ECH - The Missing Layer in DNS Privacy
This week, there was a discussion on Hacker News about the reasons for and against using DNS over HTTPS (DoH). DNS over HTTPS (DoH) and DNS over TLS (DoT) ar...
This week, there was a discussion on Hacker News about the reasons for and against using DNS over HTTPS (DoH). DNS over HTTPS (DoH) and DNS over TLS (DoT) ar...
Deception technology plays a crucial role in modern cybersecurity by helping organizations detect and respond to threats more effectively. Since no security ...
Happy new year to all of you! To be honest, I’ve never been enthusiastic about classic New Year’s resolutions. In my experience, they tend to be largely inef...
In this blog post, we’ll explore how to set up and run an httpd server (Apache HTTP Server) using a containerized environment with Podman. A key aspect of th...
With a cup of coffee in hand, I settled in front of my laptop, opened my IDE, and wrote a simple TCP port scanner in Bash. You can find it on GitHub. Of cour...