-

In this article, I will dissect the concept of Virtual Private Network (VPN) using the Internet Protocol security (IPsec) protocol. The goal is to help you better understand the various steps involved in setting up an IPsec …
Read More -

In this article, I introduce a network authentication protocol, namely Tunnel Extensible Authentication Protocol (TEAP), a method that allows multiple authentication mechanisms within a secure tunnel. The principle is to be able …
Read More -

In this article, I demystify the HyperText Transfer Protocol (HTTP) security response headers. The objective is to provide you with the basics in order to understand what these headers are, what they are used for, and how to use …
Read More