DNS Tunneling attack – What is it, and how to protect ourselves?
DNS Tunneling attack turns the Domain Name System (DNS), a highly trusted and widely used system on...
DNS Spoofing (DNS poisoning)
Cyber-threats are behind every corner. Recently we wrote about DDoS attacks, and how hackers are using your computer and many connected...
Understanding BGP: A Comprehensive Guide for Beginners
Border Gateway Protocol (BGP) plays a crucial role in directing data between different networks. If you’re new to the topic,...
What is Microsoft Azure? IaaS, PaaS, and SaaS.
Before we start talking about Microsoft Azure, let’s see why such a service exists. It the modern...
OSPF (Open Shortest Path First): What It Is and How It Works
OSPF (Open Shortest Path First) is one of the most widely used routing protocols in modern IP networks. Designed to efficiently direct...
Magento, is it a good e-commerce platform?
Choosing the right e-commerce platform is one of the most important decisions any online retailer...
Email forwards – what are they and how to use them?
Can you guess what email forwards do? Yes, it is very simple, they redirect emails from one mailbox to another. Just as you can forward...
Тools – DNS trace, Ping, Traceroute, Nslookup, Reverse lookup
Navigating the world of DNS and network management can often feel like a complex puzzle, especially when things don’t work as...
DNS zone transfer and zone file (Updated)
We have already covered the bases of DNS, so you know what it is and how does it work. This...