StackPath Announcements and Resources for Developers.
Get a visual aid, explanation and working example for terms related to security, speed and scale.
When people want to notify a company of abuse of their services such as spamming, proliferating malware, hosting phishing sites, copyright violations, they will generally notify firstname.lastname@example.org. Ensuring that you have an “abuse@” email address setup is the first step for an abuse desk.
A brute force attack is a method used to obtain encrypted passwords with an automated system.
DDoS is a method of attacking a server or network by sending more requests to it than it can respond to.
An HTTP Archive (HAR) file is a common format for recording HTTP tracing information.
Load balancing uses software to distribute traffic across multiple computing resources.
HTTP/2 is the newest major version of the HyperText Transfer Protocol (HTTP).
Micro-caching is the process of temporarily storing web content for very brief periods of time.
Cache poisoning is the replacement of legitimately cached web content with spoofed, malicious or fake data.
Content caching is the temporary storage of files on servers that are physically closer to end users. Learn how content caching works with case study examples.
A CDN (Content Delivery Network), is a network of edge servers that provide optimized distribution or delivery of online content. The location of a group of servers is referred to as a PoP (Point of Presence), and each CDN PoP services the users in the geographic area it is placed.
Lazy loading is a technique for loading web content when it’s needed rather than all at once.
Critical rendering path refers to a series of events a browser goes through to display the initial view of a web page.
Cross-origin resource sharing (CORS) is a standard for accessing web resources on different domains.
CWND and RWND are TCP state variables used to regulate data flow in TCP connections.
Defense in depth is the principle of having multiple layers of security to ensure the protection of a system.
Dynamic analysis is a debugging method that evaluates a program during execution.
Gzip is a bandwidth optimization tool that compresses data before delivering it over the web.
Anycast is a routing methodology that sends packets to one node out of a group of potential nodes. Learn examples and benefits of Anycast.
Binary hardening protects against common binary attacks, carried out via the insertion of a binary file. Learn how binary hardening works along with examples.
Cache hit ratio is the number of requests delivered by the cache server, divided by the total number of requests. Learn how to measure cache hit ratio.
CSRF is an attack that causes a browser to execute an action on a site for which the user is currently authenticated. Learn more about CSRF with examples.
Cross-Site Scripting (XSS) is a web application vulnerability that lets attackers insert client-side scripts on web pages. Learn how it works with examples.
The Domain Name System (DNS) associates a computer-readable IP address to a human-friendly domain name. Learn more about DNS types, examples and benefits.
Domain sharding is a technique for splitting resources across multiple domains to improve page load time. Learn how it works with examples.
Dynamic content is content that changes based on user access time, user preferences and personal information. Learn how dynamic content works with examples.
HTTP Strict Transport Security (HSTS) forces users to communicate with servers through HTTPS only. Learn how HSTS works including examples and benefits.
IPFS is a hypermedia protocol addressed by content and identities instead of traditional location addressing. Learn how IPFS works with examples.
Keep-Alive is a header that maintains a persistent connection between a client and server. Learn more about the functionalities of keep-alive and its benefits.
Minification is a bandwidth optimization technique that reduces the size of code transmitted over the web. Learn more about its techniques, tools and benefits.