Dns - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

36 results for: dns

Examine the 10 key PHP functions I use frequently

PHP never ceases to surprise me with its built-in capabilities. These are a few of the functions I find most fascinating.   1. Levenshtein This function uses the Levenshtein algorithm to calculate the disparity or "distance" between two text strings. Named after its creator, Vladimir Levenshtein, it measures how identical two words or…

Category : Php   17-10-2023   by Silvia Mazzetta

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

What is DNS Blockchain and how to use it

To be able to navigate the Internet, to enter a website and have it show us all the content we want and search for, certain functions and characteristics are necessary. One of these key points is the DNS. It is what translates domain names into IP addresses, which prevents us…

Category : Security   28-12-2020   by Janeth Kent

A FULFILLED PROMISE - Using the FETCH API to make AJAX calls

In this article we talked about what AJAX calls are and how to use them in a traditional way, by using the XMLHttpRequest (XHR) object. In short, thanks to AJAX calls a web page can be partially updated without having to reload the whole content. This leads to better loading…

Category : Javascript   26-12-2020   by Iveta Karailievova

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser It is also possible to increase the security level of the…

Category : Security   08-03-2024   by Janeth Kent

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

The 6 Essentials for Creating a Visually Appealing Web Design

Creating a website might seem like a simple thing. After all, what do you really need besides a good hosting provider and relevant content, right? Well, the reality is quite different. Things might have worked like that in the past, but they are quite different now.   The internet is advancing, and…

Category : Web design   25-08-2020   by Silvia Mazzetta

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

How to Change Your DNS Server (And Why You Should)

It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…

Category : Networking   09-05-2020   by Luigi Nori

How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit

Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…

Category : Security   02-03-2020   by Silvia Mazzetta

How to see the websites visited during the incognito mode and delete them

One of the features of any browser's incognito mode is that it does not store visited web pages in history. However, there is a method for displaying the last sites you accessed with your browser, regardless of whether or not you set it to incognito mode. They will all appear in…

Category : Security   21-02-2020   by Silvia Mazzetta

Is It Risky to Share Data While Surfing Online?

The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…

Category : Security   30-12-2019   by Janeth Kent

How to Generate Static Sites with JavaScript Static Sites Generators

Static websites and so-called JAMstack have become pretty popular recently. And with 2020 on the horizon, this trend doesn't seem to be stopping. Why? Why is old-school HTML + CSS + JS  trio in its redesigned and renamed form gaining so much attention? In this article, we'll explore what the…

Category : Javascript   13-12-2019   by Luigi Nori

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…

Category : Networking   27-12-2018   by Janeth Kent

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   30-03-2023   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

How to Configure Cloudflare Flexible SSL with WordPress website

How to Configure Cloudflare Flexible SSL with WordPress website

This article is part of a serie of articles about Wordpress optimization with Cloudflare and some kinds of servers, if you want to understand well read these articles before: Speed up your site and protect it against DDOS attacks with CloudFlare Million of visitors per day with a super cheap php mysql…

Category : Servers   03-12-2015   by Janeth Kent

Protect Ubuntu Servers With Fail2Ban

Protect Ubuntu Servers With Fail2Ban

​Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…

Category : Security   17-02-2015   by Janeth Kent

Speed up your site and protect it against DDOS attacks with CloudFlare

Speed up your site and protect it against DDOS attacks with CloudFlare

If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…

Category : Networking   23-07-2014   by Luigi Nori

25 HTML5 speed tips

25 HTML5 speed tips

Creating high-performance web sites or applications is essential for web developers. Jatinder Mann explains that the goal of a developer is to improve web performance by reducing 25 factors: Display time The most important objective is what we refer to as 'Display Time'. This has many names across the industry including 'time to…

Category : Web design   05-12-2013   by Janeth Kent

Improving Page Performance with HTML5 Prefetch

Improving Page Performance with HTML5 Prefetch

As Wikipedia explains: Link prefetching is a proprietary syntax to give web browsers a hint about documents that it should pre-fetch because the user might visit them in the near future. It is proposed as a draft internet standard by Mozilla. A web page provides a set of prefetching hints to…

Category : Programming   23-08-2013   by Janeth Kent

Setup SSL Certificate on Apache and Ubuntu 12.04

Setup SSL Certificate on Apache and Ubuntu 12.04

How to Create a SSL Certificate on Apache for Ubuntu 12.04   About SSL Certificates A SSL certificate is a way to encrypt a site's information and create a more secure connection. Additionally, the certificate can show the virtual private server's identification information to site visitors. Certificate Authorities can issue SSL certificates that…

Category : Networking   02-07-2013   by Janeth Kent

14 Tools For Checking Your Website's Health

14 Tools For Checking Your Website's Health

Have you ever checked your website's health? We have listed some useful sources that show if your website is operating as it should, and if there's anything that it can be done to improve it's performance from the structural and marketing aspect. Enjoy and feel free to recommend any other sources…

Category : Web design   28-06-2013   by Janeth Kent

Setting the Hostname (FQDN) in Linux Servers

Setting the Hostname (FQDN) in Linux Servers

Here we will show how to set your system's hostname and fully qualified domain name (FQDN). Your hostname should be something unique. Some people name their servers after planets, philosophers, or animals. Note that the system's hostname has no relationship to websites or email services hosted on it, aside from providing…

Category : Networking   29-05-2013   by Janeth Kent

Million of visitors per day with a super cheap  php mysql server using nginx and varnish

Million of visitors per day with a super cheap php mysql server using nginx and varnish

These instructions are the rather verbose, but hopefully easy enough to follow, steps to build a new Linux server using Varnish and Nginx to build a php application on a cheap server , all costing under $15 a month, capable of sustaining million hits per day, (we use blitz.io to…

Category : Networking   28-05-2013   by Janeth Kent

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by Janeth Kent

Top Google Website Optimization Resources

Top Google Website Optimization Resources

Search engine optimization (SEO) professionals, web designers, and bloggers read a lot of tips from various experts to stay fresh and up on the current trends in website optimization. But what does Google have to offer on the subject? Find out in this collection of tips, guides, resources, and tutorials…

Category : Web marketing   26-04-2013   by Janeth Kent

Install Webmin on Ubuntu

Webmin is a web-based control panel for any Linux machine that allows you to manage your server through a modern web-based interface. With Webmin, you can change settings for common packages on the fly, including web servers and databases, as well as manage users, groups and software packages. Through this tutorial,…

Category : Networking   18-06-2020   by Janeth Kent

Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10

Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10

  This tutorial shows how to combine four single storage servers (running Ubuntu 11.10) to one large storage server (distributed storage) with GlusterFS. The client system (Ubuntu 11.10 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling…

Category : Operating systems   11-04-2013   by Janeth Kent

PHP get DNS Nameserver , Cname , MX , A records of a domain

PHP get DNS Nameserver , Cname , MX , A records of a domain

  PHP has a useful function called dns_get_record that can be used to get different types of records for a give domain , very easily. Nameserver - NS Records : $ php -a Interactive shell php > print_r(dns_get_record('www.binarytides.com' , DNS_NS)); Array ( => Array ( => binarytides.com => NS => omikro1.allwebserver.com => IN => 86140 ) => Array ( =>…

Category : Programming   11-04-2013   by Janeth Kent

Install ISPCONFIG 3 in UBUNTU 12.04

  Note: This is work in progress! You should probably test this in a virtual machine first and play around with various settings. There are a lot of tutorials over the Internet about how to configure an Ubuntu server for ISPConfig. I usually follow them, after all there aren’t so many variations on…

Category : Networking   11-04-2013   by Janeth Kent

q=dns Clicky