dns   39114

« earlier    

Home - Docker Flow Proxy
The goal of the Docker Flow Proxy project is to provide an easy way to reconfigure proxy every time a new service is deployed, or when a service is scaled. It does not try to "reinvent the wheel", but to leverage the existing leaders and combine them through an easy to use integration. It uses HAProxy as a proxy and adds custom logic that allows on-demand reconfiguration.
lang:en  Docker  Proxy  DNS 
yesterday by DASKAjA
IBM broke its cloud by letting three domain names expire - The Register
“multiple domain names were mistakenly allowed to expire and were in hold status.”
outages  fail  ibm  the-register  ops  dns  domains  cloud 
yesterday by jm
What are the Cisco Umbrella Block Page IP Addresses? – OpenDNS
"When a page is blocked by the Cisco Umbrella service, our DNS resolvers display a block page instead of the page with the blocked content. These block pages are served from Cisco Umbrella servers. The anycast IP address and associated block type for these servers are outlined in the table below."
opendns  filtering  dns  security  cisco  umbrella 
2 days ago by anl
Cloudflare Review: A Comprehensive Guide
Content Delivery Network -- A Content Delivery Network (CDN) is a network of caching servers located around the world. -- The objective of a CDN is to reduce the latency by bringing the resources closer to you. In order to achieve that, caching servers are located in different locations around the world also known as points of presence (PoPs). -- A typical CDN requires you to push your resources to these caching servers. However, Cloudflare is not a traditional CDN. It acts as a proxy which allows their server to cache your resources.
----
May 1, 2017.
dns  networking 
2 days ago by dusko
Introduction to Networking: Part 1, The Basics - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, virtualization, and networking, all with an open source view
A router is a device that operates at OSI layer 3. Because network protocols exist at layer 3, routers are generally protocol specific. I’ve limited the discussion here to TCP/IP, but routers exist for other network protocols as well. A key difference between bridges/switches and routers is that routers actually modify the packets moving across them, typically by changing the layer 2 addresses in the packet and by decrementing the Time To Live (TTL) counter. The TTL counter is a fiel...
network  helloworld  bridge  switch  dns 
3 days ago by ianweatherhogg
DNS-over-HTTPSDNS-over-HTTPS
Traditional DNS queries and responses are sent over UDP or TCP without encryption. This is vulnerable to eavesdropping and spoofing (including DNS-based Internet filtering). Responses from recursive resolvers to clients are the most vulnerable to undesired or malicious changes, while communications between recursive resolvers and authoritative name servers often incorporate additional protection.


refrr:https://www.google.com/
Traditional DNS queries and responses are sent over UDP or TCP without encryption. This is vulnerable to eavesdropping and spoofing (including DNS-based Internet filtering). Responses from recursive resolvers to clients are the most vulnerable to undesired or malicious changes, while communications between recursive resolvers and authoritative name servers often incorporate additional protection.


refrr:https://www.google.com/
dns  api  json  reference  documentation  devops  domain  url  rest 
3 days ago by michaelfox

« earlier    

related tags

14.04  16.04  2fhg  adblock  addresses  addressing  ads  adsblocker  advertising  analysis  anonymity  api  architecture  aws  azure  bestpractice  bestpractices  bind  blocking  bridge  bug  catalunya  centos  change  check  checker  cisco  cli  client  cloud  cloudfront  configuration  connectivity  coredns  cybersecurity  debugging  dev  development  devops  dig  digitalocean  dkim  dmarc  dns_blocking  dnsmasq  dnssec  docker  documentation  domain  domains  down  dyndns  email  fail  filtering  free  gcloud  generator  github  google  gpl  gsuite  hack  hacking  haproxy  header  helloworld  history  hosting  hosts  howto  humor  ibm  infosec  internet  internet_censorship  ip  ipaddress  iuse  javascript  json  k8s  kubernetes  lang:en  leak  let-encrypt  letsencrypt  linux  lts  mail  malware  manipulation  monitoring  name  naming  network  networking  networks  nginx  nic.ru  nomenclature  northkorea  ooni  open-source  opendns  ops  osx  outages  pentesting  pinboard  pitch  pki  policy  privacy  programming  protocol:acme  proxy  python  read  record  reference  referendum  registrar  resolvconf  rest  sans  schema  script  secondary  security  securitywithoutborders  server  skydns  software  spam  spf  spyware  subdomain  switch  sysadmin  systemadministration  takeover  test  the-register  to_try  tools  troubleshooting  type:tool  ubuntu  umbrella  upgrade  url  vpn  vulnerability  web  webdev  webserver  website  windows  wrk-tools  www 

Copy this bookmark:



description:


tags: