What is a website render blocking resource?
An explanation of blocking resources on websites.
Network fingerprinting identifies and categorises devices, operating systems, and software based on their unique characteristics in network communications. These characteristics create "fingerprints" that allow identification of devices, similar to how human fingerprints identify individuals.
Organisations use network fingerprinting for:
Experts employ these techniques for network fingerprinting:
TLS Fingerprinting: This analyses characteristics of how a device initiates secure connections. The JA3 method exemplifies TLS fingerprinting. Learn more about TLS fingerprinting at /blog/tls-fingerprinting.
HTTP Fingerprinting: This examines how web browsers and HTTP clients make requests, including headers and their order.
TCP/IP Fingerprinting: This looks at how devices implement the TCP/IP protocol stack, including factors like initial packet sizes and window sizes.
OS Fingerprinting: This determines the operating system of a device based on its responses to network probes.
Network fingerprinting has limitations. Users can mask or alter their fingerprints, and some fingerprints may appear similar across different devices or software versions. Organisations often use fingerprinting with other security measures for effective results.
An explanation of blocking resources on websites.
Discover what Bot Management is all about.
An overview of the different types of browser hints and how they help with website performance
A quick description of the critical rendering path for browsers
Invisible javascript device challenges are a frictionless alternative to CAPTCHAs
What is RUM (Real User Measurement)?
© PEAKHOUR.IO PTY LTD 2025 ABN 76 619 930 826 All rights reserved.