<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse-Proxy on Pi Stack</title><link>https://www.pistack.xyz/tags/reverse-proxy/</link><description>Recent content in Reverse-Proxy on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 18 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/reverse-proxy/index.xml" rel="self" type="application/rss+xml"/><item><title>BunkerWeb vs ModSecurity vs CrowdSec: Best Self-Hosted WAF Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-18-bunkerweb-vs-modsecurity-vs-crowdsec-self-hosted-waf-guide-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-18-bunkerweb-vs-modsecurity-vs-crowdsec-self-hosted-waf-guide-2026/</guid><description>&lt;p>Protecting web applications from attacks like SQL injection, cross-site scripting (XSS), and bot abuse is essential — whether you run a single blog or a multi-tenant platform. Commercial WAFs (Cloudflare, AWS WAF) cost money and route your traffic through third-party infrastructure. Self-hosted open-source alternatives give you full control over your security posture without the per-request pricing.&lt;/p></description></item><item><title>OAuth2-Proxy vs Pomerium vs Traefik-Forward-Auth: Best Self-Hosted Auth Proxy 2026</title><link>https://www.pistack.xyz/posts/oauth2-proxy-vs-pomerium-vs-traefik-forward-auth-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/oauth2-proxy-vs-pomerium-vs-traefik-forward-auth-2026/</guid><description>&lt;p>If you self-host web applications — dashboards, admin panels, internal tools, or APIs — one of the first questions you face is: &lt;strong>how do I protect them from unauthorized access?&lt;/strong>&lt;/p></description></item></channel></rss>