, enterprises need to ensure they adopt the best possible approach. Not only do you have to ensure you protect your systems from unauthorized access, but you also need to provide users with the ability to work from anywhere, at any time. Although remote work is increasing, it is not a new [...]
Privacy
25 May 2020
Data broking is a big business in today's online digitally-driven world. As the world continues to embrace technology to improve efficiency, access knowledge, drive communication, and enhance collaboration, the production of vast quantities of data is either a direct or indirect collateral effect of any digital interaction. In 2017, the Economist stated that data is more valuable than oil. Although it may seem unusual to put a price tag on an intangible asset created by simple online interactions, the [...]
Encryption
13 Apr 2020
End-to-End Encryption (E2EE) ensures the confidentiality and privacy of the parties to a particular communication. Irrespective of the medium chosen, be it text, voice, or video, this technology prevents third-parties from accessing any interaction while it is in transit or at rest. As the vast majority of today's intercommunication occurs across the Internet, encrypting your information is vital. Users typically leverage a variety of third-party apps and services to interact with their friends, family, and colleagues. Due to the sensitive nature of most interpersonal communications, it is [...]
Blockchain CDN
31 Mar 2020
The Dark Web is a controversial topic that is shrouded in mystery for many regular Internet users. Portrayed in the media as a seedy underground virtual reality where cybercriminals roam free and peddle their illicit wares, this encrypted network has been a newsworthy subject since its rise to infamy during the last decade. Although the Dark Web may appear to be a prohibited playground hosting illegal products and services, one cannot ignore its use in the fight for online [...]
Encryption
02 Feb 2020
Securing your website is vital in today's ever-evolving threat landscape. New cyberattacks, unauthorized intrusions, and data breaches emerge daily, placing both your business and customers at risk. As your website is the public face of your enterprise, it presents the perfect target to motivated attackers. Finding the perfect balance between security and functionality is vital to the usability of your site. You need to ensure potential customers can access your website rapidly and efficiently. However, you also need to implement security measures to protect them, your data, [...]
Cyberwar
26 Jan 2020
Cyberwar is a genuine threat to every person, organization, and nation-state. In today's digitally driven society, every system that helps us navigate, participate and compete in the digital age relies on the availability and unhindered functionality of technology. Classical warfare doctrine, such as the treatise written by Sun Tzu, states that the supreme art of war is to subdue the enemy without fighting. The objectives stated by Sun Tzu have become a reality as warfare evolves in the digital [...]
Encryption
10 Nov 2019
Cache Poisoned Denial of Service is an attack vector that disables valid user access to online resources and websites. As caching plays a vital part in the delivery architecture of most web applications, attacks against this infrastructure component can have a significant impact on the availability of an online service. Implementing caching, whether it be on your origin server or by leveraging the services of a Content Delivery Network, is a proven strategy that enhances the end-user experience. By improving page-load speeds, not only [...]