MAC Address: Everything You Need to Know

Internet, Protocols, Tools

A MAC address is a unique identifier assigned to every device that connects to a network. Whether...
Read More Read More: MAC Address: Everything You Need to Know

Top 10 Most Expensive Domain Names in History

Uncategorized

While most of us grab a domain for the price of a coffee, the world’s biggest brands are playing a high-stakes game of digital...
Read More Read More: Top 10 Most Expensive Domain Names in History

CDN and SEO, are they connected?

CDN

CDN and SEO go hand in hand when it comes to improving website performance and visibility. A slow website can negatively impact rankings,...
Read More Read More: CDN and SEO, are they connected?

UDP (User Datagram Protocol) explained in details

DDoS, DNS, Internet

UDP (User Datagram Protocol) is one of the well-known protocols in network communications. Thanks...
Read More Read More: UDP (User Datagram Protocol) explained in details

Linux Host command, troubleshot your DNS

Tools

Today we will add one more handy DNS tool – Host command on Linux. For the purpose, we will use the latest Linux Mint 19.1 (based on...
Read More Read More: Linux Host command, troubleshot your DNS

TTL and how to check TTL

DNS

TTL – Time to live is a value that signifies how long should the data be kept before discarding. It is commonly used in computers. In...
Read More Read More: TTL and how to check TTL

Monitoring your DNS, should you do it?

DNS, Protection

DNS Monitoring can serve you and help you detect unwanted issues. As you probably know, the...
Read More Read More: Monitoring your DNS, should you do it?

IPv4 vs IPv6 and where did IPv5 go?

Internet

Every time you see some network settings, there are IPv4 or IPv6 addresses. As you can guess, the previous versions are long in the past...
Read More Read More: IPv4 vs IPv6 and where did IPv5 go?

How to create your own CDN using DNS

DNS, Load balancing

A CDN – Content Delivery Network is responsible for the content delivery. We all interact with CDNs on a daily basis – when we...
Read More Read More: How to create your own CDN using DNS

DNS Hijacking: What It Is and How to Protect Yourself

DNS, Protection

DNS hijacking is a malicious cyber attack that can have serious consequences, such as stealing your...
Read More Read More: DNS Hijacking: What It Is and How to Protect Yourself
Close Search Window
Close