|
You are here |
mysteries.wizardzines.com | ||
| | | | |
www.trickster.dev
|
|
| | | | | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting | |
| | | | |
anuragbhatia.com
|
|
| | | | | ||
| | | | |
stafwag.github.io
|
|
| | | | | ** Installing and configuring an encrypted dns server is straightforward, there is no reason to use an unencrypted dns service. ** DNS is not secure or private DNS traffic is insecure and runs over UDP port 53 (TCP for zone transfers ) unecrypted by default. This make your unencrypted DNS traffic a privacy risk and a security risk: anyone that is able to sniff your network traffic can collect a lot information from your leaking DNS traffic. with a DNS spoofing attack an attacker can trick you let go to malicious website or try to intercept your email traffic. Encrypt your dns traffic Encrypting your network traffic is always a good idea for privacy and security reasons - ** we encrypt, because we can! ** - . More information about dns privacy can be found at... | |
| | | | |
zwischenzugs.com
|
|
| | | InAnatomy of a Linux DNS Lookup - Part II covered: nsswitch /etc/hosts /etc/resolv.conf pingvshoststyle lookups and inAnatomy of a Linux DNS Lookup - Part III covered: systemdand itsnetworkingservice ifupandifdown dhclient resolvconf and ended up here: A (roughly) accurate map of what's going on Unfortunately, that's not the end of the story. There's still more things... | ||