Learn about weak Diffie-Hellman key exchange and the Logjam attack, plus get practical guides to strengthen TLS security on your servers and websites.
Understand and fix weak Diffie-Hellman security
This website explains the risks of weak Diffie-Hellman key exchange and details the Logjam attack, a vulnerability affecting many secure Internet protocols. If you manage servers or websites, you'll find clear explanations about how your systems might be at risk and what that means for your users' security.
Alongside the background information, the site offers practical guides for deploying stronger cryptography in TLS, helping you protect sensitive data from potential attackers. Whether you're a system administrator, developer, or just interested in cybersecurity, this resource breaks down complex topics and provides actionable steps to secure your connections.
Discover websites similar to Weakdh.org based on shared categories, topics, and features.
Polar SSL offers easy-to-follow guides and tips on data security, encryption, and online safety for anyone wanting to protect their digital life.
Find detailed notes on software vulnerabilities, including technical info, remediation steps, and affected vendors, maintained by the CERT Coordination Center.
Find free network security tools and downloads, including the open-source Nmap security scanner, plus resources for Linux, Windows, and UNIX systems.
Snort offers open-source software for detecting and preventing network threats, helping you safeguard your systems on Linux and Windows for free.
Helps you identify, prevent, and report malicious software and websites to keep your devices and browsing safe from online threats.
Spybot protects your devices from malware, tracks unwanted software, and helps keep your digital identity private with advanced security tools.
Independent antivirus and security software tests and reviews in German. Compare protection for Windows, Android, and more to find reliable IT security tools.
Wireshark lets you capture and analyze network traffic to troubleshoot issues, learn about protocols, and improve network security. Free downloads available.
All About Cookies offers easy-to-understand guides, tips, and reviews to help you protect your privacy and security while browsing online.
Explore a comprehensive database of common software attack patterns to help identify, understand, and defend against cybersecurity threats.
Cybertelecom offers guides and resources on telecommunications and internet policy, bridging technology and law for industry professionals and enthusiasts.
Learn about web robots and how to manage them with robots.txt. Find info, tools, and resources for controlling access to your website.
Learn all about YAML with official documentation, guides, and resources for using this human-friendly data serialization language.
WikiChip is a collaborative wiki offering detailed guides, specs, and info on computer chips, CPUs, and microarchitecture for tech enthusiasts and professionals.
Step-by-step guides and tools to help you create your own website, even if you're a beginner. Learn how to launch your site quickly and easily.
SELFHTML-Wiki is a German-language knowledge base for web development and HTML, offering guides, tutorials, and resources for all experience levels.
Learn about standards, open source software, and the groups behind them with guides, articles, and resources on ConsortiumInfo.org.
Fabien Potencier's blog shares insights on web technology and the Symfony framework, offering articles, tips, and updates for developers and tech enthusiasts.
Find DMV offices, hours, forms, practice tests, and step-by-step guides to make your Department of Motor Vehicles experience easier across the U.S.
See how unique your browser is online and check your digital fingerprint to understand how easily you could be identified on the Internet.
Learn how to use Content Security Policy (CSP) to protect your web applications from vulnerabilities like cross-site scripting with Google’s helpful guide.
Scott Helme shares cybersecurity insights, tools, and training, including resources on hacking, encryption, and web security for all experience levels.
Stay updated with the latest cybersecurity news, expert research, tech analysis, and product reviews from the Cybernews team.
Learn about Meltdown and Spectre vulnerabilities, their impact on computer security, and access research papers and resources for deeper understanding.
Learn how to spot scams and protect yourself online with practical tips and guides focused on keeping Brits safe from phone, SMS, email, and web fraud.
Read insights from the creator of NoScript about web security, privacy, and open-source development, with a focus on browser safety and hacking topics.
Stay updated with Google's latest news, tips, and updates about online security, privacy, and protection for users and organizations worldwide.
Stay updated with the latest Microsoft security news, researcher leaderboards, and resources for reporting vulnerabilities and improving cybersecurity.
Read X41 D-Sec's expert white paper comparing the security of Chrome, Edge, and Internet Explorer for enterprise browser protection insights.
Read how Troy Hunt uses the Coinhive domain to fight cryptojacking and promote safer web practices through content security policies and education.
Learn about software security with blog posts on offensive and defensive techniques, plus tips for building safer applications and systems.
Perishable Press offers practical guides and tips on WordPress, web development, and online security for developers and website owners.
Find clear Unix and Linux tutorials on shell scripting, sed, awk, and security topics. Great resource for learning command-line skills and tips.
Explore in-depth guides on Linux server management, cybersecurity, and tech trends. Learn tips, tricks, and best practices for Linux and IT topics.
Schneier on Security shares expert insights, news, and essays on cybersecurity, privacy, and technology trends, plus event updates and resources.
A tech blog by Evgeni Golov sharing guides, security research, and fixes for Linux, containers, and network devices. Insights for sysadmins and developers.
AskApache offers advanced web development guides, .htaccess code samples, and security tips for webmasters, developers, and tech enthusiasts.
360.cn offers security software, smart devices, and enterprise cloud solutions to help you stay safe online and protect your digital life. (Chinese site)
Stay up to date on cybersecurity trends, AI threats, and best practices with Palo Alto Networks' blog, featuring expert insights and practical guidance.
Personal blog focused on web application and Web3 security, sharing insights, tools, and guides about vulnerabilities, exploits, and defensive strategies.