35 results for: dns
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
What is DNS Blockchain and how to use it
To be able to navigate the Internet, to enter a website and have it show us all the content we want and search for, certain functions and characteristics are necessary. One of these key points is the DNS. It is what translates domain names into IP addresses, which prevents us…
Category : Security 28-12-2020 by Janeth Kent
A FULFILLED PROMISE - Using the FETCH API to make AJAX calls
In this article we talked about what AJAX calls are and how to use them in a traditional way, by using the XMLHttpRequest (XHR) object. In short, thanks to AJAX calls a web page can be partially updated without having to reload the whole content. This leads to better loading…
Category : Javascript 26-12-2020 by Iveta Karailievova
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 19-09-2020 by Janeth Kent
What cybersecurity professionals have learned from the lockdown experience
The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…
Category : Security 26-08-2020 by Silvia Mazzetta
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…
Category : Security 25-08-2020 by Janeth Kent
The 6 Essentials for Creating a Visually Appealing Web Design
Creating a website might seem like a simple thing. After all, what do you really need besides a good hosting provider and relevant content, right? Well, the reality is quite different. Things might have worked like that in the past, but they are quite different now. The internet is advancing, and…
Category : Web design 25-08-2020 by Silvia Mazzetta
Popular DNS Attacks and how to prevent them
DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…
Category : Security 20-07-2020 by Silvia Mazzetta
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
How to Change Your DNS Server (And Why You Should)
It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…
Category : Networking 09-05-2020 by Luigi Nori
How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit
Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…
Category : Security 02-03-2020 by Silvia Mazzetta
How to see the websites visited during the incognito mode and delete them
One of the features of any browser's incognito mode is that it does not store visited web pages in history. However, there is a method for displaying the last sites you accessed with your browser, regardless of whether or not you set it to incognito mode. They will all appear in…
Category : Security 21-02-2020 by Silvia Mazzetta
Is It Risky to Share Data While Surfing Online?
The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…
Category : Security 30-12-2019 by Janeth Kent
How to Generate Static Sites with JavaScript Static Sites Generators
Static websites and so-called JAMstack have become pretty popular recently. And with 2020 on the horizon, this trend doesn't seem to be stopping. Why? Why is old-school HTML + CSS + JS trio in its redesigned and renamed form gaining so much attention? In this article, we'll explore what the…
Category : Javascript 13-12-2019 by Luigi Nori
The best Internet search engines used by hackers
Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…
Category : Security 07-01-2021 by Silvia Mazzetta
10 Open source tools for security operations (SOC)
As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…
Category : Security 29-11-2019 by Janeth Kent
Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server
The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…
Category : Networking 27-12-2018 by Janeth Kent
80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems
It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…
Category : Security 23-10-2018 by Janeth Kent
How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail
Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…
Category : Networking 08-08-2018 by Janeth Kent
Ubuntu servers security: 25 security tools to armor your system
The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc. 1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…
Category : Servers 14-09-2016 by Janeth Kent
How to Configure Cloudflare Flexible SSL with WordPress website
This article is part of a serie of articles about Wordpress optimization with Cloudflare and some kinds of servers, if you want to understand well read these articles before: Speed up your site and protect it against DDOS attacks with CloudFlare Million of visitors per day with a super cheap php mysql…
Category : Servers 03-12-2015 by Janeth Kent
Protect Ubuntu Servers With Fail2Ban
Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…
Category : Security 17-02-2015 by Janeth Kent
Speed up your site and protect it against DDOS attacks with CloudFlare
If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…
Category : Networking 23-07-2014 by Luigi Nori
25 HTML5 speed tips
Creating high-performance web sites or applications is essential for web developers. Jatinder Mann explains that the goal of a developer is to improve web performance by reducing 25 factors: Display time The most important objective is what we refer to as 'Display Time'. This has many names across the industry including 'time to…
Category : Web design 05-12-2013 by Janeth Kent
Improving Page Performance with HTML5 Prefetch
As Wikipedia explains: Link prefetching is a proprietary syntax to give web browsers a hint about documents that it should pre-fetch because the user might visit them in the near future. It is proposed as a draft internet standard by Mozilla. A web page provides a set of prefetching hints to…
Category : Programming 23-08-2013 by Janeth Kent
Setup SSL Certificate on Apache and Ubuntu 12.04
How to Create a SSL Certificate on Apache for Ubuntu 12.04 About SSL Certificates A SSL certificate is a way to encrypt a site's information and create a more secure connection. Additionally, the certificate can show the virtual private server's identification information to site visitors. Certificate Authorities can issue SSL certificates that…
Category : Networking 02-07-2013 by Janeth Kent
14 Tools For Checking Your Website's Health
Have you ever checked your website's health? We have listed some useful sources that show if your website is operating as it should, and if there's anything that it can be done to improve it's performance from the structural and marketing aspect. Enjoy and feel free to recommend any other sources…
Category : Web design 28-06-2013 by Janeth Kent
Setting the Hostname (FQDN) in Linux Servers
Here we will show how to set your system's hostname and fully qualified domain name (FQDN). Your hostname should be something unique. Some people name their servers after planets, philosophers, or animals. Note that the system's hostname has no relationship to websites or email services hosted on it, aside from providing…
Category : Networking 29-05-2013 by Janeth Kent
Million of visitors per day with a super cheap php mysql server using nginx and varnish
These instructions are the rather verbose, but hopefully easy enough to follow, steps to build a new Linux server using Varnish and Nginx to build a php application on a cheap server , all costing under $15 a month, capable of sustaining million hits per day, (we use blitz.io to…
Category : Networking 28-05-2013 by Janeth Kent
Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users
One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…
Category : Security 09-05-2013 by Janeth Kent
Top Google Website Optimization Resources
Search engine optimization (SEO) professionals, web designers, and bloggers read a lot of tips from various experts to stay fresh and up on the current trends in website optimization. But what does Google have to offer on the subject? Find out in this collection of tips, guides, resources, and tutorials…
Category : Web marketing 26-04-2013 by Janeth Kent
Install Webmin on Ubuntu
Webmin is a web-based control panel for any Linux machine that allows you to manage your server through a modern web-based interface. With Webmin, you can change settings for common packages on the fly, including web servers and databases, as well as manage users, groups and software packages. Through this tutorial,…
Category : Networking 18-06-2020 by Janeth Kent
Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10
This tutorial shows how to combine four single storage servers (running Ubuntu 11.10) to one large storage server (distributed storage) with GlusterFS. The client system (Ubuntu 11.10 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling…
Category : Operating systems 11-04-2013 by Janeth Kent
PHP get DNS Nameserver , Cname , MX , A records of a domain
PHP has a useful function called dns_get_record that can be used to get different types of records for a give domain , very easily. Nameserver - NS Records : $ php -a Interactive shell php > print_r(dns_get_record('www.binarytides.com' , DNS_NS)); Array ( => Array ( => binarytides.com => NS => omikro1.allwebserver.com => IN => 86140 ) => Array ( =>…
Category : Programming 11-04-2013 by Janeth Kent
Install ISPCONFIG 3 in UBUNTU 12.04
Note: This is work in progress! You should probably test this in a virtual machine first and play around with various settings. There are a lot of tutorials over the Internet about how to configure an Ubuntu server for ISPConfig. I usually follow them, after all there aren’t so many variations on…
Category : Networking 11-04-2013 by Janeth Kent